Wireshark-announce: [Wireshark-announce] Wireshark 4.0.12 is now available

From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 3 Jan 2024 12:29:06 -0800
I'm proud to announce the release of Wireshark 4.0.12.


 What is Wireshark?

  Wireshark is the world’s most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What’s New

  We do not ship official 32-bit Windows packages for Wireshark 4.0 and
  later. If you need to use Wireshark on that platform, we recommend
  using the latest 3.6 release. Issue 17779[1]

  If you’re running Wireshark on macOS and upgraded to macOS 13 from an
  earlier version, you might have to open and run the “Uninstall
  ChmodBPF” package, then open and run “Install ChmodBPF” in order to
  reset the ChmodBPF Launch Daemon. Issue 18734[2].

  Bug Fixes

   The following vulnerabilities have been fixed:

     • wnpa-sec-2024-01[3] GVCP dissector crash. Issue 19496[4].
       CVE-2024-0208[5].

     • wnpa-sec-2024-02[6] IEEE 1609.2 dissector crash. Issue 19501[7].
       CVE-2024-0209[8].

   The following bugs have been fixed:

     • Capture filters not saved to recently used list. Issue 12918[9].

     • OSS-Fuzz 64290: wireshark:fuzzshark_ip: Global-buffer-overflow in
       dissect_zcl_read_attr_struct. Issue 19490[10].

     • Segfault when enabling monitor mode on wireless card that falsely
       claims to support it. Issue 16693[11].

     • Selection highlight lost when interface list is sorted. Issue
       19133[12].

     • Capture filter compilation fails with obscure error message.
       Issue 19480[13].

     • GigE-vision: Control Protocol shows \"unknown\" as value for
       ASCII character set. Issue 19494[14].

     • NFLOG timestamp is incorrect. Issue 19525[15].

     • Qt6 Crash (Double Free) When Attempting to Save TCP Stream Graph.
       Issue 19529[16].

  New and Updated Features

   There are no new or updated features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

  New and Updated Capture File Support

   There is no new or updated capture file support in this release.

   pcapng: the if_tsoffset option is now supported.

  New File Format Decoding Support

   There is no new or updated file format support in this release.

 Prior Versions

  This document only describes the changes introduced in Wireshark
  4.0.12. You can find release notes for prior versions at the following
  locations:

    • Wireshark 4.0.11[17]

    • Wireshark 4.0.10[18]

    • Wireshark 4.0.9[19]

    • Wireshark 4.0.8[20]

    • Wireshark 4.0.7[21]

    • Wireshark 4.0.6[22]

    • Wireshark 4.0.5[23]

    • Wireshark 4.0.4[24]

    • Wireshark 4.0.3[25]

    • Wireshark 4.0.2[26]

    • Wireshark 4.0.1[27]

    • Wireshark 4.0.0[28]

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[29] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use "Help › About
  Wireshark › Folders" or `tshark -G folders` to find the default
  locations on your system.

 Getting Help

  The User’s Guide, manual pages and various other documentation can be
  found at https://www.wireshark.org/docs/

  Community support is available on Wireshark’s Q&A site[30] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark’s mailing lists can be found on the web site[31].

  Bugs and feature requests can be reported on the issue tracker[32].

  You can learn protocol analysis and meet Wireshark’s developers at
  SharkFest[33].

 How You Can Help

  The Wireshark Foundation helps as many people as possible understand
  their networks as much as possible. You can find out more and donate
  at wiresharkfoundation.org[34].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[35].

 References

   1. https://gitlab.com/wireshark/wireshark/-/issues/17779
   2. https://gitlab.com/wireshark/wireshark/-/issues/18734
   3. https://www.wireshark.org/security/wnpa-sec-2024-01
   4. https://gitlab.com/wireshark/wireshark/-/issues/19496
   5. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208
   6. https://www.wireshark.org/security/wnpa-sec-2024-02
   7. https://gitlab.com/wireshark/wireshark/-/issues/19501
   8. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209
   9. https://gitlab.com/wireshark/wireshark/-/issues/12918
  10. https://gitlab.com/wireshark/wireshark/-/issues/19490
  11. https://gitlab.com/wireshark/wireshark/-/issues/16693
  12. https://gitlab.com/wireshark/wireshark/-/issues/19133
  13. https://gitlab.com/wireshark/wireshark/-/issues/19480
  14. https://gitlab.com/wireshark/wireshark/-/issues/19494
  15. https://gitlab.com/wireshark/wireshark/-/issues/19525
  16. https://gitlab.com/wireshark/wireshark/-/issues/19529
  17. https://www.wireshark.org/docs/relnotes/wireshark-4.0.11.html
  18. https://www.wireshark.org/docs/relnotes/wireshark-4.0.10.html
  19. https://www.wireshark.org/docs/relnotes/wireshark-4.0.9.html
  20. https://www.wireshark.org/docs/relnotes/wireshark-4.0.8.html
  21. https://www.wireshark.org/docs/relnotes/wireshark-4.0.7.html
  22. https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
  23. https://www.wireshark.org/docs/relnotes/wireshark-4.0.5.html
  24. https://www.wireshark.org/docs/relnotes/wireshark-4.0.4.html
  25. https://www.wireshark.org/docs/relnotes/wireshark-4.0.3.html
  26. https://www.wireshark.org/docs/relnotes/wireshark-4.0.2.html
  27. https://www.wireshark.org/docs/relnotes/wireshark-4.0.1.html
  28. https://www.wireshark.org/docs/relnotes/wireshark-4.0.0.html
  29. https://www.wireshark.org/download.html
  30. https://ask.wireshark.org/
  31. https://www.wireshark.org/lists/
  32. https://gitlab.com/wireshark/wireshark/-/issues
  33. https://sharkfest.wireshark.org
  34. https://wiresharkfoundation.org
  35. https://www.wireshark.org/faq.html


Digests

wireshark-4.0.12.tar.xz: 43166188 bytes
SHA256(wireshark-4.0.12.tar.xz)=e4e3d618ba11e159fb163f0dc4716a8b72a065aafd1111db9405332552a5a115
SHA1(wireshark-4.0.12.tar.xz)=e00d90769995bf786b05c05bdd9a2c6c8e372e70

Wireshark-win64-4.0.12.exe: 79718040 bytes
SHA256(Wireshark-win64-4.0.12.exe)=f7731261762be8161ee29f542c432ae2a23f91542ad00b72c11f58589ac007fc
SHA1(Wireshark-win64-4.0.12.exe)=ce315edd62c7cc4290868e3ad89ada45549d5cf5

Wireshark-win64-4.0.12.msi: 54468608 bytes
SHA256(Wireshark-win64-4.0.12.msi)=ac2411daf0b47a115147f6e843938e695a5c32074fa1824ff8b10b9071bfe165
SHA1(Wireshark-win64-4.0.12.msi)=fd6a56656b66ef710438810441580d4e5b9b692b

WiresharkPortable64_4.0.12.paf.exe: 46865232 bytes
SHA256(WiresharkPortable64_4.0.12.paf.exe)=66e1a47ed537044ff5d8cded2aec376e9c60f55a544139e1821a0df4106e1dea
SHA1(WiresharkPortable64_4.0.12.paf.exe)=6b7403fd1aef804a6758f8e657752e489839d474

Wireshark 4.0.12 Arm 64.dmg: 65072847 bytes
SHA256(Wireshark 4.0.12 Arm 64.dmg)=9d8ded81abde519f56f98295406e053356c5ea39ed0135d9cd5d036e5fe410ab
SHA1(Wireshark 4.0.12 Arm 64.dmg)=19e9881fba3ad918d7285d760a0036adfaadd92c

Wireshark 4.0.12 Intel 64.dmg: 68650546 bytes
SHA256(Wireshark 4.0.12 Intel 64.dmg)=922726230dc8afcbbfcd4da6cdfaac319296ea463f8b1b43555d007446513748
SHA1(Wireshark 4.0.12 Intel 64.dmg)=183a4a5ad2eed87a067398dac3616eb168b5a44e

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature