Wireshark-announce: [Wireshark-announce] Wireshark 4.0.13 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 14 Feb 2024 13:26:46 -0800
I'm proud to announce the release of Wireshark 4.0.13.
What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
What’s New
We do not ship official 32-bit Windows packages for Wireshark 4.0 and
later. If you need to use Wireshark on that platform, we recommend
using the latest 3.6 release. Issue 17779[1]
If you’re running Wireshark on macOS and upgraded to macOS 13 from an
earlier version, you might have to open and run the “Uninstall
ChmodBPF” package, then open and run “Install ChmodBPF” in order to
reset the ChmodBPF Launch Daemon. Issue 18734[2].
Bug Fixes
The following vulnerabilities have been fixed:
The following bugs have been fixed:
• Capture start fails when file set enabled and file extension not
supplied if directory contains a period. Issue 14614[3].
• Cannot drag and move custom filter buttons in toolbar. Issue
19447[4].
• sshdump fails to connect with private key (ssh-rsa) Issue
19510[5].
• Can’t open a snoop file from the Open dialog box unless I select
"All files" as the file type. Issue 19565[6].
• Updater for 4.2.1 hangs. Issue 19568[7].
• Incorrect recursion depth assert failure when dissecting a
legitimate GOOSE message. Issue 19580[8].
• TFTP dissector bug type listed as netscii instead of netascii
doesn’t show all TFTP packets including TFTP blocks. Issue
19589[9].
• ciscodump - older SSH key exchange algorithms not supported.
Issue 19594[10].
• CFLOW: failure to decode 0 length data fields of IPFIX variable
length data types. Issue 19605[11].
New and Updated Features
There are no new or updated features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
CFLOW, CMIP, DAP, DISP, GLOW, GOOSE, H.225, H.245, H.248, IEEE
1609.2, IPv4, IPv6, ISUP, ITS, Kerberos, LDAP, MMS, P22, P7, PARLAY,
RSVP, RTMPT, SOME/IP, TCP, TFTP, X.509if, X.509sat, X11, Z39.50, and
ZigBee Green Power
New and Updated Capture File Support
New File Format Decoding Support
There is no new or updated file format support in this release.
Prior Versions
This document only describes the changes introduced in Wireshark
4.0.13. You can find release notes for prior versions at the following
locations:
• Wireshark 4.0.12[12]
• Wireshark 4.0.11[13]
• Wireshark 4.0.10[14]
• Wireshark 4.0.9[15]
• Wireshark 4.0.8[16]
• Wireshark 4.0.7[17]
• Wireshark 4.0.6[18]
• Wireshark 4.0.5[19]
• Wireshark 4.0.4[20]
• Wireshark 4.0.3[21]
• Wireshark 4.0.2[22]
• Wireshark 4.0.1[23]
• Wireshark 4.0.0[24]
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[25] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use "Help › About
Wireshark › Folders" or `tshark -G folders` to find the default
locations on your system.
Getting Help
The User’s Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/
Community support is available on Wireshark’s Q&A site[26] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark’s mailing lists can be found on the web site[27].
Bugs and feature requests can be reported on the issue tracker[28].
You can learn protocol analysis and meet Wireshark’s developers at
SharkFest[29].
How You Can Help
The Wireshark Foundation helps as many people as possible understand
their networks as much as possible. You can find out more and donate
at wiresharkfoundation.org[30].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[31].
References
1. https://gitlab.com/wireshark/wireshark/-/issues/17779
2. https://gitlab.com/wireshark/wireshark/-/issues/18734
3. https://gitlab.com/wireshark/wireshark/-/issues/14614
4. https://gitlab.com/wireshark/wireshark/-/issues/19447
5. https://gitlab.com/wireshark/wireshark/-/issues/19510
6. https://gitlab.com/wireshark/wireshark/-/issues/19565
7. https://gitlab.com/wireshark/wireshark/-/issues/19568
8. https://gitlab.com/wireshark/wireshark/-/issues/19580
9. https://gitlab.com/wireshark/wireshark/-/issues/19589
10. https://gitlab.com/wireshark/wireshark/-/issues/19594
11. https://gitlab.com/wireshark/wireshark/-/issues/19605
12. https://www.wireshark.org/docs/relnotes/wireshark-4.0.12.html
13. https://www.wireshark.org/docs/relnotes/wireshark-4.0.11.html
14. https://www.wireshark.org/docs/relnotes/wireshark-4.0.10.html
15. https://www.wireshark.org/docs/relnotes/wireshark-4.0.9.html
16. https://www.wireshark.org/docs/relnotes/wireshark-4.0.8.html
17. https://www.wireshark.org/docs/relnotes/wireshark-4.0.7.html
18. https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
19. https://www.wireshark.org/docs/relnotes/wireshark-4.0.5.html
20. https://www.wireshark.org/docs/relnotes/wireshark-4.0.4.html
21. https://www.wireshark.org/docs/relnotes/wireshark-4.0.3.html
22. https://www.wireshark.org/docs/relnotes/wireshark-4.0.2.html
23. https://www.wireshark.org/docs/relnotes/wireshark-4.0.1.html
24. https://www.wireshark.org/docs/relnotes/wireshark-4.0.0.html
25. https://www.wireshark.org/download.html
26. https://ask.wireshark.org/
27. https://www.wireshark.org/lists/
28. https://gitlab.com/wireshark/wireshark/-/issues
29. https://sharkfest.wireshark.org
30. https://wiresharkfoundation.org
31. https://www.wireshark.org/faq.html
Digests
wireshark-4.0.13.tar.xz: 43173760 bytes
SHA256(wireshark-4.0.13.tar.xz)=289e8c6682a832ad2cb6181ac51a2fdf2394b9a243d0c2a395110c4416c60487
SHA1(wireshark-4.0.13.tar.xz)=effc54c8e1901b5b429446d0e6216eeb50afc5b9
Wireshark-win64-4.0.13.exe: 79754560 bytes
SHA256(Wireshark-win64-4.0.13.exe)=bf04addb928c57fd5ea707f7c68a24fb5c760556c339c8a28532f3b5b0f27847
SHA1(Wireshark-win64-4.0.13.exe)=5b81def22518bb1df77a14867bf3bae9509d8cd1
Wireshark-win64-4.0.13.msi: 54673408 bytes
SHA256(Wireshark-win64-4.0.13.msi)=3e0800d1ba6c297cbcc24cc50d5f53abee06122d27efb6bebdafa74892605284
SHA1(Wireshark-win64-4.0.13.msi)=adf38bd0ccdce361f9ba0d959f41e58167eb74b9
WiresharkPortable64_4.0.13.paf.exe: 46887760 bytes
SHA256(WiresharkPortable64_4.0.13.paf.exe)=35d3d2fac10de1c6a74bb21874679d1ac13f452d84efedee4ea7961bdbd886dd
SHA1(WiresharkPortable64_4.0.13.paf.exe)=4263c6e1fb4974d64c28cfdddf6abd65c57dc5d5
Wireshark 4.0.13 Arm 64.dmg: 65019378 bytes
SHA256(Wireshark 4.0.13 Arm 64.dmg)=dd8dd9794cb9e489fec2106e45af766ca14069ab28838e405fc35ffe6ef5bf07
SHA1(Wireshark 4.0.13 Arm 64.dmg)=73fe7f2dafeee4db348434784cc618b05a6ea485
Wireshark 4.0.13 Intel 64.dmg: 69013320 bytes
SHA256(Wireshark 4.0.13 Intel 64.dmg)=e7fc30ab626b505fd7e942bc27fb747d22cec5c656cbf9bb09a3680bdae46e09
SHA1(Wireshark 4.0.13 Intel 64.dmg)=863c3fc13f15418ee7346fb158d8ea7d5d28a57a
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
OpenPGP_signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-announce] Wireshark 4.2.3 is now available
- Next by Date: [Wireshark-announce] Wireshark 3.6.21 is now available
- Previous by thread: [Wireshark-announce] Wireshark 4.2.3 is now available
- Next by thread: [Wireshark-announce] Wireshark 3.6.21 is now available
- Index(es):