Wireshark-announce: [Wireshark-announce] Wireshark 2.0.1 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Tue, 29 Dec 2015 14:48:31 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 2.0.1. __________________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________________ What's New Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2015-31 NBAP dissector crashes. ([2]Bug 11602, [3]Bug 11835, [4]Bug 11841) * [5]wnpa-sec-2015-37 NLM dissector crash. * [6]wnpa-sec-2015-39 BER dissector crash. * [7]wnpa-sec-2015-40 Zlib decompression crash. ([8]Bug 11548) * [9]wnpa-sec-2015-41 SCTP dissector crash. ([10]Bug 11767) * [11]wnpa-sec-2015-42 802.11 decryption crash. ([12]Bug 11790, [13]Bug 11826) * [14]wnpa-sec-2015-43 DIAMETER dissector crash. ([15]Bug 11792) * [16]wnpa-sec-2015-44 VeriWave file parser crashes. ([17]Bug 11789, [18]Bug 11791) * [19]wnpa-sec-2015-45 RSVP dissector crash. ([20]Bug 11793) * [21]wnpa-sec-2015-46 ANSI A & GSM A dissector crashes. ([22]Bug 11797) * [23]wnpa-sec-2015-47 Ascend file parser crash. ([24]Bug 11794) * [25]wnpa-sec-2015-48 NBAP dissector crash. ([26]Bug 11815) * [27]wnpa-sec-2015-49 RSL dissector crash. ([28]Bug 11829) * [29]wnpa-sec-2015-50 ZigBee ZCL dissector crash. ([30]Bug 11830) * [31]wnpa-sec-2015-51 Sniffer file parser crash. ([32]Bug 11827) * [33]wnpa-sec-2015-52 NWP dissector crash. ([34]Bug 11726) * [35]wnpa-sec-2015-53 BT ATT dissector crash. ([36]Bug 11817) * [37]wnpa-sec-2015-54 MP2T file parser crash. ([38]Bug 11820) * [39]wnpa-sec-2015-55 MP2T file parser crash. ([40]Bug 11821) * [41]wnpa-sec-2015-56 S7COMM dissector crash. ([42]Bug 11823) * [43]wnpa-sec-2015-57 IPMI dissector crash. ([44]Bug 11831) * [45]wnpa-sec-2015-58 TDS dissector crash. ([46]Bug 11846) * [47]wnpa-sec-2015-59 PPI dissector crash. ([48]Bug 11876) * [49]wnpa-sec-2015-60 MS-WSP dissector crash. ([50]Bug 11931) The Windows installers are now built using NSIS 2.50 in order to avoid [51]DLL hijacking flaws. The following bugs have been fixed: * Zooming out (Ctrl+-) too far crashes Wireshark. ([52]Bug 8854) * IPv6 Mobility Header Link-Layer Address Mobility Option is parsed incorrectly. ([53]Bug 10627) * About -> Plugins should be a scrollable. ([54]Bug 11427) * Profile change leaves prior profile residue. ([55]Bug 11493) * Wireshark crashes when using the VoIP player. ([56]Bug 11596) * Incorrect presentation of Ascend-Data-Filter (RADIUS attribute 242). ([57]Bug 11630) * Not possible to stop a capture with invalid filter. ([58]Bug 11667) * "No interface selected" when having a valid capture filter. ([59]Bug 11671) * Malformed packet with IPv6 mobility header. ([60]Bug 11728) * Wireshark crashes dissecting Profinet NRT (DCE-RPC) packet. ([61]Bug 11730) * All fields in the packet detail pane of a "new packet" window are expanded by default. ([62]Bug 11731) * Malformed packets with SET_CUR in the USBVIDEO (UVC) decoding. ([63]Bug 11736) * Display filters arranges columns incorrectly. ([64]Bug 11737) * Scrolling and navigating using the trackpad on Mac OS X could be much better. ([65]Bug 11738) * Lua Proto() does not validate arguments. ([66]Bug 11739) * Pointers to deallocated memory when redissecting. ([67]Bug 11740) * Suggestion for re-phrasing the TCP Window Full message. ([68]Bug 11741) * Can't parse MPEG-2 Transport Streams generated by the Logik L26DIGB21 TV. ([69]Bug 11749) * Qt UI on Windows crashes when changing to next capture file. ([70]Bug 11756) * First displayed frame not updated when changing profile. ([71]Bug 11757) * LDAP decode shows invalid number of results for searchResEntry packets. ([72]Bug 11761) * Crash when escape to Follow TCP -> Save. ([73]Bug 11763) * USBPcap prevents mouse and keyboard from working. ([74]Bug 11766) * Y-axis in RTP graph is in microseconds. ([75]Bug 11784) * "Delta time displayed" column in Wireshark doesn't work well, but Wireshark-gtk does. ([76]Bug 11786) * UDP 12001 SNA Data no longer shown in EBCDIC. ([77]Bug 11787) * Wireshark Portable is not starting (no messages at all). ([78]Bug 11800) * IPv6 RPL Routing Header with length of 8 bytes still reads an address. ([79]Bug 11803) * g_utf8_validate assertion when reassembling GSM SMS messages encoded in UCS2. ([80]Bug 11809) * Calling plugin_if_goto_frame when there is no file loaded causes a Protection Exception. ([81]Bug 11810) * Qt UI SIGSEGV before main() in initializer for colors_. ([82]Bug 11833) * Unable to add a directory to "GeoIP Database Paths". ([83]Bug 11842) * C++ Run time error when filtering on Expert limit to display filter. ([84]Bug 11848) * Widening the window doesn't correctly widen the rightmost column. ([85]Bug 11849) * SSL V2 Client Hello no longer dissected in Wireshark 2.0. ([86]Bug 11851) * PacketBB (RFC5444) dissector displays IPv4 addresses incorrectly. ([87]Bug 11852) * SMTP over port 587 shows identical content for fields "Username" and "Password" when not decoding base-64-encoded authentication information. ([88]Bug 11853) * Converting of EUI64 address to string does not take offset into account. ([89]Bug 11856) * CIP segment dissection causes PDML assertion/failure. ([90]Bug 11863) * In Import from Hex Dump, an attempt to enter the timestamp format manually crashes the application. ([91]Bug 11873) * Follow Stream directional selector not readable. ([92]Bug 11887) * Coloring rule custom colors not saved. ([93]Bug 11888) * Total number of streams not correct in Follow TCP Stream dialog. ([94]Bug 11889) * Command line switch -Y for display filter does not work. ([95]Bug 11891) * Creating Debian package doesn't work. ([96]Bug 11893) * Visual C++ Runtime Library Error "The application has requested the Runtime to terminate it in an unusual way." when you do not wait until Conversations is completely updated before applying "Limit to display filter". ([97]Bug 11900) * dpkg-buildpackage relocation R_X86_64_PC32 against symbol. ([98]Bug 11901) * Bits view in Packet Bytes pane is not persistent. ([99]Bug 11903) * ICMP Timestamp days, hours, minutes, seconds is incorrect. ([100]Bug 11910) * MPEG2TS NULL pkt: AFC: "Should be 0 for NULL packets" wrong. ([101]Bug 11921) New and Updated Features There are no new features in this release. New File Format Decoding Support There are no new file formats in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support 6LoWPAN, ANSI A, ASN.1 BER, BT ATT, CIP, CLNP, DIAMETER, DNS, ENIP, ERF, GSM A, GSM SMS, HiSLIP, ICMP, IEEE 802.11, IEEE 802.11 Radio, IPMI, IPv4, IPv6, ISUP, L2TP, LDAP, Link (ethertype), MIP6, MP2T, MS-WSP, NBAP, NWP, PacketBB, PPI, QUIC, RADIUS, RSL, RSVP, S7COMM, SCSI, SCTP, SMTP, SSL, TCP, TDS, USB, VRT, and ZigBee ZCL New and Updated Capture File Support Ascend, ERF, MP2T, Sniffer, and VeriWave New and Updated Capture Interfaces support There are no new or updated capture interfaces supported in this release. __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [102]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [103]download page on the Wireshark web site. __________________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([104]Bug 1419) The BER dissector might infinitely loop. ([105]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([106]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([107]Bug 2234) Resolving ([108]Bug 9044) reopens ([109]Bug 3528) so that Wireshark no longer automatically decodes gzip data when following a TCP stream. Application crash when changing real-time option. ([110]Bug 4035) Hex pane display issue after startup. ([111]Bug 4056) Packet list rows are oversized. ([112]Bug 4357) Wireshark and TShark will display incorrect delta times in some cases. ([113]Bug 4985) The 64-bit version of Wireshark will leak memory on Windows when the display depth is set to 16 bits ([114]Bug 9914) Wireshark should let you work with multiple capture files. ([115]Bug 10488) __________________________________________________________________ Getting Help Community support is available on [116]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [117]the web site. Official Wireshark training and certification are available from [118]Wireshark University. __________________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [119]Wireshark web site. __________________________________________________________________ Last updated 2015-12-29 19:26:11 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2015-31.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11602 3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11835 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11841 5. https://www.wireshark.org/security/wnpa-sec-2015-37.html 6. https://www.wireshark.org/security/wnpa-sec-2015-39.html 7. https://www.wireshark.org/security/wnpa-sec-2015-40.html 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11548 9. https://www.wireshark.org/security/wnpa-sec-2015-41.html 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11767 11. https://www.wireshark.org/security/wnpa-sec-2015-42.html 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11790 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11826 14. https://www.wireshark.org/security/wnpa-sec-2015-43.html 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11792 16. https://www.wireshark.org/security/wnpa-sec-2015-44.html 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11789 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11791 19. https://www.wireshark.org/security/wnpa-sec-2015-45.html 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11793 21. https://www.wireshark.org/security/wnpa-sec-2015-46.html 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11797 23. https://www.wireshark.org/security/wnpa-sec-2015-47.html 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794 25. https://www.wireshark.org/security/wnpa-sec-2015-48.html 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11815 27. https://www.wireshark.org/security/wnpa-sec-2015-49.html 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829 29. https://www.wireshark.org/security/wnpa-sec-2015-50.html 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11830 31. https://www.wireshark.org/security/wnpa-sec-2015-51.html 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11827 33. https://www.wireshark.org/security/wnpa-sec-2015-52.html 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11726 35. https://www.wireshark.org/security/wnpa-sec-2015-53.html 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11817 37. https://www.wireshark.org/security/wnpa-sec-2015-54.html 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11820 39. https://www.wireshark.org/security/wnpa-sec-2015-55.html 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11821 41. https://www.wireshark.org/security/wnpa-sec-2015-56.html 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11823 43. https://www.wireshark.org/security/wnpa-sec-2015-57.html 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11831 45. https://www.wireshark.org/security/wnpa-sec-2015-58.html 46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11846 47. https://www.wireshark.org/security/wnpa-sec-2015-59.html 48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11876 49. https://www.wireshark.org/security/wnpa-sec-2015-60.html 50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11931 51. http://nsis.sourceforge.net/Docs/AppendixF.html 52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8854 53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10627 54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11427 55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11493 56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11596 57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11630 58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11667 59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11671 60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11728 61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11730 62. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11731 63. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11736 64. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11737 65. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11738 66. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11739 67. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11740 68. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11741 69. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11749 70. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11756 71. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11757 72. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11761 73. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11763 74. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11766 75. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11784 76. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11786 77. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11787 78. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11800 79. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11803 80. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11809 81. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11810 82. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11833 83. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11842 84. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11848 85. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11849 86. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11851 87. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11852 88. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11853 89. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11856 90. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11863 91. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11873 92. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11887 93. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11888 94. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11889 95. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11891 96. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11893 97. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11900 98. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11901 99. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11903 100. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11910 101. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11921 102. https://www.wireshark.org/download.html 103. https://www.wireshark.org/download.html#thirdparty 104. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 105. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 106. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 107. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 108. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044 109. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528 110. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 111. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 112. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 113. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 114. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9914 115. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 116. https://ask.wireshark.org/ 117. https://www.wireshark.org/lists/ 118. http://www.wiresharktraining.com/ 119. https://www.wireshark.org/faq.html Digests wireshark-2.0.1.tar.bz2: 31016295 bytes SHA256(wireshark-2.0.1.tar.bz2)=c9bd07dd0d0045d6ca7537390a1afbcdf33716d193ea7d7084ae4f6c30b683ab RIPEMD160(wireshark-2.0.1.tar.bz2)=0a83fb6d2c74005840492d0811a4eca29b565602 SHA1(wireshark-2.0.1.tar.bz2)=6703221128305ac33802f0da13d368476ce90688 MD5(wireshark-2.0.1.tar.bz2)=c1610ab2238965363b811e5188750fb1 Wireshark-win64-2.0.1.exe: 47333544 bytes SHA256(Wireshark-win64-2.0.1.exe)=5c5c9668d0254d183ef94eaaab2ca35e1376ae1bac3f10b21ccf5e14eaafb045 RIPEMD160(Wireshark-win64-2.0.1.exe)=06fc6a95a6a93d4287e4cb4fcbe1f584c8a393d8 SHA1(Wireshark-win64-2.0.1.exe)=27e290b4647adeb51a714d7a831ef88702b518da MD5(Wireshark-win64-2.0.1.exe)=8a05505aae3807d554a394c8f86ca4ac Wireshark-win32-2.0.1.exe: 43764688 bytes SHA256(Wireshark-win32-2.0.1.exe)=03a1d405bdcace6d64d9c743bf544079b4e2eeb1f79c87440c38b5790950beb1 RIPEMD160(Wireshark-win32-2.0.1.exe)=c3f4c13257e4a9a5a637b23e15a90bd0463fce7f SHA1(Wireshark-win32-2.0.1.exe)=7407cb02091e84f7f329782a5802f1b3b27d9ec9 MD5(Wireshark-win32-2.0.1.exe)=2841bc0a430f1ac575c98f4dce83deb4 WiresharkPortable_2.0.1.paf.exe: 43353168 bytes SHA256(WiresharkPortable_2.0.1.paf.exe)=66d3b81295bc8860cb766668c4b59e73220d799c52224460422c094d82a78889 RIPEMD160(WiresharkPortable_2.0.1.paf.exe)=c8dddc54f2bdd7a084ca746db67fe1cf4e123cea SHA1(WiresharkPortable_2.0.1.paf.exe)=8c80e59338aedcb353fa40f028936c336ec478df MD5(WiresharkPortable_2.0.1.paf.exe)=ec0f68ea58a6242637892c5fb39e8fde Wireshark 2.0.1 Intel 64.dmg: 31559961 bytes SHA256(Wireshark 2.0.1 Intel 64.dmg)=8c84d745bb8ab930a8f47fd1e4388300def9afbea90aed449558c8189508b9ea RIPEMD160(Wireshark 2.0.1 Intel 64.dmg)=be4cb9fbf0f80dd9c17c16ed3a6df6461cd10dd8 SHA1(Wireshark 2.0.1 Intel 64.dmg)=06d300e50cd20bed1b6e13872c390663d717063f MD5(Wireshark 2.0.1 Intel 64.dmg)=04f046a920113c0136d8d75fdc9870ee Wireshark 2.0.1 Intel 32.dmg: 32320570 bytes SHA256(Wireshark 2.0.1 Intel 32.dmg)=244a20142069f238e5f9696af726880df0233b01462ab5028bfff9dd99f81964 RIPEMD160(Wireshark 2.0.1 Intel 32.dmg)=f50e433f16f9417a9c66c4376ab7c298b6b5be9a SHA1(Wireshark 2.0.1 Intel 32.dmg)=6682044bc8b7c33e7eed8814401bd4a0efb84c48 MD5(Wireshark 2.0.1 Intel 32.dmg)=df7cdee3ef17d81611d1a4dfeca00f4a -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEYEARECAAYFAlaDDb8ACgkQpw8IXSHylJrnpQCdHlELBj9/8+vquQ7FgDwFNp5C +58AnijP/UDAZqXtetaYAeP3NyaQwfoj =hrtV -----END PGP SIGNATURE-----
- Next by Date: [Wireshark-announce] Wireshark 1.12.9 is now available
- Next by thread: [Wireshark-announce] Wireshark 1.12.9 is now available
- Index(es):