aboutsummaryrefslogtreecommitdiffstats
path: root/NEWS
diff options
context:
space:
mode:
Diffstat (limited to 'NEWS')
-rw-r--r--NEWS203
1 files changed, 68 insertions, 135 deletions
diff --git a/NEWS b/NEWS
index 6f93e634aa..44a23d6f88 100644
--- a/NEWS
+++ b/NEWS
@@ -1,4 +1,4 @@
- Wireshark 2.2.16 Release Notes
+ Wireshark 2.2.17 Release Notes
__________________________________________________________________
What is Wireshark?
@@ -9,65 +9,32 @@ What is Wireshark?
What's New
+ This is the final release of Wireshark 2.2. It will reach its official
+ end of life on September 7, 2018. If you are still using Wireshark 2.2
+ you are encouraged to upgrade to Wireshark 2.6.
+
Bug Fixes
The following vulnerabilities have been fixed:
- * [1]wnpa-sec-2018-06
- RPKI-Router infinite loop. [2]Bug 14414. [3]CVE-2018-7325.
- * [4]wnpa-sec-2018-34
- BGP dissector large loop. [5]Bug 13741. [6]CVE-2018-14342.
- * [7]wnpa-sec-2018-35
- ISMP dissector crash. [8]Bug 14672. [9]CVE-2018-14344.
- * [10]wnpa-sec-2018-36
- Multiple dissectors could crash. [11]Bug 14675. [12]CVE-2018-14340.
- * [13]wnpa-sec-2018-37
- ASN.1 BER dissector crash. [14]Bug 14682. [15]CVE-2018-14343.
- * [16]wnpa-sec-2018-38
- MMSE dissector infinite loop. [17]Bug 14738. [18]CVE-2018-14339.
- * [19]wnpa-sec-2018-39
- DICOM dissector crash. [20]Bug 14742. [21]CVE-2018-14341.
- * [22]wnpa-sec-2018-40
- Bazaar dissector infinite loop. [23]Bug 14841.
- * [24]wnpa-sec-2018-41
- HTTP2 dissector crash. [25]Bug 14869.
+ * [1]wnpa-sec-2018-44
+ Bluetooth AVDTP dissector crash. [2]Bug 14884. [3]CVE-2018-16058.
+ * [4]wnpa-sec-2018-45
+ Bluetooth Attribute Protocol dissector crash. [5]Bug 14994.
+ [6]CVE-2018-16056.
+ * [7]wnpa-sec-2018-46
+ Radiotap dissector crash. [8]Bug 15022. [9]CVE-2018-16057.
The following bugs have been fixed:
- * ISMP.EDP "Tuples" dissected incorrectly. ([26]Bug 4943)
- * Wireshark crashes when changing profiles. ([27]Bug 11648)
- * randpkt can write packets that libwiretap can't read. ([28]Bug
- 14107)
- * Crafted UDP packet causes large memory usage. ([29]Bug 14473)
- * Error received from dissect_wccp2_hash_assignment_info(). ([30]Bug
- 14573)
- * IP address to name resolution doesn't work in TShark. ([31]Bug
- 14711)
- * proto_tree_add_protocol_format might leak memory. ([32]Bug 14719)
- * DICOM dissector needs to check for packet offset overflow. ([33]Bug
- 14742)
- * Formatting of OSI area addresses/address prefixes goes past the end
- of the area address/address prefix. ([34]Bug 14744)
- * ICMPv6 Router Renumbering - Packet Dissector - malformed. ([35]Bug
- 14755)
- * WiMAX HARQ MAP decoder segfaults when length is too short. ([36]Bug
- 14780)
- * HTTP PUT request following a HEAD request is not correctly decoded.
- ([37]Bug 14793)
- * SYNC PDU type 3 miss the last PDU length. ([38]Bug 14823)
- * Reversed 128 bits service UUIDs when Bluetooth Low Energy
- advertisement data are dissected. ([39]Bug 14843)
- * Issues with Wireshark when the user doesn't have permission to
- capture. ([40]Bug 14847)
- * Wrong description when LE Bluetooth Device Address type is
- dissected. ([41]Bug 14866)
- * LE Role advertisement type (0x1c) is not dissected properly
- according to the Bluetooth specification. ([42]Bug 14868)
- * Wireshark doesn't properly display (deliberately) invalid 220
- responses from Postfix. ([43]Bug 14878)
- * DCE/RPC not dissected when "reserved for use by implementations"
- flag bits set. ([44]Bug 14942)
- * There's no option to include column headings when printing packets
- or exporting packet dissections with Qt Wireshark. ([45]Bug 14945)
- * CMake is unable to find LUA libraries. ([46]Bug 14983)
+ * udpdump frame too long error. [10]Bug 14989.
+ * ASTERIX Category 062 / 135 Altitude has wrong value. [11]Bug 15030.
+ * Wireshark cannot decrypt SSL/TLS session if it was proxied over
+ HTTP tunnel. [12]Bug 15042.
+ * TLS records in a HTTP tunnel are displayed as "Encrypted Handshake
+ Message". [13]Bug 15043.
+ * Diameter AVP User Location Info, Mobile Network Code decoded not
+ correctly. [14]Bug 15068.
+ * Heartbeat message "Info" displayed without comma separator. [15]Bug
+ 15079.
New and Updated Features
@@ -83,19 +50,16 @@ What's New
Updated Protocol Support
- ASN.1 BER, Bazaar, BGP, Bluetooth, Bluetooth HCI_CMD, CIGI, DCERPC,
- DICOM, GSM A GM, HTTP, HTTP2, IAX2, ICMPv6, IEEE 802.11, ISMP, LISP,
- MMSE, MTP3, PPI GPS, Q.931, RPKI-Router, SMTP, STUN, SYNC, T.30, WAP,
- WCCP, WiMax HARQ Map Message, and WSP
+ ASTERIX, Bluetooth ATT, Bluetooth AVDTP, DTLS, E.212, HTTP, K12, and
+ Radiotap
New and Updated Capture File Support
- There is no new or updated capture file support in this release.
+ pcapng
New and Updated Capture Interfaces support
- There are no new or updated capture interfaces supported in this
- release.
+ ciscodump
Major API Changes
@@ -105,14 +69,14 @@ What's New
Getting Wireshark
Wireshark source code and installation packages are available from
- [47]https://www.wireshark.org/download.html.
+ [16]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
- found on the [48]download page on the Wireshark web site.
+ found on the [17]download page on the Wireshark web site.
__________________________________________________________________
File Locations
@@ -125,100 +89,69 @@ File Locations
Known Problems
- Dumpcap might not quit if Wireshark or TShark crashes. ([49]Bug 1419)
+ Dumpcap might not quit if Wireshark or TShark crashes. ([18]Bug 1419)
- The BER dissector might infinitely loop. ([50]Bug 1516)
+ The BER dissector might infinitely loop. ([19]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
- ([51]Bug 1814)
+ ([20]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
- ([52]Bug 2234)
+ ([21]Bug 2234)
- Application crash when changing real-time option. ([53]Bug 4035)
+ Application crash when changing real-time option. ([22]Bug 4035)
Wireshark and TShark will display incorrect delta times in some cases.
- ([54]Bug 4985)
+ ([23]Bug 4985)
- Wireshark should let you work with multiple capture files. ([55]Bug
+ Wireshark should let you work with multiple capture files. ([24]Bug
10488)
__________________________________________________________________
Getting Help
- Community support is available on [56]Wireshark's Q&A site and on the
+ Community support is available on [25]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
- all of Wireshark's mailing lists can be found on [57]the web site.
+ all of Wireshark's mailing lists can be found on [26]the web site.
Official Wireshark training and certification are available from
- [58]Wireshark University.
+ [27]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
- A complete FAQ is available on the [59]Wireshark web site.
+ A complete FAQ is available on the [28]Wireshark web site.
__________________________________________________________________
- Last updated 2018-07-18 17:27:20 UTC
+ Last updated 2018-08-29 16:24:12 UTC
References
- 1. https://www.wireshark.org/security/wnpa-sec-2018-06.html
- 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14414
- 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325
- 4. https://www.wireshark.org/security/wnpa-sec-2018-34.html
- 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13741
- 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14342
- 7. https://www.wireshark.org/security/wnpa-sec-2018-35.html
- 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14672
- 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14344
- 10. https://www.wireshark.org/security/wnpa-sec-2018-36.html
- 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14675
- 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14340
- 13. https://www.wireshark.org/security/wnpa-sec-2018-37.html
- 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14682
- 15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14343
- 16. https://www.wireshark.org/security/wnpa-sec-2018-38.html
- 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14738
- 18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14339
- 19. https://www.wireshark.org/security/wnpa-sec-2018-39.html
- 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14742
- 21. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14341
- 22. https://www.wireshark.org/security/wnpa-sec-2018-40.html
- 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14841
- 24. https://www.wireshark.org/security/wnpa-sec-2018-41.html
- 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14869
- 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4943
- 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11648
- 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14107
- 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14473
- 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14573
- 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14711
- 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14719
- 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14742
- 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14744
- 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14755
- 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14780
- 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14793
- 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14823
- 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14843
- 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14847
- 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14866
- 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14868
- 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14878
- 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14942
- 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14945
- 46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14983
- 47. https://www.wireshark.org/download.html
- 48. https://www.wireshark.org/download.html#thirdparty
- 49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
- 50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
- 51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
- 52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
- 53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
- 54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
- 55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
- 56. https://ask.wireshark.org/
- 57. https://www.wireshark.org/lists/
- 58. http://www.wiresharktraining.com/
- 59. https://www.wireshark.org/faq.html
+ 1. https://www.wireshark.org/security/wnpa-sec-2018-44.html
+ 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14884
+ 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058
+ 4. https://www.wireshark.org/security/wnpa-sec-2018-45.html
+ 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14994
+ 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056
+ 7. https://www.wireshark.org/security/wnpa-sec-2018-46.html
+ 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022
+ 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057
+ 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14989
+ 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15030
+ 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15042
+ 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15043
+ 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15068
+ 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15079
+ 16. https://www.wireshark.org/download.html
+ 17. https://www.wireshark.org/download.html#thirdparty
+ 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
+ 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
+ 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
+ 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
+ 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
+ 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
+ 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
+ 25. https://ask.wireshark.org/
+ 26. https://www.wireshark.org/lists/
+ 27. http://www.wiresharktraining.com/
+ 28. https://www.wireshark.org/faq.html