Wireshark-announce: [Wireshark-announce] Wireshark 2.2.2 is now available
Date Next Thread Next
From: Wireshark announcements <[email protected]>
Date: Wed, 16 Nov 2016 15:43:16 -0800
I'm proud to announce the release of Wireshark 2.2.2.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2016-58
       Profinet I/O long loop. ([2]Bug 12851)
     * [3]wnpa-sec-2016-59
       AllJoyn crash. ([4]Bug 12953)
     * [5]wnpa-sec-2016-60
       OpenFlow crash. ([6]Bug 13071)
     * [7]wnpa-sec-2016-61
       DCERPC crash. ([8]Bug 13072)
     * [9]wnpa-sec-2016-62
       DTN infinite loop. ([10]Bug 13097)

   The Windows PortableApps packages were susceptible to a [11]DLL
   hijacking flaw.

   The following bugs have been fixed:
     * TCP: nextseq incorrect if TCP_MAX_UNACKED_SEGMENTS exceeded & FIN
       true. ([12]Bug 12579)
     * SMPP schedule_delivery_time displayed wrong in Wireshark 2.1.0.
       ([13]Bug 12632)
     * Upgrading to latest version uninstalls Microsoft Visual C++
       redistributable. ([14]Bug 12712)
     * dmg for OS X does not install man pages. ([15]Bug 12746)
     * Fails to compile against Heimdal 1.5.3. ([16]Bug 12831)
     * TCP: Next sequence number off by one when sending payload in SYN
       packet (e.g. TFO). ([17]Bug 12838)
     * Follow TCP Stream shows duplicate stream data. ([18]Bug 12855)
     * Dissection engine falsely asserts that EIGRP packet's checksum is
       incorrect. ([19]Bug 12982)
     * IEEE 802.15.4 frames erroneously handed over to ZigBee dissector.
       ([20]Bug 12984)
     * Capture Filter Bookmark Inactive in Capture Options page. ([21]Bug
       12986)
     * CLNP dissector does not parse ER NPDU properly. ([22]Bug 12993)
     * SNMP trap bindings for NON scalar OIDs. ([23]Bug 13013)
     * BGP LS Link Protection Type TLV (1093) decoding. ([24]Bug 13021)
     * Application crash sorting column for tcp.window_size_scalefactor up
       and down. ([25]Bug 13023)
     * ZigBee Green Power add key during execution. ([26]Bug 13031)
     * Malformed AMPQ packets for session.expected and session.confirmed
       fields. ([27]Bug 13037)
     * Wireshark 2.2.1 crashes when attempting to merge pcap files.
       ([28]Bug 13060)
     * [IS-637A] SMS - Teleservice layer parameter --> IA5 encoded text is
       not correctly displayed. ([29]Bug 13065)
     *
     * Failure to dissect USB Audio feature unit descriptors missing the
       iFeature field. ([30]Bug 13085)
     * MSISDN not populated/decoded in JSON GTP-C decoding. ([31]Bug
       13086)
     * E212: 3 digits MNC are identified as 2 digits long if they end with
       a 0. ([32]Bug 13092)
     * Exception with last unknown Cisco AVP available in a SCCRQ message.
       ([33]Bug 13103)
     * TShark stalls on FreeBSD if androiddump is present. ([34]Bug 13104)
     * Dissector skips DICOM command. ([35]Bug 13110)
     * UUID (FT_GUID) filtering isn't working. ([36]Bug 13121)
     * Manufacturer name resolution fail. ([37]Bug 13126)
     * packet-sdp.c allocates transport_info->encoding_name from wrong
       memory pool. ([38]Bug 13127)
     * Payload type name for dynamic payload is wrong for reverse RTP
       channels. ([39]Bug 13132)

  New and Updated Features

   There are no new features in this release.

  New File Format Decoding Support

   There are no new file formats in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   6LoWPAN, AllJoyn, AMPQ, ANSI IS-637 A, BGP, CLNP, DCERPC, DICOM, DTN,
   E.212, EIGRP, ERF, GVSP, IEEE 802.11, IEEE 802.15.4, IP, ISO-8583,
   Kerberos, L2TP, LACP, MAC LTE, OpenFlow, Profinet I/O, RTPS, SCTP, SDP,
   Skype, SMPP, SNA, SNMP, SPNEGO, TCP, USB Audio, XML, and ZigBee

  New and Updated Capture File Support

  New and Updated Capture Interfaces support

   There are no new or updated capture interfaces supported in this
   release.

  Major API Changes

   There are no major API changes in this release.
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [40]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [41]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([42]Bug 1419)

   The BER dissector might infinitely loop. ([43]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([44]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([45]Bug 2234)

   Application crash when changing real-time option. ([46]Bug 4035)

   Packet list rows are oversized. ([47]Bug 4357)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([48]Bug 4985)

   Wireshark should let you work with multiple capture files. ([49]Bug
   10488)

   Dell Backup and Recovery (DBAR) makes many Windows applications crash,
   including Wireshark. ([50]Bug 12036)
     __________________________________________________________________

Getting Help

   Community support is available on [51]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [52]the web site.

   Official Wireshark training and certification are available from
   [53]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [54]Wireshark web site.
     __________________________________________________________________

   Last updated 2016-11-16 21:24:29 UTC

References

   1. https://www.wireshark.org/security/wnpa-sec-2016-58.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12851
   3. https://www.wireshark.org/security/wnpa-sec-2016-59.html
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12953
   5. https://www.wireshark.org/security/wnpa-sec-2016-60.html
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13071
   7. https://www.wireshark.org/security/wnpa-sec-2016-61.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13072
   9. https://www.wireshark.org/security/wnpa-sec-2016-62.html
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13097
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12724
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12579
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12632
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12712
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12746
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12831
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12838
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12855
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12982
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12984
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12986
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12993
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13013
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13021
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13023
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13031
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13037
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13060
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13065
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13085
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13086
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13092
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13103
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13104
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13110
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13121
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13126
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13127
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13132
  40. https://www.wireshark.org/download.html
  41. https://www.wireshark.org/download.html#thirdparty
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
  51. https://ask.wireshark.org/
  52. https://www.wireshark.org/lists/
  53. http://www.wiresharktraining.com/
  54. https://www.wireshark.org/faq.html


Digests

wireshark-2.2.2.tar.bz2: 32230208 bytes
SHA256(wireshark-2.2.2.tar.bz2)=f9acef5e9a9021a400b4244fafc06969f41ec594ec57fd7f0ff63bafca0055b3
RIPEMD160(wireshark-2.2.2.tar.bz2)=8aafc482c9ee55f18a0c57e7afaabeccc35a9551
SHA1(wireshark-2.2.2.tar.bz2)=b92a292b95e2ea010014364ff513d86afdc8e5a6
MD5(wireshark-2.2.2.tar.bz2)=88bb55bcbc5249fee10bcea332a4fece

Wireshark-win64-2.2.2.exe: 49242104 bytes
SHA256(Wireshark-win64-2.2.2.exe)=82f16ee36c52f6a6a499ba1da041dea9f42c57136db2f098ff3334111a2a551f
RIPEMD160(Wireshark-win64-2.2.2.exe)=6d601ac82d13e29f2cc8979ad4c67aa73a463876
SHA1(Wireshark-win64-2.2.2.exe)=922e4c64cacae067302af3c03925448b4220691d
MD5(Wireshark-win64-2.2.2.exe)=8beb53d8fcd80b40e0ed732fa041346d

Wireshark-win32-2.2.2.exe: 44413152 bytes
SHA256(Wireshark-win32-2.2.2.exe)=89b6dd104f5675cdd50a7122f11f96faef3f942e4acd9c76add96b321d00a7e3
RIPEMD160(Wireshark-win32-2.2.2.exe)=ff17090597168fbd203664fd47a4696c78b64d62
SHA1(Wireshark-win32-2.2.2.exe)=9385b558c121fe600d5b33cf4b7c81b465c76c8e
MD5(Wireshark-win32-2.2.2.exe)=f32e56954c79ac7377e3807b437ea135

WiresharkPortable_2.2.2.paf.exe: 45991128 bytes
SHA256(WiresharkPortable_2.2.2.paf.exe)=12d1213aa45488527b92bbebc59b53036d01759baea342707350134eb6fa8c0e
RIPEMD160(WiresharkPortable_2.2.2.paf.exe)=a828e0bfca53ba774f9b38e6acff47e9e4b72e90
SHA1(WiresharkPortable_2.2.2.paf.exe)=f50a56ebab5570a7dac52f98baa94f96a292bedd
MD5(WiresharkPortable_2.2.2.paf.exe)=764fc52150e9ae6aea561fb8c6cead30

Wireshark 2.2.2 Intel 64.dmg: 32842516 bytes
SHA256(Wireshark 2.2.2 Intel
64.dmg)=acbe9372ec868a673cd609523779a2bae836e1950536a328b5a688d2f1d603f7
RIPEMD160(Wireshark 2.2.2 Intel
64.dmg)=eab1c002eff37111a8877a0b473e13a7b8e2c371
SHA1(Wireshark 2.2.2 Intel 64.dmg)=ca778df467dd77c452b1dead476b2b1e5c9c9042
MD5(Wireshark 2.2.2 Intel 64.dmg)=e9cdf2b1c6db7b1eed1a769c61b1f769

Attachment: signature.asc
Description: OpenPGP digital signature