ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-announce: [Wireshark-announce] Wireshark 2.2.9 is now available

From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 29 Aug 2017 12:29:23 -0700
I'm proud to announce the release of Wireshark 2.2.9.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2017-38
       MSDP dissector infinite loop ([2]Bug 13933)
     * [3]wnpa-sec-2017-39
       Profinet I/O buffer overrun ([4]Bug 13847)
     * [5]wnpa-sec-2017-41
       IrCOMM dissector buffer overrun ([6]Bug 13929)

   The following bugs have been fixed:
     * Confusing "Apply a display filter <Command/>" keyboard shortcut.
       ([7]Bug 12450)
     * VNC Protocol disector : Framebuffer Updates. ([8]Bug 13910)
     * DNS LOC RRs with out-of-range longitude or latitude aren't shown as
       errors. ([9]Bug 13914)
     * DIS Dissector Entity Appearance Record displayed in wrong location.
       ([10]Bug 13917)
     * Win64 CMake bug - (CYGWIN_INSTALL_PATH redefinition) causing
       missing packages when using CMake 3.9.0. ([11]Bug 13922)
     * APL records parsed incorrectly for IPv4 prefixes. ([12]Bug 13923)
     * TCAP SRT Analysis incorrectly matched TCAP begins and ends.
       ([13]Bug 13926)
     * E.212: Check length before trying 3-digits MNC. ([14]Bug 13935)
     * Crash in Wireshark using Dumper:dump() from Lua. ([15]Bug 13944)
     * GTPv2 - decoding issue for Packet Flow ID (type 123). ([16]Bug
       13987)
     * [oss-fuzz] BGP memleak: ASAN: 276 byte(s) leaked in 5
       allocation(s). ([17]Bug 13995)
     * Some Infiniband Connect Req fields are not decoded correctly.
       ([18]Bug 13997)
     * 802.11 wlan.ft.subelem.r0kh_id should be sequence of bytes.
       ([19]Bug 14004)

  New and Updated Features

   There are no new features in this release.

  New File Format Decoding Support

   There are no new file formats in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   APL, BGP, DIS, DNS, E.212, GTPv2, IEEE 802.11, InfiniBand, MSDP, MTP2,
   pcapng MIME, Profinet I/O, SML, TCAP, and VNC

  New and Updated Capture File Support

   There is no new or updated capture file support in this release.

  New and Updated Capture Interfaces support

   There are no new or updated capture interfaces supported in this
   release.

  Major API Changes

   There are no major API changes in this release.
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [20]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [21]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([22]Bug 1419)

   The BER dissector might infinitely loop. ([23]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([24]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([25]Bug 2234)

   Application crash when changing real-time option. ([26]Bug 4035)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([27]Bug 4985)

   Wireshark should let you work with multiple capture files. ([28]Bug
   10488)

   Dell Backup and Recovery (DBAR) makes many Windows applications crash,
   including Wireshark. ([29]Bug 12036)
     __________________________________________________________________

Getting Help

   Community support is available on [30]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [31]the web site.

   Official Wireshark training and certification are available from
   [32]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [33]Wireshark web site.
     __________________________________________________________________

   Last updated 2017-08-29 18:55:45 UTC

References

   1. https://www.wireshark.org/security/wnpa-sec-2017-38.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13933
   3. https://www.wireshark.org/security/wnpa-sec-2017-39.html
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13847
   5. https://www.wireshark.org/security/wnpa-sec-2017-41.html
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12450
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13910
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13914
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13917
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13922
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13923
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13926
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13935
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13944
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13987
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13995
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13997
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14004
  20. https://www.wireshark.org/download.html
  21. https://www.wireshark.org/download.html#thirdparty
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
  30. https://ask.wireshark.org/
  31. https://www.wireshark.org/lists/
  32. http://www.wiresharktraining.com/
  33. https://www.wireshark.org/faq.html


Digests

wireshark-2.2.9.tar.bz2: 32341866 bytes
SHA256(wireshark-2.2.9.tar.bz2)=c8b32c0e7d44a277e737c53d9d142ad3fe4265338f25a7fd8c891f58a7633fc2
RIPEMD160(wireshark-2.2.9.tar.bz2)=d8e0860b02d9dc2019f5c759b53330c12b18f73e
SHA1(wireshark-2.2.9.tar.bz2)=9a2331260ed04d44438ce6ba54e50a03f6bb42ef
MD5(wireshark-2.2.9.tar.bz2)=7d5e65efd0714bd6248aa5b36c28320d

Wireshark-win32-2.2.9.exe: 44575304 bytes
SHA256(Wireshark-win32-2.2.9.exe)=34219f5dcecb2d8ab5408a3209a3670e6c8ceb83e09180c254df9c9ffae886e0
RIPEMD160(Wireshark-win32-2.2.9.exe)=59b77e03ffe21ab516919131152cbad937e56dc1
SHA1(Wireshark-win32-2.2.9.exe)=e2b9e0a07fc1cccf2e27eef8597bc883fa0380a7
MD5(Wireshark-win32-2.2.9.exe)=440a6b85d06224bb6bdd28bbcaa1a852

Wireshark-win64-2.2.9.exe: 49416424 bytes
SHA256(Wireshark-win64-2.2.9.exe)=e72b438ab7fab5f3bc9ecfad1ed4b9a2c84da93f6fd030c15c9ce501589f52b1
RIPEMD160(Wireshark-win64-2.2.9.exe)=40992207f5a4befbf5b74c70cb6bcf360b8964dc
SHA1(Wireshark-win64-2.2.9.exe)=77c2833a3c34ffcf71dfd17f92a212892e2b50fc
MD5(Wireshark-win64-2.2.9.exe)=39057d440f55e6d55656ad5bb414fff8

WiresharkPortable_2.2.9.paf.exe: 46183576 bytes
SHA256(WiresharkPortable_2.2.9.paf.exe)=3c3e957a0e9d6d7cefb9aadf91896b4ef2c4d6744dde2acd98a8acfef922f207
RIPEMD160(WiresharkPortable_2.2.9.paf.exe)=e550fb46fe01c92baeda19b69246f746481a00aa
SHA1(WiresharkPortable_2.2.9.paf.exe)=9555582276564330e4150f7e334957edda4b6819
MD5(WiresharkPortable_2.2.9.paf.exe)=ef0b4c220edc37a4c7a70b62c8a58826

Wireshark 2.2.9 Intel 64.dmg: 33495444 bytes
SHA256(Wireshark 2.2.9 Intel
64.dmg)=7aa53742256e8fa4e079bb1854789ecf36f77cff0704ccea841dff9298912b21
RIPEMD160(Wireshark 2.2.9 Intel
64.dmg)=db1769a8b73937ed523e45c57894c1cc476bb019
SHA1(Wireshark 2.2.9 Intel 64.dmg)=dfc50237988221b0e8ead35fe04b3b1240f186bd
MD5(Wireshark 2.2.9 Intel 64.dmg)=4a44625406114628a6deab81b6257071

Attachment: signature.asc
Description: OpenPGP digital signature