Wireshark-dev: [Wireshark-dev] Wireshark 2.0.8 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 16 Nov 2016 15:43:21 -0800
I'm proud to announce the release of Wireshark 2.0.8.
__________________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
__________________________________________________________________
What's New
* Invalid coloring rules are now disabled instead of discarded. This
will provide forward compatibility with a coloring rule change in
Wireshark 2.2.
Bug Fixes
The following vulnerabilities have been fixed:
* [1]wnpa-sec-2016-59
AllJoyn crash. ([2]Bug 12953)
* [3]wnpa-sec-2016-60
OpenFlow crash. ([4]Bug 13071)
* [5]wnpa-sec-2016-61
DCERPC crash. ([6]Bug 13072)
* [7]wnpa-sec-2016-62
DTN infinite loop. ([8]Bug 13097)
The following bugs have been fixed:
* SMPP schedule_delivery_time displayed wrong in Wireshark 2.1.0.
([9]Bug 12632)
* Upgrading to latest version uninstalls Microsoft Visual C++
redistributable. ([10]Bug 12712)
* smpp.message not decoded & not available for export using tshark -T
fields -e smpp.message. ([11]Bug 12960)
* CLNP dissector does not parse ER NPDU properly. ([12]Bug 12993)
* SNMP trap bindings for NON scalar OIDs. ([13]Bug 13013)
* BGP LS Link Protection Type TLV (1093) decoding. ([14]Bug 13021)
* Application crash sorting column for tcp.window_size_scalefactor up
and down. ([15]Bug 13023)
* ZigBee Green Power add key during execution. ([16]Bug 13031)
* Malformed AMPQ packets for session.expected and session.confirmed
fields. ([17]Bug 13037)
* [IS-637A] SMS - Teleservice layer parameter --> IA5 encoded text is
not correctly displayed. ([18]Bug 13065)
* Field sna.gds is is not of an FT_{U}INTn type. ([19]Bug 13084)
* E212: 3 digits MNC are identified as 2 digits long if they end with
a 0. ([20]Bug 13092)
* Dissector skips DICOM command. ([21]Bug 13110)
* Manufacturer name resolution fail. ([22]Bug 13126)
The Windows PortableApps packages were susceptible to a [23]DLL
hijacking flaw.
New and Updated Features
There are no new features in this release.
New File Format Decoding Support
There are no new file formats in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
AllJoyn, AMPQ, ANSI IS-637 A, BGP, CLNP, DCERPC, DICOM, DTN, E.212,
OpenFlow, SMPP, SNA, SNMP, and ZigBee
New and Updated Capture File Support
New and Updated Capture Interfaces support
There are no new or updated capture interfaces supported in this
release.
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
[24]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [25]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Wireshark and TShark look in several different locations for preference
files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([26]Bug 1419)
The BER dissector might infinitely loop. ([27]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([28]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
([29]Bug 2234)
Resolving ([30]Bug 9044) reopens ([31]Bug 3528) so that Wireshark no
longer automatically decodes gzip data when following a TCP stream.
Application crash when changing real-time option. ([32]Bug 4035)
Hex pane display issue after startup. ([33]Bug 4056)
Packet list rows are oversized. ([34]Bug 4357)
Wireshark and TShark will display incorrect delta times in some cases.
([35]Bug 4985)
The 64-bit version of Wireshark will leak memory on Windows when the
display depth is set to 16 bits ([36]Bug 9914)
Wireshark should let you work with multiple capture files. ([37]Bug
10488)
Dell Backup and Recovery (DBAR) makes many Windows applications crash,
including Wireshark. ([38]Bug 12036)
__________________________________________________________________
Getting Help
Community support is available on [39]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [40]the web site.
Official Wireshark training and certification are available from
[41]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [42]Wireshark web site.
__________________________________________________________________
Last updated 2016-11-16 19:04:05 UTC
References
1. https://www.wireshark.org/security/wnpa-sec-2016-59.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12953
3. https://www.wireshark.org/security/wnpa-sec-2016-60.html
4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13071
5. https://www.wireshark.org/security/wnpa-sec-2016-61.html
6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13072
7. https://www.wireshark.org/security/wnpa-sec-2016-62.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13097
9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12632
10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12712
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12960
12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12993
13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13013
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13021
15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13023
16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13031
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13037
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13065
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13084
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13092
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13110
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13126
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12724
24. https://www.wireshark.org/download.html
25. https://www.wireshark.org/download.html#thirdparty
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9914
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
39. https://ask.wireshark.org/
40. https://www.wireshark.org/lists/
41. http://www.wiresharktraining.com/
42. https://www.wireshark.org/faq.html
Digests
wireshark-2.0.8.tar.bz2: 31260421 bytes
SHA256(wireshark-2.0.8.tar.bz2)=2a6f7119ebc4d8fe1dfea6b0ce4dc036d67ea0e59410e6fdcd3ae15ee0834380
RIPEMD160(wireshark-2.0.8.tar.bz2)=78640f937cec76764cc280218d125d6f2d56f2ca
SHA1(wireshark-2.0.8.tar.bz2)=411d65aad8988f88c8683a41f91ded0adf1a894a
MD5(wireshark-2.0.8.tar.bz2)=c35285452a3deed84173ca37df6f40f3
Wireshark-win64-2.0.8.exe: 47640664 bytes
SHA256(Wireshark-win64-2.0.8.exe)=67acc71ff701a5395822b13f49db6276d0cf722ecb2ec04507869a6bcfe2fd5f
RIPEMD160(Wireshark-win64-2.0.8.exe)=e76b15f995fa7398e48951b9d7affff9e03f2659
SHA1(Wireshark-win64-2.0.8.exe)=6ce99cdaeae58e672cebb89fbecd896fb3761fd4
MD5(Wireshark-win64-2.0.8.exe)=681163d44f763ae7263f2294f3af7d03
Wireshark-win32-2.0.8.exe: 44026992 bytes
SHA256(Wireshark-win32-2.0.8.exe)=85298d278254ff9afbd002eb31b1c3e6dc05afb035c760bc1a93e8ca340ba92c
RIPEMD160(Wireshark-win32-2.0.8.exe)=34136cf6c52f0a6380bf0fd73d3db42ce176466c
SHA1(Wireshark-win32-2.0.8.exe)=601aa7fe72042a8587c09d1c0affb117a531cd69
MD5(Wireshark-win32-2.0.8.exe)=20b183865423cab4feed5202fcb0a9c8
WiresharkPortable_2.0.8.paf.exe: 43692208 bytes
SHA256(WiresharkPortable_2.0.8.paf.exe)=70f2281b2266da8c17fded252c10b9ac51aff66197f9bae3fa22a848f575155d
RIPEMD160(WiresharkPortable_2.0.8.paf.exe)=b8258100e596da3677d84cc337117fc13f3d2abd
SHA1(WiresharkPortable_2.0.8.paf.exe)=7694d4b80ee3ce79ca30323f0d8f754d2bdc81e6
MD5(WiresharkPortable_2.0.8.paf.exe)=4eea1abfc7045131b2126fbd6fe6ff56
Wireshark 2.0.8 Intel 64.dmg: 31740112 bytes
SHA256(Wireshark 2.0.8 Intel
64.dmg)=691c3dec9a564ed7c3e2e17d5e801fd96f1d385f76b73d314798b674d3009f31
RIPEMD160(Wireshark 2.0.8 Intel
64.dmg)=310cb8d4c2d5f302050977ce09a97bfae7e7ed35
SHA1(Wireshark 2.0.8 Intel 64.dmg)=0859cac98d42a4afef63998d72d07e0cbf727d22
MD5(Wireshark 2.0.8 Intel 64.dmg)=79b89cf7f188ab2cc62879ec82489380
Wireshark 2.0.8 Intel 32.dmg: 32462113 bytes
SHA256(Wireshark 2.0.8 Intel
32.dmg)=8ca53aa84566c7df0104cbcbbb4e17556e4015fc425cb56cc1e2e1a9b33c18a1
RIPEMD160(Wireshark 2.0.8 Intel
32.dmg)=c37590e1bae55700c93b803112c975a1f52a4912
SHA1(Wireshark 2.0.8 Intel 32.dmg)=4020e1ce6632f944db5e718984bdfba102109e05
MD5(Wireshark 2.0.8 Intel 32.dmg)=6ff73eea5c476e7abe46ca507e4d7810
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-dev] Wireshark 2.2.2 is now available
- Next by Date: [Wireshark-dev] Difference between proto_item_set_len and proto_item_set_end
- Previous by thread: [Wireshark-dev] Wireshark 2.2.2 is now available
- Next by thread: [Wireshark-dev] Difference between proto_item_set_len and proto_item_set_end
- Index(es):