Wireshark-announce: [Wireshark-announce] Wireshark 4.4.14 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 25 Feb 2026 14:06:56 -0800
I'm proud to announce the release of Wireshark 4.4.14.
What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
Wireshark is hosted by the Wireshark Foundation, a nonprofit which
promotes protocol analysis education. Wireshark and the foundation
depend on your contributions in order to do their work! If you or your
organization would like to contribute or become a sponsor, please
visit wiresharkfoundation.org[1].
What’s New
Bug Fixes
The following vulnerabilities have been fixed:
• wnpa-sec-2026-05[2] USB HID dissector memory exhaustion. Issue
20972[3]. CVE-2026-3201[4].
• wnpa-sec-2026-07[5] RF4CE Profile dissector crash. Issue
21009[6]. CVE-2026-3203[7].
The following bugs have been fixed:
• Bug in decoding 5G NAS message - Extended CAG information list
IE. Issue 20946[8].
• PQC signature algorithm not reported in signature_algorithms.
Issue 20953[9].
• Unexpected JA4 ALPN values when space characters sent. Issue
20966[10].
• Expert Info seems to have quadratic performance (gets slower and
slower) Issue 20970[11].
• USB-HID: Resource exhaustion in parse_report_descriptor() due to
missing array size limit. Issue 20972[12].
• Fuzz job crash: fuzz-2026-02-01-12944805400.pcap [Zigbee Direct
Tunneling Zigbee NWK PDUs NULL hash table] Issue 20977[13].
• RDM status in Output Status (GoodOutputB) field incorrectly
decoded in Art-Net PollReply dissector. Issue 20980[14].
• TDS dissector desynchronizes on RPC DATENTYPE (0x28) due to
incorrect expectation of TYPE_VARLEN (MaxLen) Issue 21001[15].
• Only first HTTP POST is parsed inside SOCKS with "Decode As"
Issue 21006[16].
• Fuzz job crash: fuzz-2026-02-06-13021968622.pcap. Issue
21009[17].
• New Diameter RAT-Types in TS 29.212 not decoded. Issue 21012[18].
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
Art-Net, NAS-5GS, TDS, TECMP, USB HID, ZB TLV, and ZBD
New and Updated Capture File Support
BLF
New and Updated File Format Decoding Support
There is no updated file format support in this release.
Prior Versions
Wireshark 4.4.13 included the following changes. See the release
notes[19] for details:
• wnpa-sec-2026-01[20] BLF file parser crash. Issue 20880[21].
• wnpa-sec-2026-02[22] IEEE 802.11 dissector crash. Issue 20939[23].
• wnpa-sec-2026-03[24] SOME/IP-SD dissector crash. Issue 20945[25].
Wireshark 4.4.12 included the following changes. See the release
notes[26] for details:
• wnpa-sec-2025-07[27] HTTP3 dissector crash. Issue 20860[28].
CVE-2025-13945[29].
• wnpa-sec-2025-08[30] MEGACO dissector infinite loop. Issue
20884[31]. CVE-2025-13945[32].
• ws_base32_decode should be named *_encode ? Issue 20754[33].
• Stack buffer overflow in wiretap/ber.c (ber_open) Issue 20878[34].
• Fuzz job crash: fuzz-2025-11-30-12266121180.pcap. Issue 20883[35].
• Missing data in pinfo→cinfo in HomePlug message CM_ATTEN_CHAR.IND.
Issue 20893[36].
Wireshark 4.4.11 included the following changes. See the release
notes[37] for details:
• wnpa-sec-2025-06[38] Kafka dissector crash. Issue 20823[39].
• L2CAP dissector doesn’t understand retransmission mode. Issue
2241[40].
• DNS HIP dissector labels PK algorithm as HIT length. Issue
20768[41].
• TLS Abbreviated Handshake Using New Session Ticket. Issue
20802[42].
• Apply As Filter for field with FT_NONE and BASE_NONE for a single
byte does not use the hex value. Issue 20818[43].
• TCP dissector creates invalid packet diagram. Issue 20820[44].
• Support UTF-16 strings in the IsoBus dissector for the string
operations. Issue 20845[45].
• Fuzz job issue: fuzz-2025-11-12-12064814316.pcap. Issue 20852[46].
Wireshark 4.4.10 included the following changes. See the release
notes[47] for details:
• Using wslog parameters in command line applications leads to
freeing invalid memory. Issue 20500[48].
• On macOS a lower resolution Wireshark icon is displayed in the App
Switcher and Launchpad. sbug20544[49].
• Fuzz job crash: fuzz-2025-08-06-10932469456.pcap. Issue 20666[50].
• Encoding on NAS5GS- NASDL Transport Message-Multiple Container
contains inconsistencies. wsbuglink:20679].
• Bad resolver in Delegated Credential (RFC 9345) of TLS 1.3
CertificateRequest message. wsbuglink:20728].
• Fuzz job UTF-8 encoding issue: fuzz-2025-10-03-11586692659.pcap.
Issue 20744[51].
Wireshark 4.4.9 included the following changes. See the release
notes[52] for details:
• RDM Product Detail List ID Disect incorrect. Issue 20612[53].
• SCCP LUDT segmentation decoding fails. Issue 20647[54].
• Ciscodump fails to start capture on Cisco IOS. Issue 20655[55].
• [BACnet] WritePropertyMultiple closing context tag 1 not showing.
Issue 20665[56].
• Bug in LZ77 decoder; reads a 16-bit length when it should read a
32-bit length. Issue 20671[57].
Wireshark 4.4.8 included the following changes. See the release
notes[58] for details:
• Renegotiated DTLS session is not being decrypted. Issue 20362[59].
• Wireshark is completely stuck in initialization because
androiddump recv() is blocked. Issue 20526[60].
• Fuzz job UTF-8 encoding issue: fuzz-2025-06-20-7318.pcap. Issue
20585[61].
• Crash when showing packet in new window after reloading Lua
plugins with a certain gui.column.format preference. Issue
20588[62].
• Bug in UDS dissector with Service ReadDataByPeriodicIdentifier
Response. Issue 20589[63].
• Packet diagram doesn’t show non-standard field value
representations. Issue 20590[64].
• Packet diagram shows representation twice when field type is
FT_NONE. Issue 20601[65].
• application/x-www-form-urlencoded key parsed incorrectly following
a name-value byte sequence with no '=' Issue 20615[66].
• DNP3 time stamp was unable to work after epoch time(year 2038)
Issue 20618[67].
Wireshark 4.4.7 included the following changes. See the release
notes[68] for details:
• wnpa-sec-2025-02[69] Dissection engine crash. Issue 20509[70].
CVE-2025-5601[71].
• Wireshark does not correctly decode LIN "go to sleep" in TECMP and
CMP. Issue 20463[72].
• Dissector bug, Protocol CIGI. Issue 20496[73].
• Green power packets are not dissected when proto_version ==
ZBEE_VERSION_GREEN_POWER. Issue 20497[74].
• Packet diagrams misalign or drop bitfields. Issue 20507[75].
• Corruption when setting heuristic dissector table UI name from
Lua. Issue 20523[76].
• LDAP dissector incorrectly displays filters with singleton "&"
Issue 20527[77].
• WebSocket per-message compression extentions: fail to decompress
server messages (from the 2nd) due to parameter handling. Issue
20531[78].
• The LL_PERIODIC_SYNC_WR_IND packet is not properly dissected
(packet-btle.c) Issue 20554[79].
Wireshark 4.4.6 included the following changes. See the release
notes[80] for details:
• Bug in EtherCAT dissector with ECS order. Issue 13718[81].
• Conversation dialog columns return to default width on each new
packet in live capture. Issue 15978[82].
• Tests fail in LTO-enabled builds in Ubuntu/Debian. Issue
18216[83].
• Incorrect conditions in BFCP dissector. Issue 18717[84].
• Static build fails on Ubuntu 24.04 because the c-ares library
isn’t found. Issue 20343[85].
• Flutter’s Image Picker Generated JPEG Files Detected as Malformed
Packet. Issue 20355[86].
• QUIC dissector breaks when src and dst change. Issue 20371[87].
• s390x: build fail on Ubuntu PPA nighty build. Issue 20372[88].
• Trailing octet after IPv4 packet end is not detected or displayed
in raw bytes. Issue 20423[89].
• [packet-ax25-nol3.c] Only call APRS dissector on UI Frames. Issue
20429[90].
• Wireshark hangs when refreshing interfaces with the debug console
preference set to "always" and a file open (Windows) Issue
20434[91].
• BGP EVPN - Type-8 route not correctly read after addition of Max.
Response Time field. Issue 20459[92].
• Wireshark does not correctly decode LIN "go to sleep" in TECMP and
CMP. Issue 20463[93].
• MQTT-SN: WILLTOPIC message not decoded correctly (missing some
flags) Issue 20476[94].
Wireshark 4.4.5 included the following changes. See the release
notes[95] for details:
• GRPC: protobuf_json only displays the truncated string value.
Issue 20392[96].
• Wireshark crashes when clicking on a column title/header. Issue
20403[97].
Wireshark 4.4.4 included the following changes. See the release
notes[98] for details:
• wnpa-sec-2025-01[99] Bundle Protocol and CBOR dissector
{crash,infinite loop,memory leak}. Issue 20373[100].
• Crash when sorting columns during capture with display filter
active. Issue 20263[101].
• OSS-Fuzz 384757274: Invalid-bool-value in dissect_tcp. Issue
20300[102].
• Test failure in 4.4.2/4.4.3: test_sharkd_req_follow_http2. Issue
20330[103].
• Regression in extcap interface toolbar. Issue 20354[104].
• Clicking outside columns in TCP tab of Statistics → Conversations
window causes crash. Issue 20357[105].
• FTBFS with Ubuntu development (25.04) release. Issue 20359[106].
• DNS enable_qname_stats crash Wireshark when QDCOUNT == 0. Issue
20367[107].
• Windows: Android extcap plugin fails with "Broken socket
connection" if there are no new packets for 2sec. Issue
20386[108].
• TECMP: Calculation of lifecycle start in Status message is wrong.
Issue 20387[109].
• MQTT v5.0 properties total length presentation is incorrect. Issue
20389[110].
• TShark doesn’t resolve addresses in custom "hosts" files. Issue
20391[111].
• Incorrect JA4 fingerprint with empty ciphers. Issue 20394[112].
Wireshark 4.4.3 included the following changes. See the release
notes[113] for details:
• Potential mis-match in GSM MAP dissector for uncertainty radius
and its filter key. Issue 20247[114].
• Macro eNodeB ID and Extended Macro eNodeB ID not decoded by User
Location Information. Issue 20276[115].
• The NFSv2 Dissector appears to be swapping Character Special File
and Directory in mode decoding. Issue 20290[116].
• CMake discovers Strawberry Perl’s zlib DLL when it shouldn’t.
Issue 20304[117].
• VOIP Calls call flow displaying hours. Issue 20311[118].
• Fuzz job issue: fuzz-2024-12-26-7898.pcap. Issue 20313[119].
• sFlow: Incorrect length passed to header sample dissector. Issue
20320[120].
• wsutil: Should link against -lm due to missing fabs() when built
with -fno-builtin. Issue 20326[121].
Wireshark 4.4.2 included the following changes. See the release
notes[122] for details:
• wnpa-sec-2024-14[123] FiveCo RAP dissector infinite loop. Issue
20176[124].
• wnpa-sec-2024-15[125] ECMP dissector crash. Issue 20214[126].
• CIP I/O is not detected by "enip" filter anymore. Issue
19517[127].
• Fuzz job issue: fuzz-2024-09-03-7550.pcap. Issue 20041[128].
• OSS-Fuzz 71476: wireshark:fuzzshark_ip_proto-udp:
Index-out-of-bounds in DOFObjectID_Create_Unmarshal. Issue
20065[129].
• JA4_c hashes an empty field to e3b0c44298fc when it should be
000000000000. Issue 20066[130].
• Opening Wireshark 4.4.0 on macOS 15.0 disconnects iPhone
Mirroring. Issue 20082[131].
• PTP analysis loses track of message associations in case of
sequence number resets. Issue 20099[132].
• USB CCID: response packet in case SetParameters command is
unsupported is flagged as malformed. Issue 20107[133].
• dumpcap crashes when run from TShark with a capture filter. Issue
20108[134].
• SRT dissector: The StreamID (SID) in the handshake extension is
displayed without regarding the control characters and with NUL as
terminating. Issue 20113[135].
• Ghost error message on POP3 packets. Issue 20124[136].
• Building against c-ares 1.34 fails. Issue 20125[137].
• D-Bus is not optional anymore. Issue 20126[138].
• macOS Intel DMGs aren’t fully notarized. Issue 20129[139].
• Incorrect name for MLD Capabilities and Operations Present flag in
dissection of MLD Capabilities for MLO wifi-7 capture. Issue
20134[140].
• CQL Malformed Packet v4 S → C Type RESULT: Prepared[Malformed
Packet] Issue 20142[141].
• Wi-Fi: 256 Block Ack (BA) is not parsed properly. Issue
20156[142].
• BACnet ReadPropertyMultiple request Maximum allowed recursion
depth reached. Issue 20159[143].
• Statistics→I/O Graph crashes when using simple moving average.
Issue 20163[144].
• HTTP2 body decompression fails on DATA with a single padded frame.
Issue 20167[145].
• Compiler warning for ui/tap-rtp-common.c (ignoring return value)
Issue 20169[146].
• SIP dissector bug due to "be-route" param in VIA header. Issue
20173[147].
• Coredump after trying to open 'Follow TCP stream' Issue
20174[148].
• Protobuf JSON mapping error. Issue 20182[149].
• Display filter "!stp.pvst.origvlan in { vlan.id }" causes a crash
(Version 4.4.1) Issue 20183[150].
• Extcap plugins shipped with Wireshark Portable are not found in
version 4.4.1. Issue 20184[151].
• IEEE 802.11be: Wrong regulatory info in HE Operation IE in Beacon
frame. Issue 20187[152].
• Wireshark 4.4.1 does not decode RTCP packets. Issue 20188[153].
• Qt: Display filter sub-menu can only be opened on the triangle,
not the full name. Issue 20190[154].
• Qt: Changing the display filter does not update the Conversations
or Endpoints dialogs. Issue 20191[155].
• MODBUS Dissector bug. Issue 20192[156].
• Modbus dissector bug - Field Occurence and Layer Operator
modbus.bitval field. Issue 20193[157].
• Wireshark crashes when a field is dragged from packet details
towards the find input. Issue 20204[158].
• Lua DissectorTable("") : set ("10,11") unexpected behavior in
locales with comma as decimal separator. Issue 20216[159].
The TCP dissector no longer falls back to using the client port as a
criterion for selecting a payload dissector when the server port does
not select a payload dissector (except for port 20, active FTP). This
behavior can be changed using the "Client port dissectors" preference.
Display filters now correctly handle floating point conversion errors.
The Lua API now has better support for comma-separated ranges in
different locales.
Wireshark 4.4.1 included the following changes. See the release
notes[160] for details:
• wnpa-sec-2024-12[161] ITS dissector crash. Issue 20026[162].
• wnpa-sec-2024-13[163] AppleTalk and RELOAD Framing dissector
crashes. Issue 20114[164].
• Refresh interface during live-capture leads to corrupt interface
handling. Issue 11176[165].
• Media type "application/octet-stream" registered for both Thread
and UASIP. Issue 14729[166].
• Extcap toolbar stops working when new interface is added. Issue
19854[167].
• Decoding error ITS CPM version 2.1.1. Issue 19886[168].
• Build error in 4.3.0: sync_pipe_run_command_actual error: argument
2 is null but the corresponding size argument 3 value is 512004
[-Werror=nonnull] Issue 19930[169].
• html2text.py doesn’t handle the `<sup>` tag. Issue 20020[170].
• Incorrect NetFlow v8 TOS AS aggregation dissection. Issue
20021[171].
• The Windows packages don’t ship with the IP address plugin. Issue
20030[172].
• O_PATH is Linux-and-FreeBSD-specific. Issue 20031[173].
• Wireshark 4.4.0 doesn’t install USBcap USBcapCMD.exe in the
correct directory. Issue 20040[174].
• OER dissector is not considering the preamble if ASN.1 SEQUENCE
definition includes extension marker but no OPTIONAL items. Issue
20044[175].
• Bluetooth classic L2CAP incorrect dissection with connectionless
reception channel. Issue 20047[176].
• Profile auto switch filters : Grayed Display Filter Expression
dialog box when opened from Configuration Profiles dialog box.
Issue 20049[177].
• Wireshark 4.4.0 / macOS 14.6.1 wifi if monitor mode. Issue
20051[178].
• TECMP Data Type passes too much data to sub dissectors. Issue
20052[179].
• Wireshark and tshark 4.4.0 ignore extcap options specified on the
command line. Issue 20054[180].
• Cannot open release notes due to incorrect path with duplicated
directory components. Issue 20055[181].
• Unable to open "Release Notes" from the "Help" menu. Issue
20056[182].
• No capture interfaces if Wireshark is started from command line
with certain paths. Issue 20057[183].
• Wireshark 4.4.0 extcap path change breaks third party extcap
installers. Issue 20069[184].
• Fuzz job UTF-8 encoding issue: fuzz-2024-09-10-7618.pcap. Issue
20071[185].
• Unable to create larger files than 99 size units. Issue
20079[186].
• Opening Wireshark 4.4.0 on macOS 15.0 disconnects iPhone
Mirroring. Issue 20082[187].
• PRP trailer not shown for L2 IEC 61850 GOOSE packets in 4.4.0 (was
working in 4.2.7) Issue 20088[188].
• GUI lags because NetworkManager keeps turning 802.11 monitor mode
off. Issue 20090[189].
• Error while getting Bluetooth application process id by <shell:ps
-A | grep com.*android.bluetooth> Issue 20100[190].
• Fuzz job assertion: randpkt-2024-10-05-7200.pcap. Issue
20110[191].
Wireshark 4.4.0 included the following changes. See the release
notes[192] for details:
Many improvements and fixes to the graphing dialogs, including I/O
Graphs, Flow Graph / VoIP Calls, and TCP Stream Graphs.
Wireshark now supports automatic profile switching. You can associate
a display filter with a configuration profile, and when you open a
capture file that matches the filter, Wireshark will automatically
switch to that profile.
Support for Lua 5.3 and 5.4 has been added, and support for Lua 5.1
and 5.2 has been removed. The Windows and macOS installers now ship
with Lua 5.4.6.
Improved display filter support for value strings (optional string
representations for numeric fields).
Display filter functions can be implemented as plugins, similar to
protocol dissectors and file parsers.
Display filters can be translated to pcap filters using "Edit › Copy ›
Display filter as pcap filter" if each display filter field has a
corresponding pcap filter equivalent.
Custom columns can be defined using any valid field expression, such
as display filter functions, packet slices, arithmetic calculations,
logical tests, raw byte addressing, and protocol layer modifiers.
Custom output fields for `tshark -e` can also be defined using any
valid field expression.
Wireshark can be built with the zlib-ng instead of zlib for compressed
file support. Zlib-ng is substantially faster than zlib. The official
Windows and macOS packages include this feature.
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[193] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use "Help › About
Wireshark › Folders" or `tshark -G folders` to find the default
locations on your system.
Getting Help
The User’s Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/
Community support is available on Wireshark’s Q&A site[194] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark’s mailing lists can be found on the mailing list
site[195].
Bugs and feature requests can be reported on the issue tracker[196].
You can learn protocol analysis and meet Wireshark’s developers at
SharkFest[197].
Official Wireshark training and certification are available from the
Wireshark Foundation[198].
Getting Certified
You can become a Wireshark Certified Analyst! Learn more at
https://www.wireshark.org/certifications
How You Can Help
The Wireshark Foundation helps as many people as possible understand
their networks as much as possible. You can find out more and donate
at wiresharkfoundation.org[199].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[200].
References
1. https://wiresharkfoundation.org
2. https://www.wireshark.org/security/wnpa-sec-2026-05
3. https://gitlab.com/wireshark/wireshark/-/issues/20972
4. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3201
5. https://www.wireshark.org/security/wnpa-sec-2026-07
6. https://gitlab.com/wireshark/wireshark/-/issues/21009
7. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203
8. https://gitlab.com/wireshark/wireshark/-/issues/20946
9. https://gitlab.com/wireshark/wireshark/-/issues/20953
10. https://gitlab.com/wireshark/wireshark/-/issues/20966
11. https://gitlab.com/wireshark/wireshark/-/issues/20970
12. https://gitlab.com/wireshark/wireshark/-/issues/20972
13. https://gitlab.com/wireshark/wireshark/-/issues/20977
14. https://gitlab.com/wireshark/wireshark/-/issues/20980
15. https://gitlab.com/wireshark/wireshark/-/issues/21001
16. https://gitlab.com/wireshark/wireshark/-/issues/21006
17. https://gitlab.com/wireshark/wireshark/-/issues/21009
18. https://gitlab.com/wireshark/wireshark/-/issues/21012
19. https://www.wireshark.org/docs/relnotes/wireshark-4.4.13.html
20. https://www.wireshark.org/security/wnpa-sec-2026-01
21. https://gitlab.com/wireshark/wireshark/-/issues/20880
22. https://www.wireshark.org/security/wnpa-sec-2026-02
23. https://gitlab.com/wireshark/wireshark/-/issues/20939
24. https://www.wireshark.org/security/wnpa-sec-2026-03
25. https://gitlab.com/wireshark/wireshark/-/issues/20945
26. https://www.wireshark.org/docs/relnotes/wireshark-4.4.12.html
27. https://www.wireshark.org/security/wnpa-sec-2025-07
28. https://gitlab.com/wireshark/wireshark/-/issues/20860
29. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
30. https://www.wireshark.org/security/wnpa-sec-2025-08
31. https://gitlab.com/wireshark/wireshark/-/issues/20884
32. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
33. https://gitlab.com/wireshark/wireshark/-/issues/20754
34. https://gitlab.com/wireshark/wireshark/-/issues/20878
35. https://gitlab.com/wireshark/wireshark/-/issues/20883
36. https://gitlab.com/wireshark/wireshark/-/issues/20893
37. https://www.wireshark.org/docs/relnotes/wireshark-4.4.11.html
38. https://www.wireshark.org/security/wnpa-sec-2025-06
39. https://gitlab.com/wireshark/wireshark/-/issues/20823
40. https://gitlab.com/wireshark/wireshark/-/issues/2241
41. https://gitlab.com/wireshark/wireshark/-/issues/20768
42. https://gitlab.com/wireshark/wireshark/-/issues/20802
43. https://gitlab.com/wireshark/wireshark/-/issues/20818
44. https://gitlab.com/wireshark/wireshark/-/issues/20820
45. https://gitlab.com/wireshark/wireshark/-/issues/20845
46. https://gitlab.com/wireshark/wireshark/-/issues/20852
47. https://www.wireshark.org/docs/relnotes/wireshark-4.4.10.html
48. https://gitlab.com/wireshark/wireshark/-/issues/20500
49. https://gitlab.com/wireshark/wireshark/-/issues/20500
50. https://gitlab.com/wireshark/wireshark/-/issues/20666
51. https://gitlab.com/wireshark/wireshark/-/issues/20744
52. https://www.wireshark.org/docs/relnotes/wireshark-4.4.9.html
53. https://gitlab.com/wireshark/wireshark/-/issues/20612
54. https://gitlab.com/wireshark/wireshark/-/issues/20647
55. https://gitlab.com/wireshark/wireshark/-/issues/20655
56. https://gitlab.com/wireshark/wireshark/-/issues/20665
57. https://gitlab.com/wireshark/wireshark/-/issues/20671
58. https://www.wireshark.org/docs/relnotes/wireshark-4.4.8.html
59. https://gitlab.com/wireshark/wireshark/-/issues/20362
60. https://gitlab.com/wireshark/wireshark/-/issues/20526
61. https://gitlab.com/wireshark/wireshark/-/issues/20585
62. https://gitlab.com/wireshark/wireshark/-/issues/20588
63. https://gitlab.com/wireshark/wireshark/-/issues/20589
64. https://gitlab.com/wireshark/wireshark/-/issues/20590
65. https://gitlab.com/wireshark/wireshark/-/issues/20601
66. https://gitlab.com/wireshark/wireshark/-/issues/20615
67. https://gitlab.com/wireshark/wireshark/-/issues/20618
68. https://www.wireshark.org/docs/relnotes/wireshark-4.4.7.html
69. https://www.wireshark.org/security/wnpa-sec-2025-02
70. https://gitlab.com/wireshark/wireshark/-/issues/20509
71. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
72. https://gitlab.com/wireshark/wireshark/-/issues/20463
73. https://gitlab.com/wireshark/wireshark/-/issues/20496
74. https://gitlab.com/wireshark/wireshark/-/issues/20497
75. https://gitlab.com/wireshark/wireshark/-/issues/20507
76. https://gitlab.com/wireshark/wireshark/-/issues/20523
77. https://gitlab.com/wireshark/wireshark/-/issues/20527
78. https://gitlab.com/wireshark/wireshark/-/issues/20531
79. https://gitlab.com/wireshark/wireshark/-/issues/20554
80. https://www.wireshark.org/docs/relnotes/wireshark-4.4.6.html
81. https://gitlab.com/wireshark/wireshark/-/issues/13718
82. https://gitlab.com/wireshark/wireshark/-/issues/15978
83. https://gitlab.com/wireshark/wireshark/-/issues/18216
84. https://gitlab.com/wireshark/wireshark/-/issues/18717
85. https://gitlab.com/wireshark/wireshark/-/issues/20343
86. https://gitlab.com/wireshark/wireshark/-/issues/20355
87. https://gitlab.com/wireshark/wireshark/-/issues/20371
88. https://gitlab.com/wireshark/wireshark/-/issues/20372
89. https://gitlab.com/wireshark/wireshark/-/issues/20423
90. https://gitlab.com/wireshark/wireshark/-/issues/20429
91. https://gitlab.com/wireshark/wireshark/-/issues/20434
92. https://gitlab.com/wireshark/wireshark/-/issues/20459
93. https://gitlab.com/wireshark/wireshark/-/issues/20463
94. https://gitlab.com/wireshark/wireshark/-/issues/20476
95. https://www.wireshark.org/docs/relnotes/wireshark-4.4.5.html
96. https://gitlab.com/wireshark/wireshark/-/issues/20392
97. https://gitlab.com/wireshark/wireshark/-/issues/20403
98. https://www.wireshark.org/docs/relnotes/wireshark-4.4.4.html
99. https://www.wireshark.org/security/wnpa-sec-2025-01
100. https://gitlab.com/wireshark/wireshark/-/issues/20373
101. https://gitlab.com/wireshark/wireshark/-/issues/20263
102. https://gitlab.com/wireshark/wireshark/-/issues/20300
103. https://gitlab.com/wireshark/wireshark/-/issues/20330
104. https://gitlab.com/wireshark/wireshark/-/issues/20354
105. https://gitlab.com/wireshark/wireshark/-/issues/20357
106. https://gitlab.com/wireshark/wireshark/-/issues/20359
107. https://gitlab.com/wireshark/wireshark/-/issues/20367
108. https://gitlab.com/wireshark/wireshark/-/issues/20386
109. https://gitlab.com/wireshark/wireshark/-/issues/20387
110. https://gitlab.com/wireshark/wireshark/-/issues/20389
111. https://gitlab.com/wireshark/wireshark/-/issues/20391
112. https://gitlab.com/wireshark/wireshark/-/issues/20394
113. https://www.wireshark.org/docs/relnotes/wireshark-4.4.3.html
114. https://gitlab.com/wireshark/wireshark/-/issues/20247
115. https://gitlab.com/wireshark/wireshark/-/issues/20276
116. https://gitlab.com/wireshark/wireshark/-/issues/20290
117. https://gitlab.com/wireshark/wireshark/-/issues/20304
118. https://gitlab.com/wireshark/wireshark/-/issues/20311
119. https://gitlab.com/wireshark/wireshark/-/issues/20313
120. https://gitlab.com/wireshark/wireshark/-/issues/20320
121. https://gitlab.com/wireshark/wireshark/-/issues/20326
122. https://www.wireshark.org/docs/relnotes/wireshark-4.4.2.html
123. https://www.wireshark.org/security/wnpa-sec-2024-14
124. https://gitlab.com/wireshark/wireshark/-/issues/20176
125. https://www.wireshark.org/security/wnpa-sec-2024-15
126. https://gitlab.com/wireshark/wireshark/-/issues/20214
127. https://gitlab.com/wireshark/wireshark/-/issues/19517
128. https://gitlab.com/wireshark/wireshark/-/issues/20041
129. https://gitlab.com/wireshark/wireshark/-/issues/20065
130. https://gitlab.com/wireshark/wireshark/-/issues/20066
131. https://gitlab.com/wireshark/wireshark/-/issues/20082
132. https://gitlab.com/wireshark/wireshark/-/issues/20099
133. https://gitlab.com/wireshark/wireshark/-/issues/20107
134. https://gitlab.com/wireshark/wireshark/-/issues/20108
135. https://gitlab.com/wireshark/wireshark/-/issues/20113
136. https://gitlab.com/wireshark/wireshark/-/issues/20124
137. https://gitlab.com/wireshark/wireshark/-/issues/20125
138. https://gitlab.com/wireshark/wireshark/-/issues/20126
139. https://gitlab.com/wireshark/wireshark/-/issues/20129
140. https://gitlab.com/wireshark/wireshark/-/issues/20134
141. https://gitlab.com/wireshark/wireshark/-/issues/20142
142. https://gitlab.com/wireshark/wireshark/-/issues/20156
143. https://gitlab.com/wireshark/wireshark/-/issues/20159
144. https://gitlab.com/wireshark/wireshark/-/issues/20163
145. https://gitlab.com/wireshark/wireshark/-/issues/20167
146. https://gitlab.com/wireshark/wireshark/-/issues/20169
147. https://gitlab.com/wireshark/wireshark/-/issues/20173
148. https://gitlab.com/wireshark/wireshark/-/issues/20174
149. https://gitlab.com/wireshark/wireshark/-/issues/20182
150. https://gitlab.com/wireshark/wireshark/-/issues/20183
151. https://gitlab.com/wireshark/wireshark/-/issues/20184
152. https://gitlab.com/wireshark/wireshark/-/issues/20187
153. https://gitlab.com/wireshark/wireshark/-/issues/20188
154. https://gitlab.com/wireshark/wireshark/-/issues/20190
155. https://gitlab.com/wireshark/wireshark/-/issues/20191
156. https://gitlab.com/wireshark/wireshark/-/issues/20192
157. https://gitlab.com/wireshark/wireshark/-/issues/20193
158. https://gitlab.com/wireshark/wireshark/-/issues/20204
159. https://gitlab.com/wireshark/wireshark/-/issues/20216
160. https://www.wireshark.org/docs/relnotes/wireshark-4.4.1.html
161. https://www.wireshark.org/security/wnpa-sec-2024-12
162. https://gitlab.com/wireshark/wireshark/-/issues/20026
163. https://www.wireshark.org/security/wnpa-sec-2024-13
164. https://gitlab.com/wireshark/wireshark/-/issues/20114
165. https://gitlab.com/wireshark/wireshark/-/issues/11176
166. https://gitlab.com/wireshark/wireshark/-/issues/14729
167. https://gitlab.com/wireshark/wireshark/-/issues/19854
168. https://gitlab.com/wireshark/wireshark/-/issues/19886
169. https://gitlab.com/wireshark/wireshark/-/issues/19930
170. https://gitlab.com/wireshark/wireshark/-/issues/20020
171. https://gitlab.com/wireshark/wireshark/-/issues/20021
172. https://gitlab.com/wireshark/wireshark/-/issues/20030
173. https://gitlab.com/wireshark/wireshark/-/issues/20031
174. https://gitlab.com/wireshark/wireshark/-/issues/20040
175. https://gitlab.com/wireshark/wireshark/-/issues/20044
176. https://gitlab.com/wireshark/wireshark/-/issues/20047
177. https://gitlab.com/wireshark/wireshark/-/issues/20049
178. https://gitlab.com/wireshark/wireshark/-/issues/20051
179. https://gitlab.com/wireshark/wireshark/-/issues/20052
180. https://gitlab.com/wireshark/wireshark/-/issues/20054
181. https://gitlab.com/wireshark/wireshark/-/issues/20055
182. https://gitlab.com/wireshark/wireshark/-/issues/20056
183. https://gitlab.com/wireshark/wireshark/-/issues/20057
184. https://gitlab.com/wireshark/wireshark/-/issues/20069
185. https://gitlab.com/wireshark/wireshark/-/issues/20071
186. https://gitlab.com/wireshark/wireshark/-/issues/20079
187. https://gitlab.com/wireshark/wireshark/-/issues/20082
188. https://gitlab.com/wireshark/wireshark/-/issues/20088
189. https://gitlab.com/wireshark/wireshark/-/issues/20090
190. https://gitlab.com/wireshark/wireshark/-/issues/20100
191. https://gitlab.com/wireshark/wireshark/-/issues/20110
192. https://www.wireshark.org/docs/relnotes/wireshark-4.4.0.html
193. https://www.wireshark.org/download.html
194. https://ask.wireshark.org/
195. https://lists.wireshark.org/lists/
196. https://gitlab.com/wireshark/wireshark/-/issues
197. https://sharkfest.wireshark.org
198. https://www.wireshark.org/certifications
199. https://wiresharkfoundation.org
200. https://www.wireshark.org/faq.html
Digests
wireshark-4.4.14.tar.xz: 46874836 bytes
SHA256(wireshark-4.4.14.tar.xz)=c9113130bd2b37919fdcf575f710469ce391960baaff31911e3288469e6a8e8d
SHA1(wireshark-4.4.14.tar.xz)=41536d8ba1fc977d0832b509af6ea65056c6fe1d
Wireshark-4.4.14-x64.exe: 88347728 bytes
SHA256(Wireshark-4.4.14-x64.exe)=c544476d4e56860f2f614814dfe3c0c2d4d44e4c207d6d38777fada33bb7646e
SHA1(Wireshark-4.4.14-x64.exe)=59ff4ac875c7dc187fde45ecc5250af7e93301d3
Wireshark-4.4.14-arm64.exe: 52198176 bytes
SHA256(Wireshark-4.4.14-arm64.exe)=2ec2e2389634cbb02b1c53becb0075f0d7ac0c1fb81788eeaa5bcff5c7d4a99f
SHA1(Wireshark-4.4.14-arm64.exe)=3fe31f080a33c6097a7872eefd4bcbafb8563c7a
Wireshark-4.4.14-x64.msi: 64888832 bytes
SHA256(Wireshark-4.4.14-x64.msi)=e845ed8c9b49f89db1ad7fb1fa44a4ecee91c0a6925a81d7c34bae9e07e59ec2
SHA1(Wireshark-4.4.14-x64.msi)=87545f3d128179e453b05d1bf4d3a69360d417cf
WiresharkPortable64_4.4.14.paf.exe: 65151984 bytes
SHA256(WiresharkPortable64_4.4.14.paf.exe)=5aa1dcac1f67153809079a207e99152775241c55fa9c74d795fcc0a831291f49
SHA1(WiresharkPortable64_4.4.14.paf.exe)=9c03d3c48559085b9dbd1d8344eef14e525c86bb
Wireshark 4.4.14 Intel 64.dmg: 69625332 bytes
SHA256(Wireshark 4.4.14 Intel 64.dmg)=2cc68307183a710ac0c07f6d77c36656f55ffd6e30ca24097bca8c3fff20b77c
SHA1(Wireshark 4.4.14 Intel 64.dmg)=7ec1ba4235cbbb0e754f19da3a1108f8a1688a29
Wireshark 4.4.14 Arm 64.dmg: 65884808 bytes
SHA256(Wireshark 4.4.14 Arm 64.dmg)=b8b1070bdedfff76ba72376ea58e1e7406af1e2788705ce617f0e58d67eec99a
SHA1(Wireshark 4.4.14 Arm 64.dmg)=3e0fd5a1f80eda59621cc03138cb50b06ea75d91
You can validate these hashes using the following commands (among others):
Windows: powershell Get-FileHash Wireshark-x.y.z-x64.exe -Algorithm SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
- Prev by Date: [Wireshark-announce] Wireshark 4.6.4 is now available
- Previous by thread: [Wireshark-announce] Wireshark 4.6.4 is now available
- Index(es):