Wireshark-announce: [Wireshark-announce] Wireshark 4.0.14 is now available

From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 27 Mar 2024 14:35:35 -0700
I'm proud to announce the release of Wireshark 4.0.14.


 What is Wireshark?

  Wireshark is the world’s most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What’s New

  We do not ship official 32-bit Windows packages for Wireshark 4.0 and
  later. If you need to use Wireshark on that platform, we recommend
  using the latest 3.6 release. Issue 17779[1]

  If you’re running Wireshark on macOS and upgraded to macOS 13 from an
  earlier version, you might have to open and run the “Uninstall
  ChmodBPF” package, then open and run “Install ChmodBPF” in order to
  reset the ChmodBPF Launch Daemon. Issue 18734[2].

  Bug Fixes

   The following vulnerabilities have been fixed:

     • wnpa-sec-2024-06[3] T.38 dissector crash. Issue 19695[4].
       CVE-2024-2955[5].

   The following bugs have been fixed:

     • Packet Dissection CSV Export includes last column even if hidden.
       Issue 19666[6].

     • Fuzz job issue: fuzz-2024-03-03-7204.pcap. Issue 19685[7].

     • Fuzz job issue: randpkt-2024-03-05-8004.pcap. Issue 19688[8].

     • '--export-objects' does not work as expected on tshark version
       later than 3.2.10. Issue 19715[9].

     • Fuzz job issue: fuzz-2024-03-21-7215.pcap. Issue 19717[10].

  New and Updated Features

   There are no new or updated features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   5GLI, 6LoWPAN, AFP, AllJoyn, AMQP, ASAP, Babel, BACnet, Banana, BEEP,
   Bencode, BFCP, BGP, BT BNEP, BT SDP, BT-DHT, BVLC, CFLOW, CIP, CMIP,
   CMP, COROSYNC/TOTEMSRP, COSE, CQL, CSN.1, DAP, DCOM, DHCPv6, DICOM,
   DISP, DOCSIS MAC MGMT, DOF, DVB-S2, EDONKEY, ErlDP, Etch, EXTREME
   MESH, FC-SWILS, GIOP, GLOW, GNW, GOOSE, GQUIC, Gryphon, GSM A-bis
   OML, GSUP, GTPv2, H.223, H.225.0, H.245, H.248, H.264, H.265, HSMS,
   ICMPv6, ICQ, IEEE1609dot2, IPP, IPPUSB, ISAKMP, iSCSI, ISIS LSP, ISO
   7816, ISUP, ITS, JXTA, Kafka, KINK, KNX/IP, LDAP, LDP, LISP, LISP
   TCP, LLRP, LwM2M-TLV, M2UA, M3UA, MBIM, MMS, MONGO, MPEG PES, MPLS
   Echo, MQ PCF, MQTT-SN, MS-WSP, MSDP, MsgPack, NAS-5GS, NETLINK, NHRP,
   OpenFlow, OpenWire, OPSI, OSC, P22, P7, PANA, PIM, PNIO, ProtoBuf,
   PROXY, Q.2931, QNET, RDP, RESP, RPL, RSL, RSVP, RTLS, RTMPT, RTPS,
   S7COMM, SCTP, SIMULCRYPT, SMB2, SML, SNA, SNMP, Socks, SolarEdge,
   SOME/IP, SoulSeek, SUA, T.38, TCAP, TEAP, TFTP, Thread, TN5250,
   USBHID, USBVIDEO, VP9, WASSP, WiMAX ASN CP, WLCCP, WTP, X.509IF,
   X.509SAT, XML, XMPP, YAMI, Z39.50, and ZigBee ZCL

  New and Updated Capture File Support

  Updated File Format Decoding Support

   BLF, JPEG, and RBM

 Prior Versions

  This document only describes the changes introduced in Wireshark
  4.0.14. You can find release notes for prior versions at the following
  locations:

    • Wireshark 4.0.13[11]

    • Wireshark 4.0.12[12]

    • Wireshark 4.0.11[13]

    • Wireshark 4.0.10[14]

    • Wireshark 4.0.9[15]

    • Wireshark 4.0.8[16]

    • Wireshark 4.0.7[17]

    • Wireshark 4.0.6[18]

    • Wireshark 4.0.5[19]

    • Wireshark 4.0.4[20]

    • Wireshark 4.0.3[21]

    • Wireshark 4.0.2[22]

    • Wireshark 4.0.1[23]

    • Wireshark 4.0.0[24]

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[25] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use "Help › About
  Wireshark › Folders" or `tshark -G folders` to find the default
  locations on your system.

 Getting Help

  The User’s Guide, manual pages and various other documentation can be
  found at https://www.wireshark.org/docs/

  Community support is available on Wireshark’s Q&A site[26] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark’s mailing lists can be found on the web site[27].

  Bugs and feature requests can be reported on the issue tracker[28].

  You can learn protocol analysis and meet Wireshark’s developers at
  SharkFest[29].

 How You Can Help

  The Wireshark Foundation helps as many people as possible understand
  their networks as much as possible. You can find out more and donate
  at wiresharkfoundation.org[30].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[31].

 References

   1. https://gitlab.com/wireshark/wireshark/-/issues/17779
   2. https://gitlab.com/wireshark/wireshark/-/issues/18734
   3. https://www.wireshark.org/security/wnpa-sec-2024-06
   4. https://gitlab.com/wireshark/wireshark/-/issues/19695
   5. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955
   6. https://gitlab.com/wireshark/wireshark/-/issues/19666
   7. https://gitlab.com/wireshark/wireshark/-/issues/19685
   8. https://gitlab.com/wireshark/wireshark/-/issues/19688
   9. https://gitlab.com/wireshark/wireshark/-/issues/19715
  10. https://gitlab.com/wireshark/wireshark/-/issues/19717
  11. https://www.wireshark.org/docs/relnotes/wireshark-4.0.12.html
  12. https://www.wireshark.org/docs/relnotes/wireshark-4.0.12.html
  13. https://www.wireshark.org/docs/relnotes/wireshark-4.0.11.html
  14. https://www.wireshark.org/docs/relnotes/wireshark-4.0.10.html
  15. https://www.wireshark.org/docs/relnotes/wireshark-4.0.9.html
  16. https://www.wireshark.org/docs/relnotes/wireshark-4.0.8.html
  17. https://www.wireshark.org/docs/relnotes/wireshark-4.0.7.html
  18. https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
  19. https://www.wireshark.org/docs/relnotes/wireshark-4.0.5.html
  20. https://www.wireshark.org/docs/relnotes/wireshark-4.0.4.html
  21. https://www.wireshark.org/docs/relnotes/wireshark-4.0.3.html
  22. https://www.wireshark.org/docs/relnotes/wireshark-4.0.2.html
  23. https://www.wireshark.org/docs/relnotes/wireshark-4.0.1.html
  24. https://www.wireshark.org/docs/relnotes/wireshark-4.0.0.html
  25. https://www.wireshark.org/download.html
  26. https://ask.wireshark.org/
  27. https://www.wireshark.org/lists/
  28. https://gitlab.com/wireshark/wireshark/-/issues
  29. https://sharkfest.wireshark.org
  30. https://wiresharkfoundation.org
  31. https://www.wireshark.org/faq.html


Digests

wireshark-4.0.14.tar.xz: 43186416 bytes
SHA256(wireshark-4.0.14.tar.xz)=4281d2be7284abdfebb7e904c30921286ebd82613fced6e8a7428c456288e43b
SHA1(wireshark-4.0.14.tar.xz)=6f80581f4eebcd24048a58d4b52324d0010826d4

Wireshark-win64-4.0.14.exe: 79780304 bytes
SHA256(Wireshark-win64-4.0.14.exe)=bbcfde102a615413096cf15c4f4e2439e3e26b2b32ca5828c48ca0b318b33cc0
SHA1(Wireshark-win64-4.0.14.exe)=b80247c133d7d032d84c2b81565426765fb0d742

Wireshark-win64-4.0.14.msi: 54509568 bytes
SHA256(Wireshark-win64-4.0.14.msi)=a24719e3e146ff2cd18ed19da6c3733bdf503956e6cafee5e00083b696d12f3e
SHA1(Wireshark-win64-4.0.14.msi)=63345eb1ae1e6b46503270464707e0e34670285f

WiresharkPortable64_4.0.14.paf.exe: 46918912 bytes
SHA256(WiresharkPortable64_4.0.14.paf.exe)=a8494cfa55fbd63c7e9f1a71b2e8a18e32625123985210f190bb23ecbb7fc6b7
SHA1(WiresharkPortable64_4.0.14.paf.exe)=8e9884b2181c6cd4be74f4075d5d0486f5d58a1d

Wireshark 4.0.14 Arm 64.dmg: 65014083 bytes
SHA256(Wireshark 4.0.14 Arm 64.dmg)=3633c8142e8e1e049625724b2f8b229a97449e26f53dc1355cddea556ec84fab
SHA1(Wireshark 4.0.14 Arm 64.dmg)=fa81d928c25caf526d6dc4ad6ec5b313c552d4dc

Wireshark 4.0.14 Intel 64.dmg: 69029635 bytes
SHA256(Wireshark 4.0.14 Intel 64.dmg)=5ab8626f44a9b6d80cf8800974df7120464c511c104e521490db1ee05044a270
SHA1(Wireshark 4.0.14 Intel 64.dmg)=5229b65a957d997b14c4c4b8cc39f04807246f7e

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature