Wireshark-dev: [Wireshark-dev] Wireshark 2.4.6 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 3 Apr 2018 14:46:01 -0700
I'm proud to announce the release of Wireshark 2.4.6.
__________________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
__________________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed:
* [1]wnpa-sec-2018-15
The MP4 dissector could crash. ([2]Bug 13777)
* [3]wnpa-sec-2018-16
The ADB dissector could crash. ([4]Bug 14460)
* [5]wnpa-sec-2018-17
The IEEE 802.15.4 dissector could crash. ([6]Bug 14468)
* [7]wnpa-sec-2018-18
The NBAP dissector could crash. ([8]Bug 14471)
* [9]wnpa-sec-2018-19
The VLAN dissector could crash. ([10]Bug 14469)
* [11]wnpa-sec-2018-20
The LWAPP dissector could crash. ([12]Bug 14467)
* [13]wnpa-sec-2018-21
The TCP dissector could crash. ([14]Bug 14472)
* [15]wnpa-sec-2018-22
The CQL dissector could to into an infinite loop. ([16]Bug 14530)
* [17]wnpa-sec-2018-23
The Kerberos dissector could crash. ([18]Bug 14576)
* [19]wnpa-sec-2018-24
Multiple dissectors and other modules could leak memory. The TN3270
([20]Bug 14480), ISUP ([21]Bug 14481), LAPD ([22]Bug 14482), SMB2
([23]Bug 14483), GIOP ([24]Bug 14484), ASN.1 ([25]Bug 14485), MIME
multipart ([26]Bug 14486), H.223 ([27]Bug 14487), and PCP ([28]Bug
14488) dissectors were susceptible along with Wireshark and TShark
([29]Bug 14489).
The following bugs have been fixed:
* TRANSUM doesn't account for DNS retries in the Request Spread.
([30]Bug 14210)
* BGP: IPv6 NLRI is received with Add-path ID, then Wireshark is not
able to decode the packet correctly. ([31]Bug 14241)
* Lua script calling Ethernet dissector runs OK in 1.12.4 but crashes
in later releases. ([32]Bug 14293)
* PEEKREMOTE dissector lacks 80mhz support, short preamble support
and spatial streams encoding. ([33]Bug 14452)
* Statistics > UDP Multicast Streams > [Copy|Save as..] is broken.
([34]Bug 14477)
* Typo error in enumeration value of speech version identifier.
([35]Bug 14528)
* In "Unsaved packets" dialog one can NOT use keyboard to choose
"Continue without Saving". ([36]Bug 14531)
* WCCP logical error in CHECK_LENGTH_ADVANCE_OFFSET macros. ([37]Bug
14538)
* Buildbot crash output: fuzz-2018-03-19-19114.pcap. ([38]Bug 14544)
* alloca() used in wsutil/getopt_long.c without <alloca.h> inclusion.
([39]Bug 14552)
* HP-UX HP ANSI C requires -Wp,-H200000 flag to compile. ([40]Bug
14554)
* Makefile.in uses non-portable "install" command. ([41]Bug 14555)
* HP-UX HP ANSI C doesn't support assigning {} to a variable in
epan/app_mem_usage.c. ([42]Bug 14556)
* PPP in SSTP, HDLC framing not parsed properly. ([43]Bug 14559)
* Using the DIAMETER dictionary causes the standard input to be
closed when the dictionary is read. ([44]Bug 14577)
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
6LoWPAN, ADB, BGP, CQL, DNS, Ethernet, GIOP, GSM BSSMAP, H.223, IEEE
802.11, IEEE 802.11 Radiotap, IEEE 802.15.4, ISUP, Kerberos, LAPD,
LWAPP, MIME multipart, MP4, NBAP, NORDIC_BLE, PCP, PEEKREMOTE, S1AP,
SMB2, SSTP, T.30, TCP, TN3270, TRANSUM, VLAN, WCCP, and WSP
New and Updated Capture File Support
__________________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available from
[45]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
found on the [46]download page on the Wireshark web site.
__________________________________________________________________
File Locations
Wireshark and TShark look in several different locations for preference
files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
vary from platform to platform. You can use About->Folders to find the
default locations on your system.
__________________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([47]Bug 1419)
The BER dissector might infinitely loop. ([48]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([49]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
([50]Bug 2234)
Application crash when changing real-time option. ([51]Bug 4035)
Wireshark and TShark will display incorrect delta times in some cases.
([52]Bug 4985)
Wireshark should let you work with multiple capture files. ([53]Bug
10488)
__________________________________________________________________
Getting Help
Community support is available on [54]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
all of Wireshark's mailing lists can be found on [55]the web site.
Official Wireshark training and certification are available from
[56]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [57]Wireshark web site.
__________________________________________________________________
Last updated 2018-04-03 20:02:27 UTC
References
1. https://www.wireshark.org/security/wnpa-sec-2018-15.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777
3. https://www.wireshark.org/security/wnpa-sec-2018-16.html
4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14460
5. https://www.wireshark.org/security/wnpa-sec-2018-17.html
6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14468
7. https://www.wireshark.org/security/wnpa-sec-2018-18.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14471
9. https://www.wireshark.org/security/wnpa-sec-2018-19.html
10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14469
11. https://www.wireshark.org/security/wnpa-sec-2018-20.html
12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14467
13. https://www.wireshark.org/security/wnpa-sec-2018-21.html
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14472
15. https://www.wireshark.org/security/wnpa-sec-2018-22.html
16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14530
17. https://www.wireshark.org/security/wnpa-sec-2018-23.html
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14576
19. https://www.wireshark.org/security/wnpa-sec-2018-24.html
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14480
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14481
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14482
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14483
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14484
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14485
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14486
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14487
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14488
29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14489
30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14210
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14293
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14452
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14477
35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14528
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14531
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14538
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14544
39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14552
40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14554
41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14555
42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14556
43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14559
44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14577
45. https://www.wireshark.org/download.html
46. https://www.wireshark.org/download.html#thirdparty
47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
54. https://ask.wireshark.org/
55. https://www.wireshark.org/lists/
56. http://www.wiresharktraining.com/
57. https://www.wireshark.org/faq.html
Digests
wireshark-2.4.6.tar.xz: 28851192 bytes
SHA256(wireshark-2.4.6.tar.xz)=8e965fd282bc0c09e7c4eba5f08a555d0ccf40a7d1544b939e01b90bc893d5fe
RIPEMD160(wireshark-2.4.6.tar.xz)=4d58798dfbb5a6567a731e0d6308e1dca3c859ee
SHA1(wireshark-2.4.6.tar.xz)=25ba24628acfc12d7541298255f50e8034e694b7
Wireshark-win64-2.4.6.exe: 57924080 bytes
SHA256(Wireshark-win64-2.4.6.exe)=025c68ae6ac5a4ae146ba8318f596089859c9d5d890b688ed8c1498745779412
RIPEMD160(Wireshark-win64-2.4.6.exe)=d861ae68de77ede9c07ce5ca8126ccadb2ccbe94
SHA1(Wireshark-win64-2.4.6.exe)=5f57fe6ff476b619eb83ff4e8d18b6ffca6f0afb
Wireshark-win32-2.4.6.exe: 52729424 bytes
SHA256(Wireshark-win32-2.4.6.exe)=6395ca0265207dcdcb1080073591968dec2711cbea27708efb83bbd6c3a32235
RIPEMD160(Wireshark-win32-2.4.6.exe)=6bc69510b01a9cc1199d2f813d996a692d2f1cb2
SHA1(Wireshark-win32-2.4.6.exe)=a4e3855757d7a92e29b7e2217cf297b589f9e5e9
Wireshark-win32-2.4.6.msi: 41992192 bytes
SHA256(Wireshark-win32-2.4.6.msi)=6efc9545528c76166e00942a2e7ef334c06ff7de15c450d9d685c9a0ffe8936d
RIPEMD160(Wireshark-win32-2.4.6.msi)=afc7b83b434df048b2b645b68ba6b28fc2ef2ff4
SHA1(Wireshark-win32-2.4.6.msi)=667c7f3bc788cdff4b3875c7e709d199b63da2ce
Wireshark-win64-2.4.6.msi: 47026176 bytes
SHA256(Wireshark-win64-2.4.6.msi)=c4b6cac3c8a8814fc9bb6e19a28a467b26067bc0a661150e7018f8923e43d535
RIPEMD160(Wireshark-win64-2.4.6.msi)=76b331d59b0ee1b7b29ccac0c9865094e7f1622f
SHA1(Wireshark-win64-2.4.6.msi)=2a67f3d3ba177686794cf1ff3e64cfd56541c217
WiresharkPortable_2.4.6.paf.exe: 45406800 bytes
SHA256(WiresharkPortable_2.4.6.paf.exe)=bcf10c20f0bfc0ebace4bbfd4022cdc69e642bbe27128a01a3b5bb3f6e532fc3
RIPEMD160(WiresharkPortable_2.4.6.paf.exe)=cd01b4e5aa81f7c3543b6c78224900c1890f0909
SHA1(WiresharkPortable_2.4.6.paf.exe)=7425c8a3f5eb8efa0304b7ac10acc598e3b6eb54
Wireshark 2.4.6 Intel 64.dmg: 42490725 bytes
SHA256(Wireshark 2.4.6 Intel
64.dmg)=0e51f0c7892422df8a755044344cb9f01d4b2bbc9f90bcc63fb4a791000106f8
RIPEMD160(Wireshark 2.4.6 Intel
64.dmg)=7ca143bacb1ee969709c8933fd1d29127be687e1
SHA1(Wireshark 2.4.6 Intel 64.dmg)=5845d6ebe392ec1094c4e4297dd79807a3bab114
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: Re: [Wireshark-dev] [Wireshark-commits] [wireshark] branch master-2.6 created (now 9dde6d4)
- Next by Date: [Wireshark-dev] Wireshark 2.2.14 is now available
- Previous by thread: Re: [Wireshark-dev] [Wireshark-commits] [wireshark] branch master-2.6 created (now 9dde6d4)
- Next by thread: [Wireshark-dev] Wireshark 2.2.14 is now available
- Index(es):