Wireshark-announce: [Wireshark-announce] Wireshark 4.0.13 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 14 Feb 2024 13:26:46 -0800
I'm proud to announce the release of Wireshark 4.0.13. What is Wireshark? Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What’s New We do not ship official 32-bit Windows packages for Wireshark 4.0 and later. If you need to use Wireshark on that platform, we recommend using the latest 3.6 release. Issue 17779[1] If you’re running Wireshark on macOS and upgraded to macOS 13 from an earlier version, you might have to open and run the “Uninstall ChmodBPF” package, then open and run “Install ChmodBPF” in order to reset the ChmodBPF Launch Daemon. Issue 18734[2]. Bug Fixes The following vulnerabilities have been fixed: The following bugs have been fixed: • Capture start fails when file set enabled and file extension not supplied if directory contains a period. Issue 14614[3]. • Cannot drag and move custom filter buttons in toolbar. Issue 19447[4]. • sshdump fails to connect with private key (ssh-rsa) Issue 19510[5]. • Can’t open a snoop file from the Open dialog box unless I select "All files" as the file type. Issue 19565[6]. • Updater for 4.2.1 hangs. Issue 19568[7]. • Incorrect recursion depth assert failure when dissecting a legitimate GOOSE message. Issue 19580[8]. • TFTP dissector bug type listed as netscii instead of netascii doesn’t show all TFTP packets including TFTP blocks. Issue 19589[9]. • ciscodump - older SSH key exchange algorithms not supported. Issue 19594[10]. • CFLOW: failure to decode 0 length data fields of IPFIX variable length data types. Issue 19605[11]. New and Updated Features There are no new or updated features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support CFLOW, CMIP, DAP, DISP, GLOW, GOOSE, H.225, H.245, H.248, IEEE 1609.2, IPv4, IPv6, ISUP, ITS, Kerberos, LDAP, MMS, P22, P7, PARLAY, RSVP, RTMPT, SOME/IP, TCP, TFTP, X.509if, X.509sat, X11, Z39.50, and ZigBee Green Power New and Updated Capture File Support New File Format Decoding Support There is no new or updated file format support in this release. Prior Versions This document only describes the changes introduced in Wireshark 4.0.13. You can find release notes for prior versions at the following locations: • Wireshark 4.0.12[12] • Wireshark 4.0.11[13] • Wireshark 4.0.10[14] • Wireshark 4.0.9[15] • Wireshark 4.0.8[16] • Wireshark 4.0.7[17] • Wireshark 4.0.6[18] • Wireshark 4.0.5[19] • Wireshark 4.0.4[20] • Wireshark 4.0.3[21] • Wireshark 4.0.2[22] • Wireshark 4.0.1[23] • Wireshark 4.0.0[24] Getting Wireshark Wireshark source code and installation packages are available from https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page[25] on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use "Help › About Wireshark › Folders" or `tshark -G folders` to find the default locations on your system. Getting Help The User’s Guide, manual pages and various other documentation can be found at https://www.wireshark.org/docs/ Community support is available on Wireshark’s Q&A site[26] and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark’s mailing lists can be found on the web site[27]. Bugs and feature requests can be reported on the issue tracker[28]. You can learn protocol analysis and meet Wireshark’s developers at SharkFest[29]. How You Can Help The Wireshark Foundation helps as many people as possible understand their networks as much as possible. You can find out more and donate at wiresharkfoundation.org[30]. Frequently Asked Questions A complete FAQ is available on the Wireshark web site[31]. References 1. https://gitlab.com/wireshark/wireshark/-/issues/17779 2. https://gitlab.com/wireshark/wireshark/-/issues/18734 3. https://gitlab.com/wireshark/wireshark/-/issues/14614 4. https://gitlab.com/wireshark/wireshark/-/issues/19447 5. https://gitlab.com/wireshark/wireshark/-/issues/19510 6. https://gitlab.com/wireshark/wireshark/-/issues/19565 7. https://gitlab.com/wireshark/wireshark/-/issues/19568 8. https://gitlab.com/wireshark/wireshark/-/issues/19580 9. https://gitlab.com/wireshark/wireshark/-/issues/19589 10. https://gitlab.com/wireshark/wireshark/-/issues/19594 11. https://gitlab.com/wireshark/wireshark/-/issues/19605 12. https://www.wireshark.org/docs/relnotes/wireshark-4.0.12.html 13. https://www.wireshark.org/docs/relnotes/wireshark-4.0.11.html 14. https://www.wireshark.org/docs/relnotes/wireshark-4.0.10.html 15. https://www.wireshark.org/docs/relnotes/wireshark-4.0.9.html 16. https://www.wireshark.org/docs/relnotes/wireshark-4.0.8.html 17. https://www.wireshark.org/docs/relnotes/wireshark-4.0.7.html 18. https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html 19. https://www.wireshark.org/docs/relnotes/wireshark-4.0.5.html 20. https://www.wireshark.org/docs/relnotes/wireshark-4.0.4.html 21. https://www.wireshark.org/docs/relnotes/wireshark-4.0.3.html 22. https://www.wireshark.org/docs/relnotes/wireshark-4.0.2.html 23. https://www.wireshark.org/docs/relnotes/wireshark-4.0.1.html 24. https://www.wireshark.org/docs/relnotes/wireshark-4.0.0.html 25. https://www.wireshark.org/download.html 26. https://ask.wireshark.org/ 27. https://www.wireshark.org/lists/ 28. https://gitlab.com/wireshark/wireshark/-/issues 29. https://sharkfest.wireshark.org 30. https://wiresharkfoundation.org 31. https://www.wireshark.org/faq.html Digests wireshark-4.0.13.tar.xz: 43173760 bytes SHA256(wireshark-4.0.13.tar.xz)=289e8c6682a832ad2cb6181ac51a2fdf2394b9a243d0c2a395110c4416c60487 SHA1(wireshark-4.0.13.tar.xz)=effc54c8e1901b5b429446d0e6216eeb50afc5b9 Wireshark-win64-4.0.13.exe: 79754560 bytes SHA256(Wireshark-win64-4.0.13.exe)=bf04addb928c57fd5ea707f7c68a24fb5c760556c339c8a28532f3b5b0f27847 SHA1(Wireshark-win64-4.0.13.exe)=5b81def22518bb1df77a14867bf3bae9509d8cd1 Wireshark-win64-4.0.13.msi: 54673408 bytes SHA256(Wireshark-win64-4.0.13.msi)=3e0800d1ba6c297cbcc24cc50d5f53abee06122d27efb6bebdafa74892605284 SHA1(Wireshark-win64-4.0.13.msi)=adf38bd0ccdce361f9ba0d959f41e58167eb74b9 WiresharkPortable64_4.0.13.paf.exe: 46887760 bytes SHA256(WiresharkPortable64_4.0.13.paf.exe)=35d3d2fac10de1c6a74bb21874679d1ac13f452d84efedee4ea7961bdbd886dd SHA1(WiresharkPortable64_4.0.13.paf.exe)=4263c6e1fb4974d64c28cfdddf6abd65c57dc5d5 Wireshark 4.0.13 Arm 64.dmg: 65019378 bytes SHA256(Wireshark 4.0.13 Arm 64.dmg)=dd8dd9794cb9e489fec2106e45af766ca14069ab28838e405fc35ffe6ef5bf07 SHA1(Wireshark 4.0.13 Arm 64.dmg)=73fe7f2dafeee4db348434784cc618b05a6ea485 Wireshark 4.0.13 Intel 64.dmg: 69013320 bytes SHA256(Wireshark 4.0.13 Intel 64.dmg)=e7fc30ab626b505fd7e942bc27fb747d22cec5c656cbf9bb09a3680bdae46e09 SHA1(Wireshark 4.0.13 Intel 64.dmg)=863c3fc13f15418ee7346fb158d8ea7d5d28a57a You can validate these hashes using the following commands (among others): Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256 Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg" Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
OpenPGP_signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-announce] Wireshark 4.2.3 is now available
- Next by Date: [Wireshark-announce] Wireshark 3.6.21 is now available
- Previous by thread: [Wireshark-announce] Wireshark 4.2.3 is now available
- Next by thread: [Wireshark-announce] Wireshark 3.6.21 is now available
- Index(es):