Wireshark-users: [Wireshark-users] Wireshark 2.2.12 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Thu, 11 Jan 2018 12:05:14 -0800
I'm proud to announce the release of Wireshark 2.2.12. __________________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________________ What's New Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2018-01 Multiple dissectors could crash. ([2]Bug 14253) [3]CVE-2018-5336 * [4]wnpa-sec-2018-02 The MRDISC dissector could crash. ([5]Bug 14299, [6]Bug 13707) [7]CVE-2017-17997 * [8]wnpa-sec-2018-03 The IxVeriWave file parser could crash. ([9]Bug 14297) [10]CVE-2018-5334 * [11]wnpa-sec-2018-04 The WCP dissector could crash. ([12]Bug 14251) [13]CVE-2018-5335 Prior to this release dumpcap enabled the Linux kernel's BPF JIT compiler via the net.core.bpf_jit_enable sysctl. This could make systems more vulnerable to Spectre variant 1 ([14]CVE-2017-5753) and this feature has been removed ([15]Bug 14313). The following bugs have been fixed: * First start with non-empty extcap folder after install or reboot hangs at "initializing tap listeners". ([16]Bug 12845) * SIP Statistics extract does not work. ([17]Bug 13942) * Service Response Time - SCSI dialog crashes. ([18]Bug 14144) * SOCKS pseudo header displays incorrect Version value. ([19]Bug 14262) * Only first variable of list is dissected in NTP Control request message. ([20]Bug 14268) * NTP Authenticator field dissection fails if padding is used. ([21]Bug 14269) * There is a potential buffer underflow in File_read_line function in epan/wslua/wslua_file.c file. ([22]Bug 14295) * Saving a temporary capture file may not result in the temporary file being removed. ([23]Bug 14298) New and Updated Features There are no new features in this release. New File Format Decoding Support There are no new file formats in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support MRDISC, NTP, SCTP, SOCKS, and WCP New and Updated Capture File Support Ixia IxVeriWave New and Updated Capture Interfaces support There are no new or updated capture interfaces supported in this release. Major API Changes There are no major API changes in this release. __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [24]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [25]download page on the Wireshark web site. __________________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([26]Bug 1419) The BER dissector might infinitely loop. ([27]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([28]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([29]Bug 2234) Application crash when changing real-time option. ([30]Bug 4035) Wireshark and TShark will display incorrect delta times in some cases. ([31]Bug 4985) Wireshark should let you work with multiple capture files. ([32]Bug 10488) __________________________________________________________________ Getting Help Community support is available on [33]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [34]the web site. Official Wireshark training and certification are available from [35]Wireshark University. __________________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [36]Wireshark web site. __________________________________________________________________ Last updated 2018-01-11 17:57:46 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2018-01.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14253 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5336 4. https://www.wireshark.org/security/wnpa-sec-2018-02.html 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14299 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13707 7. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17997 8. https://www.wireshark.org/security/wnpa-sec-2018-03.html 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14297 10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5334 11. https://www.wireshark.org/security/wnpa-sec-2018-04.html 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14251 13. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5335 14. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14313 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12845 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13942 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14144 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14262 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14268 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14269 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14295 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14298 24. https://www.wireshark.org/download.html 25. https://www.wireshark.org/download.html#thirdparty 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 33. https://ask.wireshark.org/ 34. https://www.wireshark.org/lists/ 35. http://www.wiresharktraining.com/ 36. https://www.wireshark.org/faq.html Digests wireshark-2.2.12.tar.bz2: 32387381 bytes SHA256(wireshark-2.2.12.tar.bz2)=3274458d1bb1658a5001465ecb07c7cbfc709571ef36bd062897570d4bab3ebc RIPEMD160(wireshark-2.2.12.tar.bz2)=782cf5218d79af35087ca2f8087bc54ffeede65c SHA1(wireshark-2.2.12.tar.bz2)=a52419a1b0b922448f56a271d0f8d725d2e62caf Wireshark-win32-2.2.12.exe: 44651848 bytes SHA256(Wireshark-win32-2.2.12.exe)=42b520e2b5003963e399f97eb23ad74a49ad0562b94558db32d2ceb07e0c0fae RIPEMD160(Wireshark-win32-2.2.12.exe)=7d0ff3681107d42521f1a53d675f41f939cefdd5 SHA1(Wireshark-win32-2.2.12.exe)=6da2e58d8a2d86af9f0caff736afe5dee4805fcd Wireshark-win64-2.2.12.exe: 56155344 bytes SHA256(Wireshark-win64-2.2.12.exe)=95ef0011ab04ed2a52eb5f4c26d4ccede262c4441b80337a494c8e97f7b117b7 RIPEMD160(Wireshark-win64-2.2.12.exe)=b47a00664354941edfce7a3d95a0f22c3d5195ec SHA1(Wireshark-win64-2.2.12.exe)=9f5a3bf2ad8e6f5abb6578c625a04f3570ffc815 WiresharkPortable_2.2.12.paf.exe: 46291296 bytes SHA256(WiresharkPortable_2.2.12.paf.exe)=b729074a6e93eed3e80c117e3a950a805d7df6e24afbac13d0275ad1969233b1 RIPEMD160(WiresharkPortable_2.2.12.paf.exe)=207a94534b4d55a65b89592be9106ed2158acce6 SHA1(WiresharkPortable_2.2.12.paf.exe)=6331c88a6d2ae9cc0668572a5d778e5f791fe18f Wireshark 2.2.12 Intel 64.dmg: 33526164 bytes SHA256(Wireshark 2.2.12 Intel 64.dmg)=8a4bdc2d917df1c7f751c1ebbbdcfc1c074864f3e623fc4648016a65c4511e80 RIPEMD160(Wireshark 2.2.12 Intel 64.dmg)=6c631b55677ccc0b2f58c8577a91f7404290d308 SHA1(Wireshark 2.2.12 Intel 64.dmg)=572d72fa4ba524d471cbff8913d4ede8567c5f83 You can validate these hashes using the following commands (among others): Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256 Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg" Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: Re: [Wireshark-users] List and Select Dissectors using Tshark
- Next by Date: [Wireshark-users] Wireshark 2.4.4 is now available
- Previous by thread: Re: [Wireshark-users] List and Select Dissectors using Tshark
- Next by thread: [Wireshark-users] Wireshark 2.4.4 is now available
- Index(es):