Wireshark-announce: [Wireshark-announce] Wireshark 2.4.9 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 29 Aug 2018 12:04:44 -0700
I'm proud to announce the release of Wireshark 2.4.9. __________________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________________ What's New Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2018-44 Bluetooth AVDTP dissector crash. [2]Bug 14884. [3]CVE-2018-16058. * [4]wnpa-sec-2018-45 Bluetooth Attribute Protocol dissector crash. [5]Bug 14994. [6]CVE-2018-16056. * [7]wnpa-sec-2018-46 Radiotap dissector crash. [8]Bug 15022. [9]CVE-2018-16057. The following bugs have been fixed: * Incorrect presentation of dissected data item (NETMASK) in ISAKMP dissector. [10]Bug 14987. * udpdump frame too long error. [11]Bug 14989. * ASTERIX Category 062 / 135 Altitude has wrong value. [12]Bug 15030. * Wireshark cannot decrypt SSL/TLS session if it was proxied over HTTP tunnel. [13]Bug 15042. * TLS records in a HTTP tunnel are displayed as "Encrypted Handshake Message". [14]Bug 15043. * BTATT Dissector: Temperature Measurement: Celsius and Fahrenheit swapped. [15]Bug 15058. * Diameter AVP User Location Info, Mobile Network Code decoded not correctly. [16]Bug 15068. * Heartbeat message "Info" displayed without comma separator. [17]Bug 15079. * DTAP CC Start DTMF keypad information parsing error. [18]Bug 15088. New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support ASTERIX, Bluetooth ATT, Bluetooth AVDTP, DHCP, DTLS, E.212, HTTP, ISAKMP, K12, Nordic BLE, Radiotap, and SSL New and Updated Capture File Support pcapng New and Updated Capture Interfaces support ciscodump udpdump __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [19]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [20]download page on the Wireshark web site. __________________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([21]Bug 1419) The BER dissector might infinitely loop. ([22]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([23]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([24]Bug 2234) Application crash when changing real-time option. ([25]Bug 4035) Wireshark and TShark will display incorrect delta times in some cases. ([26]Bug 4985) Wireshark should let you work with multiple capture files. ([27]Bug 10488) __________________________________________________________________ Getting Help Community support is available on [28]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [29]the web site. Official Wireshark training and certification are available from [30]Wireshark University. __________________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [31]Wireshark web site. __________________________________________________________________ Last updated 2018-08-29 16:51:51 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2018-44.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14884 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058 4. https://www.wireshark.org/security/wnpa-sec-2018-45.html 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14994 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056 7. https://www.wireshark.org/security/wnpa-sec-2018-46.html 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14987 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14989 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15030 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15042 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15043 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15058 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15068 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15079 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15088 19. https://www.wireshark.org/download.html 20. https://www.wireshark.org/download.html#thirdparty 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 28. https://ask.wireshark.org/ 29. https://www.wireshark.org/lists/ 30. http://www.wiresharktraining.com/ 31. https://www.wireshark.org/faq.html Digests wireshark-2.4.9.tar.xz: 29094756 bytes SHA256(wireshark-2.4.9.tar.xz)=63c4f24665269536f0e2ec321d394336fef6ba12466241a0e2433e936ac633e3 RIPEMD160(wireshark-2.4.9.tar.xz)=410212dcbcac97dd9942f947ad34419779ee3e1d SHA1(wireshark-2.4.9.tar.xz)=631db6203d21ca5512b8bf6b9239e48d6b492b53 Wireshark-win32-2.4.9.exe: 52756664 bytes SHA256(Wireshark-win32-2.4.9.exe)=15b60c8cda9ec0812c64160f4813ef681d4adcf6fae4dd251634c02875f813fd RIPEMD160(Wireshark-win32-2.4.9.exe)=a8581d13814e43e5d245325f3d2cafb566697df9 SHA1(Wireshark-win32-2.4.9.exe)=97a50913671ef8a2c5d9be835ca42b4bb0ee5025 Wireshark-win64-2.4.9.exe: 57971840 bytes SHA256(Wireshark-win64-2.4.9.exe)=05d6631a9a9bcaeea117ae39be2578b7faf2d5d3b22d85c9cfb93c09fa9e4aa3 RIPEMD160(Wireshark-win64-2.4.9.exe)=7e62a320384af7724883f29778687fbed39de249 SHA1(Wireshark-win64-2.4.9.exe)=b344d04cff80f7a4546e83b690092fb18a2ae963 Wireshark-win32-2.4.9.msi: 42008576 bytes SHA256(Wireshark-win32-2.4.9.msi)=ce3ee23968b5bb6985a3e0b04ea17ea4d0eeec4cb97c4d24eb06073281d36c17 RIPEMD160(Wireshark-win32-2.4.9.msi)=bf24cea6f0525f5c2b9503655039bddb51c584b7 SHA1(Wireshark-win32-2.4.9.msi)=57c79bcb5d39b8d30c88f34dfba7dbb53455983f Wireshark-win64-2.4.9.msi: 47075328 bytes SHA256(Wireshark-win64-2.4.9.msi)=79529af55a04940e6e8c93324189ba1c47c7bae900ff730e4d182179bcebd043 RIPEMD160(Wireshark-win64-2.4.9.msi)=e49919ca51a168789bef6d6fc42144956db3089c SHA1(Wireshark-win64-2.4.9.msi)=8489b8a3e192bebec3f0da98d10937c48dc8de59 WiresharkPortable_2.4.9.paf.exe: 45431688 bytes SHA256(WiresharkPortable_2.4.9.paf.exe)=ed5e185adb6a1265b6ca536cea755494e52770a89c33c615286cb66e8720d9e8 RIPEMD160(WiresharkPortable_2.4.9.paf.exe)=7631187b5126f0bdf0372e652b4dbe329b96ed91 SHA1(WiresharkPortable_2.4.9.paf.exe)=117e3e28b07888f6b87a486f86c50d01b1bd3801 Wireshark 2.4.9 Intel 64.dmg: 42532464 bytes SHA256(Wireshark 2.4.9 Intel 64.dmg)=52869e0ab8e85a949512c334c622f5250248623630a89b4dd70298fd3bf92a65 RIPEMD160(Wireshark 2.4.9 Intel 64.dmg)=6f52debc382057cbbf076c3b77bea82a49fd690b SHA1(Wireshark 2.4.9 Intel 64.dmg)=fb4177f8b015d7482b33eea88f908f0f64f96caa You can validate these hashes using the following commands (among others): Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256 Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg" Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
signature.asc
Description: OpenPGP digital signature
- Next by Date: [Wireshark-announce] Wireshark 2.6.3 is now available
- Next by thread: [Wireshark-announce] Wireshark 2.6.3 is now available
- Index(es):