Wireshark-dev: [Wireshark-dev] Wireshark 3.2.4 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 19 May 2020 13:16:52 -0700
I'm proud to announce the release of Wireshark 3.2.4. What is Wireshark? Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What’s New The Windows installers now ship with Qt 5.12.8. They previously shipped with Qt 5.12.6. The Windows installers now ship with Npcap 0.9991 They previously shipped with Npcap 0.9989 Bug Fixes The following vulnerabilities have been fixed: • wnpa-sec-2020-08[1] The NFS dissector could crash. Bug 16476[2]. The following bugs have been fixed: • SDP dissector does not parse sprop-parameter-sets field. Bug 16322[3]. • PVS-Studio analyser long list of issues. Bug 16335[4]. • Can’t have duplicate personal and global profile names. Bug 16423[5]. • pcapng file dissector incorrectly computes nanoseconds from timestamps because it assumes the resolution is in nanoseconds. Bug 16440[6]. • Read of uninitialized memory in detect_camins_file. Bug 16458[7]. • Read of uninitialized memory in lanalyzer_read_trace_record. Bug 16459[8]. • capture -> options -> select interface -> (choose) -> SEGV. Bug 16489[9]. • SOMEIP: SOME/IP dissector ignores the length field configuration of structs. Bug 16490[10]. • Packet List Pane doesn’t consume the entire pane. Bug 16491[11]. • Range parameter on numeric parameter in extcap plugin doesn’t work. Bug 16510[12]. • Export Packet Dissections not working on Windows (Wireshark 3.2.x). Bug 16516[13]. • capinfos "Capture duration" output is truncated if there are more than 11 digits of seconds and fractions of a second. Bug 16519[14]. • MIME Files Format/pcapng: Simple Packet Block parsed incorrectly. Bug 16526[15]. • SOMEIP: SOME/IP-SD unique id is not unique for eventgroup types (BUG). Bug 16549[16]. • Buildbot crash output: fuzz-2020-05-13-12195.pcap. Bug 16564[17]. New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support AoE, APRS, ASN.1 BER, DIS, DTLS, FTP, GSM SMS, H.264, IMAP, Infiniband, ISObus VT, Kafka, LSD, MAC LTE, NAS 5GS, NFS, ONC RPC, OSC, pcapng, PDCP LTE, RADIUS, RLC LTE, RTSP, SDP, SIP, Snort, SOMEIP, STUN, TLS, and UMTS FP New and Updated Capture File Support Camins, Catapult DCT 2000, Lanalyzer, and MPEG Getting Wireshark Wireshark source code and installation packages are available from https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page[18] on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About→Folders to find the default locations on your system. Getting Help The User’s Guide, manual pages and various other documentation can be found at https://www.wireshark.org/docs/ Community support is available on Wireshark’s Q&A site[19] and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark’s mailing lists can be found on the web site[20]. Bugs and feature requests can be reported on the bug tracker[21]. Frequently Asked Questions A complete FAQ is available on the Wireshark web site[22]. Last updated 2020-05-19 17:45:44 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2020-08 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476 3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16322 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16335 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16423 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16440 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16458 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16459 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16489 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16490 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16491 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16510 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16516 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16519 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16526 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16549 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16564 18. https://www.wireshark.org/download.html#thirdparty 19. https://ask.wireshark.org/ 20. https://www.wireshark.org/lists/ 21. https://bugs.wireshark.org/ 22. https://www.wireshark.org/faq.html Digests wireshark-3.2.4.tar.xz: 31580440 bytes SHA256(wireshark-3.2.4.tar.xz)=d17d461e849e2d0b033431c45f71d8ee8ec3c8faa232a6ad63069a47927db8aa RIPEMD160(wireshark-3.2.4.tar.xz)=5dccf5ba44dd8f6c275b74ab07137ce80f4ab76d SHA1(wireshark-3.2.4.tar.xz)=bb4157b57c1bcdbac948a1282dafad027d57be9b Wireshark-win32-3.2.4.exe: 54867824 bytes SHA256(Wireshark-win32-3.2.4.exe)=c17e4a812031d5dfd4ef0a4b4dae1b60bb45eb7ce8c9e8b1b5eff4db5bcf4b72 RIPEMD160(Wireshark-win32-3.2.4.exe)=3ac743c96a4b1e9e006501e45b1a8f398d54d511 SHA1(Wireshark-win32-3.2.4.exe)=ea4cc781339618eb16db4fdc96c413f119229ef3 Wireshark-win64-3.2.4.exe: 60037848 bytes SHA256(Wireshark-win64-3.2.4.exe)=db2565ee6410b7c57f54aaac86954e4f6a98e2ea31ffbea83e60b981fff57301 RIPEMD160(Wireshark-win64-3.2.4.exe)=e058bfdb62c1b0392d39c80d24e7f001587ed907 SHA1(Wireshark-win64-3.2.4.exe)=32c0cea3623db22eb7f0dbf24ac4902a4e873f3d Wireshark-win32-3.2.4.msi: 43028480 bytes SHA256(Wireshark-win32-3.2.4.msi)=a614bdb63e9dfa1150cdcb471790ebe32f1c8a269079cbccab6ece4ad7700575 RIPEMD160(Wireshark-win32-3.2.4.msi)=7431e01c63b522ad59f1adb58fa0da7e5b12362b SHA1(Wireshark-win32-3.2.4.msi)=22ca61d51e9d66e198769225fbbc0bfc2f3a0f76 Wireshark-win64-3.2.4.msi: 48283648 bytes SHA256(Wireshark-win64-3.2.4.msi)=eb13bc841c98c398a7f26705f3621ac4ffe90fc158f4ea48db3ba56968a0d41b RIPEMD160(Wireshark-win64-3.2.4.msi)=33e2f498e1919a11b1c20cb125af30c304534cc8 SHA1(Wireshark-win64-3.2.4.msi)=4e2aeab60879518b5d9a81d8449874db23ad4dc6 WiresharkPortable_3.2.4.paf.exe: 36581616 bytes SHA256(WiresharkPortable_3.2.4.paf.exe)=2c8ea4e6776a334d43909c53d7c656db10ad425beec5fe927b8d1fb0467309da RIPEMD160(WiresharkPortable_3.2.4.paf.exe)=759413437b7b91efe28eab3c6120530421ada774 SHA1(WiresharkPortable_3.2.4.paf.exe)=6c0f29f5554b0ee7160b21f7a6c6a5069161e266 Wireshark 3.2.4 Intel 64.dmg: 97572886 bytes SHA256(Wireshark 3.2.4 Intel 64.dmg)=735d43bdbde1caeb9bfff89acc62acfeb05ffda36e6d0d243bc08333e60fdac6 RIPEMD160(Wireshark 3.2.4 Intel 64.dmg)=672b26161f45f015fff6d16d96570b85f59c0bcb SHA1(Wireshark 3.2.4 Intel 64.dmg)=5a550cae3e5cc02441f39df2fdb84edb525d5b87 You can validate these hashes using the following commands (among others): Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256 Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg" Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-dev] Deleting unused header file inclusions (revisited)
- Next by Date: [Wireshark-dev] Regarding Season of Docs
- Previous by thread: [Wireshark-dev] Deleting unused header file inclusions (revisited)
- Next by thread: [Wireshark-dev] Regarding Season of Docs
- Index(es):