Wireshark-users: [Wireshark-users] Wireshark 2.2.5 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Fri, 3 Mar 2017 15:13:47 -0800
I'm proud to announce the release of Wireshark 2.2.5.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2017-03
       LDSS dissector crash ([2]Bug 13346)
     * [3]wnpa-sec-2017-04
       RTMTP dissector infinite loop ([4]Bug 13347)
     * [5]wnpa-sec-2017-05
       WSP dissector infinite loop ([6]Bug 13348)
     * [7]wnpa-sec-2017-06
       STANAG 4607 file parser infinite loop ([8]Bug 13416)
     * [9]wnpa-sec-2017-07
       NetScaler file parser infinite loop ([10]Bug 13429)
     * [11]wnpa-sec-2017-08
       NetScaler file parser crash ([12]Bug 13430)
     * [13]wnpa-sec-2017-09
       K12 file parser crash ([14]Bug 13431)
     * [15]wnpa-sec-2017-10
       IAX2 dissector infinite loop ([16]Bug 13432)
     * [17]wnpa-sec-2017-11
       NetScaler file parser infinite loop ([18]Bug 12083)

   The 32-bit and 64-bit Windows installers might have been susceptible to
   a [19]DLL hijacking flaw.

   The following bugs have been fixed:
     * Display filter textbox loses focus during live capturing. ([20]Bug
       11890)
     * Wireshark crashes when saving pcaps, opening pcaps, and exporting
       specified packets. ([21]Bug 12036)
     * tshark stalls on FreeBSD if androiddump is present. ([22]Bug 13104)
     * UTF-8 characters in packet list column title. ([23]Bug 13342)
     * Recent capture file list should appear immediately on startup.
       ([24]Bug 13352)
     * editcap segfault if a packet length is shorter than ignore bytes
       parameter. ([25]Bug 13378)
     * dftest segfault with automated build of 2.2.5. ([26]Bug 13387)
     * UMTS MAC Dissector shows Packet size limited for BCCH payload.
       ([27]Bug 13392)
     * VS2010 win32 ±¥. ([28]Bug 13398)
     * EAP AKA not being decoded properly. ([29]Bug 13411)
     * Dumpcap crashes during rpcap setup. ([30]Bug 13418)
     * Crash on closing SNMP capture file if snmp credentials are present.
       ([31]Bug 13420)
     * GPRS-NS message PDU type displayed in octal instead of hexadecimal.
       ([32]Bug 13428)

  New and Updated Features

   There are no new features in this release.

  New File Format Decoding Support

   There are no new file formats in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   GPRS-NS, GTPv2, IAX2, IEEE 802.11, LDSS, MS-WSP, OpcUa, ROHC, RTMTP,
   SNMP, STANAG 4607, T.38, and UMTS FP

  New and Updated Capture File Support

   There is no new or updated capture file support in this release.

   K12, and NetScaler

  New and Updated Capture Interfaces support

   There are no new or updated capture interfaces supported in this
   release.

  Major API Changes

   There are no major API changes in this release.
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [33]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [34]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([35]Bug 1419)

   The BER dissector might infinitely loop. ([36]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([37]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([38]Bug 2234)

   Application crash when changing real-time option. ([39]Bug 4035)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([40]Bug 4985)

   Wireshark should let you work with multiple capture files. ([41]Bug
   10488)

   Dell Backup and Recovery (DBAR) makes many Windows applications crash,
   including Wireshark. ([42]Bug 12036)
     __________________________________________________________________

Getting Help

   Community support is available on [43]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [44]the web site.

   Official Wireshark training and certification are available from
   [45]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [46]Wireshark web site.
     __________________________________________________________________

   Last updated 2017-03-03 20:44:54 UTC

References

   1. https://www.wireshark.org/security/wnpa-sec-2017-03.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
   3. https://www.wireshark.org/security/wnpa-sec-2017-04.html
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
   5. https://www.wireshark.org/security/wnpa-sec-2017-05.html
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
   7. https://www.wireshark.org/security/wnpa-sec-2017-06.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13416
   9. https://www.wireshark.org/security/wnpa-sec-2017-07.html
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
  11. https://www.wireshark.org/security/wnpa-sec-2017-08.html
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
  13. https://www.wireshark.org/security/wnpa-sec-2017-09.html
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
  15. https://www.wireshark.org/security/wnpa-sec-2017-10.html
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
  17. https://www.wireshark.org/security/wnpa-sec-2017-11.html
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13369
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11890
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13104
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13342
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13352
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13378
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13387
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13392
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13398
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13411
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13418
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13420
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13428
  33. https://www.wireshark.org/download.html
  34. https://www.wireshark.org/download.html#thirdparty
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
  43. https://ask.wireshark.org/
  44. https://www.wireshark.org/lists/
  45. http://www.wiresharktraining.com/
  46. https://www.wireshark.org/faq.html


Digests

wireshark-2.2.5.tar.bz2: 32297102 bytes
SHA256(wireshark-2.2.5.tar.bz2)=75dd88d3d6336559e5b0b72077d8a772a988197d571f00029986225fef609ac8
RIPEMD160(wireshark-2.2.5.tar.bz2)=cd415642d1a71deb47dbdd4047713d4f3c4a460f
SHA1(wireshark-2.2.5.tar.bz2)=cc3ae3fa640caee1fdb4499a4b70272934efad14
MD5(wireshark-2.2.5.tar.bz2)=749e7ca7606ae7df5c1ca8c62f93ff31

Wireshark-win32-2.2.5.exe: 44537680 bytes
SHA256(Wireshark-win32-2.2.5.exe)=a99a8cc1df24b31ab9ad963c2d1133982e0e9f2b33e8bfab8ac313c16e432da3
RIPEMD160(Wireshark-win32-2.2.5.exe)=ed5048d6e1d149e2fbfc1a95a159d22ed5e9f6a2
SHA1(Wireshark-win32-2.2.5.exe)=d556eced7a13d374446bcec3e2b18cc20151dedd
MD5(Wireshark-win32-2.2.5.exe)=0f2408c46ca8c6ee501616c5a8761082

Wireshark-win64-2.2.5.exe: 49367072 bytes
SHA256(Wireshark-win64-2.2.5.exe)=ab2723ba25dcf1e2f60faa579c1cad3e88ebcf53cf1a2a6897094b9f447fb864
RIPEMD160(Wireshark-win64-2.2.5.exe)=f5cb2454400bd6ef38d84f6b8e81ecd25f3aa793
SHA1(Wireshark-win64-2.2.5.exe)=4102aaef174fb17a090e881a0292ac1a3613dc8b
MD5(Wireshark-win64-2.2.5.exe)=f12563fab7da706b30fac2e8023d9d96

WiresharkPortable_2.2.5.paf.exe: 46128200 bytes
SHA256(WiresharkPortable_2.2.5.paf.exe)=4fd8a76439827162e4bddc9ca7339d37a8623bc632fec584d00dff6af7f3715d
RIPEMD160(WiresharkPortable_2.2.5.paf.exe)=6d3ebb161e7fdde6c106053c9c0baad958916570
SHA1(WiresharkPortable_2.2.5.paf.exe)=844b3eabebf7a378ffef2977b776a9f98829dd10
MD5(WiresharkPortable_2.2.5.paf.exe)=e6ba28d81c1ddfb3a8cdc9dba5428d17

Wireshark 2.2.5 Intel 64.dmg: 32846965 bytes
SHA256(Wireshark 2.2.5 Intel
64.dmg)=459998af108d3c002bf23db703af13cd56cff35da0d93eceb0e8f722aa26d71c
RIPEMD160(Wireshark 2.2.5 Intel
64.dmg)=aab72421e8970d4cc3a867f4869326f55bfc49c1
SHA1(Wireshark 2.2.5 Intel 64.dmg)=92c780c628781cf53864703f6fb9f90eccf58d05
MD5(Wireshark 2.2.5 Intel 64.dmg)=1281a01f09c41d4b9a29a720589e50cc

Attachment: signature.asc
Description: OpenPGP digital signature