Wireshark-dev: [Wireshark-dev] Wireshark 4.0.2 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 7 Dec 2022 11:50:36 -0800
I'm proud to announce the release of Wireshark 4.0.2.
What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
What’s New
We do not ship official 32-bit Windows packages for Wireshark 4.0 and
later. If you need to use Wireshark on that platform, we recommend
using the latest 3.6 release. Issue 17779[1]
Bug Fixes
The following vulnerabilities have been fixed:
• wnpa-sec-2022-09[2] Multiple dissector infinite loops.
• wnpa-sec-2022-10[3] Kafka dissector memory exhaustion.
The following bugs have been fixed:
• Qt: Endpoints dialog - unexpected byte unit suffixes in packet
columns. Issue 18229[4].
• GOOSE: field "floating_point" not working anymore. Issue
18491[5].
• EVS Header-Full format padding issues. Issue 18498[6].
• Wireshark 4.0.0 VOIP playback has no sound and can’t resume after
pausing. Issue 18510[7].
• Wireshark crashes when exporting a profile on Mac OSX if there is
no extension. Issue 18525[8].
• EVS dissector missing value description. Issue 18550[9].
• Qt 6 font descriptions not backward compatible with Qt 5. Issue
18553[10].
• Wireshark, wrong TCP ACKed unseen segment message. Issue
18558[11].
• Invalid Cyrillic symbol in timezone at \"Arrival Time\" field in
frame. Issue 18562[12].
• ProtoBuf parse extension definitions failed. Issue 18599[13].
• Fuzz job crash output: fuzz-2022-11-09-11134.pcap. Issue
18613[14].
• Fuzz job crash output: fuzz-2022-11-14-11111.pcap. Issue
18632[15].
• Wireshark is using old version of ASN (ETSI TS 125 453 V11.2.0)
which is imapacting length of param in the messages. Issue
18646[16].
• BGP: False IGMP flags value in EVPN routes (type 6,7,8) Issue
18660[17].
• wslog assumes stderr and stdout exist. Issue 18684[18].
• Editing packet comments, with non-ASCII characters, on Windows
saves them in the local code page, not in UTF-8. Issue 18698[19].
• Unable to decrypt PSK based DTLS traffic which uses Connection
ID. Issue 18705[20].
• HTTP2 tests fail when built without nghttp2. Issue 18707[21].
New and Updated Features
Removed Features and Support
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
ASN.1 PER, ASTERIX, BGP, BPv6, DTLS, EVS, GOOSE, GSM Osmux, IPv6,
Kafka, Locamation IM, MONGO, NXP 802.15.4, OpenFlow v6, PCAP,
Protobuf, RTP, S1AP, SKINNY, TCP, and WASSP
New and Updated Capture File Support
There is no new or updated capture file support in this release.
New File Format Decoding Support
There is no new or updated file format support in this release.
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[22] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use "Help › About
Wireshark › Folders" or `tshark -G folders` to find the default
locations on your system.
Getting Help
The User’s Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/
Community support is available on Wireshark’s Q&A site[23] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark’s mailing lists can be found on the web site[24].
Bugs and feature requests can be reported on the issue tracker[25].
You can learn protocol analysis and meet Wireshark’s developers at
SharkFest[26].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[27].
References
1. https://gitlab.com/wireshark/wireshark/-/issues/17779
2. https://www.wireshark.org/security/wnpa-sec-2022-09
3. https://www.wireshark.org/security/wnpa-sec-2022-10
4. https://gitlab.com/wireshark/wireshark/-/issues/18229
5. https://gitlab.com/wireshark/wireshark/-/issues/18491
6. https://gitlab.com/wireshark/wireshark/-/issues/18498
7. https://gitlab.com/wireshark/wireshark/-/issues/18510
8. https://gitlab.com/wireshark/wireshark/-/issues/18525
9. https://gitlab.com/wireshark/wireshark/-/issues/18550
10. https://gitlab.com/wireshark/wireshark/-/issues/18553
11. https://gitlab.com/wireshark/wireshark/-/issues/18558
12. https://gitlab.com/wireshark/wireshark/-/issues/18562
13. https://gitlab.com/wireshark/wireshark/-/issues/18599
14. https://gitlab.com/wireshark/wireshark/-/issues/18613
15. https://gitlab.com/wireshark/wireshark/-/issues/18632
16. https://gitlab.com/wireshark/wireshark/-/issues/18646
17. https://gitlab.com/wireshark/wireshark/-/issues/18660
18. https://gitlab.com/wireshark/wireshark/-/issues/18684
19. https://gitlab.com/wireshark/wireshark/-/issues/18698
20. https://gitlab.com/wireshark/wireshark/-/issues/18705
21. https://gitlab.com/wireshark/wireshark/-/issues/18707
22. https://www.wireshark.org/download.html
23. https://ask.wireshark.org/
24. https://www.wireshark.org/lists/
25. https://gitlab.com/wireshark/wireshark/-/issues
26. https://sharkfest.wireshark.org
27. https://www.wireshark.org/faq.html
Digests
wireshark-4.0.2.tar.xz: 41296132 bytes
SHA256(wireshark-4.0.2.tar.xz)=f35915699f2f9b28ddb211202d40ec8984e5834d3c911483144a4984ba44411d
SHA1(wireshark-4.0.2.tar.xz)=0127180ff18515b086fe5603f767f53ddaa64c1a
Wireshark-win64-4.0.2.exe: 78713984 bytes
SHA256(Wireshark-win64-4.0.2.exe)=bafc2b00ce557cc531dfbb0e87cda6277c052a32411e10da8005c4001438d8fc
SHA1(Wireshark-win64-4.0.2.exe)=06442fc937533ed61e980847398dd023c1747ea4
Wireshark-win64-4.0.2.msi: 52125696 bytes
SHA256(Wireshark-win64-4.0.2.msi)=ba9fc3b381744362787bfac1df22e63605fd0ba439a8e550a811ca4ba4160579
SHA1(Wireshark-win64-4.0.2.msi)=d2b186ddde175e5d5b646b2592b11fa92392ff8e
WiresharkPortable64_4.0.2.paf.exe: 45467728 bytes
SHA256(WiresharkPortable64_4.0.2.paf.exe)=3aabc8aa09a588334c7964db455d9ce34186775c17adfd703d204f4a6b852923
SHA1(WiresharkPortable64_4.0.2.paf.exe)=b6c9464bc18e9c9629513b9182b640c92a171953
Wireshark 4.0.2 Arm 64.dmg: 62683770 bytes
SHA256(Wireshark 4.0.2 Arm 64.dmg)=3a1d91deb6a40d1834c5e445ee4e92bd6c37eb6791d605d227cd54d6b8951b01
SHA1(Wireshark 4.0.2 Arm 64.dmg)=4940a329012d2cd67ac06de0522bfb6cba9086f2
Wireshark 4.0.2 Intel 64.dmg: 65624548 bytes
SHA256(Wireshark 4.0.2 Intel 64.dmg)=9cc8ca2f48858285d3511f3e5e9167aedcfaebc5c06da8369766a4d2d69aa37e
SHA1(Wireshark 4.0.2 Intel 64.dmg)=845218249010044b4f926a93547aa6085e8b3e94
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
OpenPGP_signature
Description: OpenPGP digital signature
- Prev by Date: Re: [Wireshark-dev] Custom display formatting for FT_STRING
- Next by Date: [Wireshark-dev] What is the best way to locate [GLib CRITICAL] -- g_string_free: assertion 'string != NULL' failed
- Previous by thread: Re: [Wireshark-dev] Custom display formatting for FT_STRING
- Next by thread: [Wireshark-dev] What is the best way to locate [GLib CRITICAL] -- g_string_free: assertion 'string != NULL' failed
- Index(es):