Wireshark-announce: [Wireshark-announce] Wireshark 3.6.13 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 12 Apr 2023 12:42:18 -0700
I'm proud to announce the release of Wireshark 3.6.13.
What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
What’s New
This is the last release branch with support for 32-bit Windows.
Updates will no longer be available after May 22, 2024 for that
platform. Issue 17779[1]
If you’re running Wireshark on macOS and upgraded to macOS 13 from an
earlier version, you will likely have to open and run the “Uninstall
ChmodBPF” package, then open and run “Install ChmodBPF” in order to
reset the ChmodBPF Launch Daemon. Issue 18734[2].
Bug Fixes
The following vulnerabilities have been fixed:
• wnpa-sec-2023-09[3] RPCoRDMA dissector crash. Issue 18852[4].
CVE-2023-1992[5].
• wnpa-sec-2023-10[6] LISP dissector large loop. Issue 18900[7].
CVE-2023-1993[8].
• wnpa-sec-2023-11[9] GQUIC dissector crash Issue 18947[10].
CVE-2023-1994[11].
The following bugs have been fixed:
• Wireshark ITS Dissector RTCMEM wrong protocol version selector 2
- should use 1 Issue 18862[12].
• Wireshark treats the letter E in SSRC as an exponential
representation of a number Issue 18879[13].
• VNC RRE Parser skips over data Issue 18883[14].
• Fuzz job crash output: fuzz-2023-03-27-7564.pcap Issue 18934[15].
• Fuzz job crash output: fuzz-2023-03-31-6903.pcap Issue 18947[16].
• RTP analysis shows incorrect timestamp error when timestamp is
rolled over Issue 18973[17].
New and Updated Features
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
DNS, ERF, FF, genl, GQUIC, GSM A-bis OML, HL7, IEEE 802.11, ITS, ITS,
LISP, netlink, netlink-netfilter, netlink-sock_diag, nl80211, RLC,
RPCoRDMA, RTPS, SCTP, SMB, VNC, and WCP
New and Updated Capture File Support
Netmon and NetScaler
New File Format Decoding Support
There is no new or updated file format support in this release.
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[18] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use "Help › About
Wireshark › Folders" or `tshark -G folders` to find the default
locations on your system.
Getting Help
The User’s Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/
Community support is available on Wireshark’s Q&A site[19] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark’s mailing lists can be found on the web site[20].
Bugs and feature requests can be reported on the issue tracker[21].
How You Can Help
The Wireshark Foundation helps as many people as possible understand
their networks as much as possible. You can find out more and donate
at wiresharkfoundation.org[22].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[23].
References
1. https://gitlab.com/wireshark/wireshark/-/issues/17779
2. https://gitlab.com/wireshark/wireshark/-/issues/18734
3. https://www.wireshark.org/security/wnpa-sec-2023-09
4. https://gitlab.com/wireshark/wireshark/-/issues/18852
5. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992
6. https://www.wireshark.org/security/wnpa-sec-2023-10
7. https://gitlab.com/wireshark/wireshark/-/issues/18900
8. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993
9. https://www.wireshark.org/security/wnpa-sec-2023-11
10. https://gitlab.com/wireshark/wireshark/-/issues/18947
11. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994
12. https://gitlab.com/wireshark/wireshark/-/issues/18862
13. https://gitlab.com/wireshark/wireshark/-/issues/18879
14. https://gitlab.com/wireshark/wireshark/-/issues/18883
15. https://gitlab.com/wireshark/wireshark/-/issues/18934
16. https://gitlab.com/wireshark/wireshark/-/issues/18947
17. https://gitlab.com/wireshark/wireshark/-/issues/18973
18. https://www.wireshark.org/download.html
19. https://ask.wireshark.org/
20. https://www.wireshark.org/lists/
21. https://gitlab.com/wireshark/wireshark/-/issues
22. https://wiresharkfoundation.org
23. https://www.wireshark.org/faq.html
Digests
wireshark-3.6.13.tar.xz: 39982176 bytes
SHA256(wireshark-3.6.13.tar.xz)=4e251b0b9a23554745c93d68d3073b92e880f1918ee482208c620335c1bd6004
SHA1(wireshark-3.6.13.tar.xz)=972fcdaf1057227ec3d292454e5de73e70f62fa0
Wireshark-win64-3.6.13.exe: 77376592 bytes
SHA256(Wireshark-win64-3.6.13.exe)=f5de08a7cca07cba8e9cb1c586a93f2894b0f538755c5db7b89a3566b1d3b110
SHA1(Wireshark-win64-3.6.13.exe)=ce2cca3360294bf077170998d32f9c8a7408a5b4
Wireshark-win32-3.6.13.exe: 61178368 bytes
SHA256(Wireshark-win32-3.6.13.exe)=3fea0f2e6dd037a1a06b5e9e70fee317536d84fc07e01817a08299eb2dfef6f5
SHA1(Wireshark-win32-3.6.13.exe)=156c3eb5fcac39b95e9475a507d620c92bc5480a
Wireshark-win32-3.6.13.msi: 45735936 bytes
SHA256(Wireshark-win32-3.6.13.msi)=fb6edb1236c2323924891c1680e8ef3fe86b39c62f698c0278ba99630cb39cb3
SHA1(Wireshark-win32-3.6.13.msi)=0631ccb3b53e586dccccdbf8ddbc50ef06212b04
Wireshark-win64-3.6.13.msi: 51134464 bytes
SHA256(Wireshark-win64-3.6.13.msi)=04f4c653bef0fd670254a6c7096df625cd2b1fbc0106b0ca3be228d72bff18c8
SHA1(Wireshark-win64-3.6.13.msi)=d91c28f95d08c401636a39e4945a306e7732aaf3
WiresharkPortable32_3.6.13.paf.exe: 39758048 bytes
SHA256(WiresharkPortable32_3.6.13.paf.exe)=abbd0150cd74eb82a0924e164bde1f130d1d8aff38f83378dda3241baf9f36c5
SHA1(WiresharkPortable32_3.6.13.paf.exe)=0b7189730bbcb3d1115048ae3edb826245a141a1
WiresharkPortable64_3.6.13.paf.exe: 44503616 bytes
SHA256(WiresharkPortable64_3.6.13.paf.exe)=d292c9e7c6d524e570daa61f41bc1d957d6796181baf3ece9261187ae9c6acb9
SHA1(WiresharkPortable64_3.6.13.paf.exe)=dbdc62941f3a5d0c5b96345d0c2f7bde3605528f
Wireshark 3.6.13 Arm 64.dmg: 141855513 bytes
SHA256(Wireshark 3.6.13 Arm 64.dmg)=7b1bb9fc1d22a56df4ae51ac27a0847dc1ab56de35ac156540d0a87a586f5225
SHA1(Wireshark 3.6.13 Arm 64.dmg)=7c62bf381a109a0fa798da3fc6853a00548025d7
Wireshark 3.6.13 Intel 64.dmg: 142103965 bytes
SHA256(Wireshark 3.6.13 Intel 64.dmg)=b4466d351da679c990fee4ad0fddf8d88a57aa2d182a8e53352791ac1da7f2c0
SHA1(Wireshark 3.6.13 Intel 64.dmg)=9c6d6e2579571916334aa6396541c55d3a953ac9
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
OpenPGP_signature
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-announce] Wireshark 4.0.5 is now available
- Previous by thread: [Wireshark-announce] Wireshark 4.0.5 is now available
- Index(es):