aboutsummaryrefslogtreecommitdiffstats
path: root/NEWS
blob: b63d9c85e12085dbc30f2cb0089f3af39b235bf7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
Wireshark 2.6.9 Release Notes

 What is Wireshark?

  Wireshark is the world’s most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What’s New

  Bug Fixes

   The following vulnerabilities have been fixed:

     • wnpa-sec-2019-19[1] Wireshark dissection engine crash. Bug
       15778[2].

   The following bugs have been fixed:

     • [oss-fuzz] ERROR: Adding ospf.v3.prefix.options.nu would put more
       than 1000000 items in the tree — possible infinite loop. Bug
       14978[3].

     • Help file doesn’t display for extcap interfaces. Bug 15592[4].

     • Statistics→Conversations→TCP→Follow Stream - incorrect behavior.
       Bug 15672[5].

     • Wrong NTP timestamp for RTCP XR RR packets (hf_rtcp_xr_timestamp
       field). Bug 15687[6].

     • ws_pipe: leaks pipe handles on errors. Bug 15689[7].

     • ISAKMP: Segmentation fault with non-hex string for IKEv1
       Decryption Table Initiator Cookie. Bug 15709[8].

     • print.c: Memory leak in ek_check_protocolfilter. Bug 15758[9].

     • Bacnet(app): fix wrong value for id 183 (logging-device →
       logging-object). Bug 15767[10].

     • The SMB2 code to look up decryption keys by session ID assumes
       it’s running on a little-endian machine. Bug 15772[11].

     • tshark -G folders leaves mmdbresolve process behind. Bug
       15777[12].

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   BACapp, DDP, Frame, IEEE 802.11, IS-IS CLV, RTCP XR RR, and SMB2

  New and Updated Capture File Support

   pcapng

  New and Updated Capture Interfaces support

   There is no new or updated capture file support in this release.

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html[13].

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[14] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use About→Folders to
  find the default locations on your system.

 Known Problems

  The BER dissector might infinitely loop. Bug 1516[15].

  Capture filters aren’t applied when capturing from named pipes. Bug
  1814[16].

  Filtering tshark captures with read filters (-R) no longer works. Bug
  2234[17].

  Application crash when changing real-time option. Bug 4035[18].

  Wireshark and TShark will display incorrect delta times in some cases.
  Bug 4985[19].

  Wireshark should let you work with multiple capture files. Bug
  10488[20].

 Getting Help

  Community support is available on Wireshark’s Q&A site[21] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark’s mailing lists can be found on the web site[22].

  Official Wireshark training and certification are available from
  Wireshark University[23].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[24].

  Last updated 2019-05-21 22:50:55 UTC

 References

   1. https://www.wireshark.org/security/wnpa-sec-2019-19
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15778
   3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14978
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15592
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15672
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15687
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15689
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15709
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15758
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15767
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15772
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15777
  13. https://www.wireshark.org/download.html
  14. https://www.wireshark.org/download.html#thirdparty
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
  21. https://ask.wireshark.org/
  22. https://www.wireshark.org/lists/
  23. http://www.wiresharktraining.com/
  24. https://www.wireshark.org/faq.html