Wireshark-announce: [Wireshark-announce] Wireshark 4.0.5 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 12 Apr 2023 12:41:47 -0700
I'm proud to announce the release of Wireshark 4.0.5.
What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
What’s New
We do not ship official 32-bit Windows packages for Wireshark 4.0 and
later. If you need to use Wireshark on that platform, we recommend
using the latest 3.6 release. Issue 17779[1]
If you’re running Wireshark on macOS and upgraded to macOS 13 from an
earlier version, you will likely have to open and run the “Uninstall
ChmodBPF” package, then open and run “Install ChmodBPF” in order to
reset the ChmodBPF Launch Daemon. Issue 18734[2].
Bug Fixes
The following vulnerabilities have been fixed:
• wnpa-sec-2023-09[3] RPCoRDMA dissector crash. Issue 18852[4].
CVE-2023-1992[5].
• wnpa-sec-2023-10[6] LISP dissector large loop. Issue 18900[7].
CVE-2023-1993[8].
• wnpa-sec-2023-11[9] GQUIC dissector crash Issue 18947[10].
CVE-2023-1994[11].
The following bugs have been fixed:
• Wireshark ITS Dissector RTCMEM wrong protocol version selector 2
- should use 1. Issue 18862[12].
• Wireshark treats the letter E in SSRC as an exponential
representation of a number. Issue 18879[13].
• VNC RRE Parser skips over data. Issue 18883[14].
• sshdump coredump when --remote-interface is left empty. Issue
18904[15].
• Fuzz job crash output: fuzz-2023-03-17-7298.pcap. Issue
18917[16].
• Fuzz job crash output: fuzz-2023-03-27-7564.pcap. Issue
18934[17].
• RFC8925 support (dhcp option 108) Issue 18943[18].
• DIS dissector shows an incorrect state in the packet list info
column. Issue 18967[19].
• RTP analysis shows incorrect timestamp error when timestamp is
rolled over. Issue 18973[20].
• Asterisk (*) key crash on Endpoint/Conversation dialog. Issue
18975[21].
• The RTP player waveform now synchronizes better with audio.
New and Updated Features
There are no new or updated features in this release.
Removed Features and Support
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
DHCP, DIS, DNS, ERF, FF, genl, GQUIC, GSM A-bis OML, HL7, IEEE
802.11, ITS, LAPD, netfilter, netlink-route, netlink-sock_diag,
nl80211, RLC, RPCoRDMA, RTPS, SCTP, SMB, UDS, VNC, and WCP
New and Updated Capture File Support
There is no new or updated capture file support in this release.
Netmon and NetScaler
New File Format Decoding Support
There is no new or updated file format support in this release.
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[22] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use "Help › About
Wireshark › Folders" or `tshark -G folders` to find the default
locations on your system.
Getting Help
The User’s Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/
Community support is available on Wireshark’s Q&A site[23] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark’s mailing lists can be found on the web site[24].
Bugs and feature requests can be reported on the issue tracker[25].
You can learn protocol analysis and meet Wireshark’s developers at
SharkFest[26].
How You Can Help
The Wireshark Foundation helps as many people as possible understand
their networks as much as possible. You can find out more and donate
at wiresharkfoundation.org[27].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[28].
References
1. https://gitlab.com/wireshark/wireshark/-/issues/17779
2. https://gitlab.com/wireshark/wireshark/-/issues/18734
3. https://www.wireshark.org/security/wnpa-sec-2023-09
4. https://gitlab.com/wireshark/wireshark/-/issues/18852
5. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992
6. https://www.wireshark.org/security/wnpa-sec-2023-10
7. https://gitlab.com/wireshark/wireshark/-/issues/18900
8. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993
9. https://www.wireshark.org/security/wnpa-sec-2023-11
10. https://gitlab.com/wireshark/wireshark/-/issues/18947
11. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994
12. https://gitlab.com/wireshark/wireshark/-/issues/18862
13. https://gitlab.com/wireshark/wireshark/-/issues/18879
14. https://gitlab.com/wireshark/wireshark/-/issues/18883
15. https://gitlab.com/wireshark/wireshark/-/issues/18904
16. https://gitlab.com/wireshark/wireshark/-/issues/18917
17. https://gitlab.com/wireshark/wireshark/-/issues/18934
18. https://gitlab.com/wireshark/wireshark/-/issues/18943
19. https://gitlab.com/wireshark/wireshark/-/issues/18967
20. https://gitlab.com/wireshark/wireshark/-/issues/18973
21. https://gitlab.com/wireshark/wireshark/-/issues/18975
22. https://www.wireshark.org/download.html
23. https://ask.wireshark.org/
24. https://www.wireshark.org/lists/
25. https://gitlab.com/wireshark/wireshark/-/issues
26. https://sharkfest.wireshark.org
27. https://wiresharkfoundation.org
28. https://www.wireshark.org/faq.html
Digests
wireshark-4.0.5.tar.xz: 41401932 bytes
SHA256(wireshark-4.0.5.tar.xz)=71b67346935fea4968c68efcae0371c06b30770d6396419c10bc443aac196b29
SHA1(wireshark-4.0.5.tar.xz)=2a0d489480b1a6dd002487b4ba3a8172f58402d9
Wireshark-win64-4.0.5.exe: 78786632 bytes
SHA256(Wireshark-win64-4.0.5.exe)=3164b91cc3f08268a795090c8478fcf80e741d3e620f06e8441e0f9d4418ac4f
SHA1(Wireshark-win64-4.0.5.exe)=7b5c2abbf67f3c85c9867cd7b56c5cb72ce4724b
Wireshark-win64-4.0.5.msi: 52408320 bytes
SHA256(Wireshark-win64-4.0.5.msi)=2178acdb1abb5d9454eaac59d99f1df8d499ed56d97436e200dbb3267cbf663b
SHA1(Wireshark-win64-4.0.5.msi)=57d509566ba6f345cb7c2240f013bbcc05d23a4f
WiresharkPortable64_4.0.5.paf.exe: 45552584 bytes
SHA256(WiresharkPortable64_4.0.5.paf.exe)=4495c527adade0eba2843c1170f46501a5f0d6d707c44d16938de3f52cfcce0f
SHA1(WiresharkPortable64_4.0.5.paf.exe)=30d69b9a8322dd1512a5ee45f9879932b2b73754
Wireshark 4.0.5 Arm 64.dmg: 64609596 bytes
SHA256(Wireshark 4.0.5 Arm 64.dmg)=9e1fe26810cafa7717cbb7e09e4534eeddd6de0699eed365e355309a4c5f9801
SHA1(Wireshark 4.0.5 Arm 64.dmg)=b2ae4923db58bc859a81d34c4bc787abebf53d81
Wireshark 4.0.5 Intel 64.dmg: 68094828 bytes
SHA256(Wireshark 4.0.5 Intel 64.dmg)=83c1962d7b0293adcfb4aaeff93ea2bf4970e124425e0aba33f90c840d210145
SHA1(Wireshark 4.0.5 Intel 64.dmg)=5f738fc11785f57211cf054692c4ba8e83dbd1c3
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
OpenPGP_signature
Description: OpenPGP digital signature
- Next by Date: [Wireshark-announce] Wireshark 3.6.13 is now available
- Next by thread: [Wireshark-announce] Wireshark 3.6.13 is now available
- Index(es):