Wireshark-announce: [Wireshark-announce] Wireshark 2.6.11 is now available

From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 11 Sep 2019 15:38:50 -0700
I'm proud to announce the release of Wireshark 2.6.11.


 What is Wireshark?

  Wireshark is the world’s most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What’s New

  Bug Fixes

   The following vulnerabilities have been fixed:

     • wnpa-sec-2019-21[1] Gryphon dissector infinite loop. Bug
       16020[2].

   The following bugs have been fixed:

     • Coloring Rules dialog - enable/disable coloring rule issues. Bug
       15153[3].

     • Enabling Time-Of-Day in IO Graph causes the x-axis origin to be
       set to 01.01.1970. Bug 15247[4].

     • Tshark outputs two data rate instead of one. Bug 15928[5].

     • Typo in checkbox label at bottom of sshdump configuration screen
       (save parameters). Bug 15929[6].

     • Pane configuration inconsistencies. Bug 15976[7].

     • Packet Bytes highlight for dns.qry.name.len and dns.count.labels
       off by one. Bug 15999[8].

     • Segmentation fault in nfs_name_snoop_fh. Bug 16017[9].

     • Changing the protocol preferences caused a crash. Bug 16019[10].

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   BACnet, DNS, FC-dNS, Gryphon, NFS, and Radiotap

  New and Updated Capture File Support

   CommView and PacketLogger

  New and Updated Capture Interfaces support

   There is no new or updated capture file support in this release.

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html[11].

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[12] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use About→Folders to
  find the default locations on your system.

 Known Problems

  The BER dissector might infinitely loop. Bug 1516[13].

  Capture filters aren’t applied when capturing from named pipes. Bug
  1814[14].

  Filtering tshark captures with read filters (-R) no longer works. Bug
  2234[15].

  Application crash when changing real-time option. Bug 4035[16].

  Wireshark and TShark will display incorrect delta times in some cases.
  Bug 4985[17].

  Wireshark should let you work with multiple capture files. Bug
  10488[18].

 Getting Help

  Community support is available on Wireshark’s Q&A site[19] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark’s mailing lists can be found on the web site[20].

  Official Wireshark training and certification are available from
  Wireshark University[21].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[22].

  Last updated 2019-09-11 17:39:48 UTC

 References

   1. https://www.wireshark.org/security/wnpa-sec-2019-21
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020
   3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15153
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15247
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15928
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15929
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15976
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15999
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16017
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16019
  11. https://www.wireshark.org/download.html
  12. https://www.wireshark.org/download.html#thirdparty
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  19. https://ask.wireshark.org/
  20. https://www.wireshark.org/lists/
  21. http://www.wiresharktraining.com/
  22. https://www.wireshark.org/faq.html


Digests

wireshark-2.6.11.tar.xz: 28480628 bytes
SHA256(wireshark-2.6.11.tar.xz)=29751581c8549562957940e68f0b9410a499616c91c1768195bc02def13f5a85
RIPEMD160(wireshark-2.6.11.tar.xz)=a94e93c8222acd36ed320365d3fbd0cd36b40b3d
SHA1(wireshark-2.6.11.tar.xz)=60549213e862dde2245f9b8d8187227723671f17

Wireshark-win64-2.6.11.exe: 59675280 bytes
SHA256(Wireshark-win64-2.6.11.exe)=7e0bfd3986b341d7cb81415bc8fa508087663dd9fae94c8488120f33e9141993
RIPEMD160(Wireshark-win64-2.6.11.exe)=5ccefd4bd2ee88def83d86b30b6db272ba3a5c0d
SHA1(Wireshark-win64-2.6.11.exe)=36bed513da91cdc320ea4ad1af6c7a0956e4ad83

Wireshark-win32-2.6.11.exe: 54033112 bytes
SHA256(Wireshark-win32-2.6.11.exe)=eed1198b6f063a9e4d2c8849fed7c0527ac6e34561e93ffcb66651fd65ff684e
RIPEMD160(Wireshark-win32-2.6.11.exe)=606b47935db4c7b6420abef81635975d95463811
SHA1(Wireshark-win32-2.6.11.exe)=904d68c8a6b94d8d98b7943be04b1ba925a00067

Wireshark-win64-2.6.11.msi: 49156096 bytes
SHA256(Wireshark-win64-2.6.11.msi)=4ff34c3187eb59a2681144c45a70769b6778d1e29f02e8509f21a08969dfc505
RIPEMD160(Wireshark-win64-2.6.11.msi)=9b43da4be04529e6ec87daefb3e836e617eb35a5
SHA1(Wireshark-win64-2.6.11.msi)=b5359338d504ea921f070af83555345559e278fc

Wireshark-win32-2.6.11.msi: 43540480 bytes
SHA256(Wireshark-win32-2.6.11.msi)=73cad649706e97f5e815114edfb96f85d8db4f6c84ec8e0ff6e68fa6ebe7ad9f
RIPEMD160(Wireshark-win32-2.6.11.msi)=6dc2fb41b047eb1098703f5d7d9068893437f54e
SHA1(Wireshark-win32-2.6.11.msi)=4dae1a3f6759d7bf943d60e52b648762dd315b53

WiresharkPortable_2.6.11.paf.exe: 37277408 bytes
SHA256(WiresharkPortable_2.6.11.paf.exe)=f2b8b36c6ebb10927bbfa478d87e28731590f3a89e68e38a5be8e965e6e56a7b
RIPEMD160(WiresharkPortable_2.6.11.paf.exe)=882ab8767d36a32ac5a5a4b3ee526361b2074fd5
SHA1(WiresharkPortable_2.6.11.paf.exe)=84dc007406515589d3573ce408718aa0bd47bba3

Wireshark 2.6.11 Intel 64.dmg: 108209872 bytes
SHA256(Wireshark 2.6.11 Intel
64.dmg)=f63d7201b0b90165fd5bd9ea956f90b198ef74c519d4754a6a415fdb03a21edb
RIPEMD160(Wireshark 2.6.11 Intel
64.dmg)=2f9aef4764c10ec78f662314d267bc866e7e99ba
SHA1(Wireshark 2.6.11 Intel 64.dmg)=7c7a7ab27d094b227dceb4de6cc941a021a1b763

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

Attachment: signature.asc
Description: OpenPGP digital signature