Wireshark-dev: [Wireshark-dev] Wireshark 4.2.1 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 3 Jan 2024 12:28:25 -0800
I'm proud to announce the release of Wireshark 4.2.1. What is Wireshark? Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. Wireshark is hosted by the Wireshark Foundation, a nonprofit which promotes protocol analysis educaton. Wireshark and the foundation depend on your contributions in order to do their work. If you or your employer would like to contribute or become a sponsor, please visit wiresharkfoundation.org[1]. What’s New Bug Fixes The following vulnerabilities have been fixed: • wnpa-sec-2024-01[2] GVCP dissector crash. Issue 19496[3]. CVE-2024-0208[4]. • wnpa-sec-2024-02[5] IEEE 1609.2 dissector crash. Issue 19501[6]. CVE-2024-0209[7]. • wnpa-sec-2024-03[8] HTTP3 dissector crash. Issue 19502[9]. CVE-2024-0207[10]. • wnpa-sec-2024-04[11] Zigbee TLV dissector crash. Issue 19504[12]. CVE-2024-0210[13]. • wnpa-sec-2024-05[14] DOCSIS dissector crash. Issue 19557[15]. CVE-2024-0211[16]. The following bugs have been fixed: • Capture filters not saved to recently used list. Issue 12918[17]. • CFM dissector does not handle Sender ID TLV correctly when Chassis ID Length is zero. Issue 13720[18]. • OSS-Fuzz 64290: wireshark:fuzzshark_ip: Global-buffer-overflow in dissect_zcl_read_attr_struct. Issue 19490[19]. • Overriding capture options set by preference by command line arguments (like -S) doesn’t work. Issue 14549[20]. • Segfault when enabling monitor mode on wireless card that falsely claims to support it. Issue 16693[21]. • Documented format of temporary file name is out of date in the Wireshark User’s Guide. Issue 18464[22]. • Selection highlight lost when interface list is sorted. Issue 19133[23]. • HTTP3 malformed packets. Issue 19475[24]. • Capture filter compilation fails with obscure error message. Issue 19480[25]. • XML: Parsing encoding attribute failed when standalone attribute exists. Issue 19485[26]. • Display filter expressions where the protocol name starts with digit and contains a hyphen are rejected. Issue 19489[27]. • diameter.3GPP-* display filters not working after upgrade to version 4.2.0. Issue 19493[28]. • GigE-vision: Control Protocol shows \"unknown\" as value for ASCII character set. Issue 19494[29]. • The HTTP/3 Request Header URI is not correct. Issue 19497[30]. • QUIC/TLS not extracting \"h3\" from ALPN in a capture. Issue 19503[31]. • Documentation on system requirements should be updated. Issue 19512[32]. • 4.2.0: init.lua in subdirectories not loaded anymore. Issue 19516[33]. • Malformed SIP/SDP messages: components are not decoded properly. Issue 19518[34]. • heuristic_protos do not reset on profile swap. Issue 19520[35]. • Wireshark 4.2 crashes on Apply As Column. Issue 19521[36]. • NFLOG timestamp is incorrect. Issue 19525[37]. • Qt6 Crash (Double Free) When Attempting to Save TCP Stream Graph. Issue 19529[38]. • Fixed parsing display filter expressions containing literal OID values, e.g. `snmp.name == 1.3.6.1.2.1.1.3.0`. New and Updated Features There are no new or updated features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support New and Updated Capture File Support There is no new or updated capture file support in this release. pcapng: the if_tsoffset option is now supported. Prior Versions This document only describes the changes introduced in Wireshark 4.2.1. You can find release notes for prior versions at the following locations: • Wireshark 4.2.0[39] Getting Wireshark Wireshark source code and installation packages are available from https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page[40] on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use "Help › About Wireshark › Folders" or `tshark -G folders` to find the default locations on your system. Getting Help The User’s Guide, manual pages and various other documentation can be found at https://www.wireshark.org/docs/ Community support is available on Wireshark’s Q&A site[41] and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark’s mailing lists can be found on the web site[42]. Bugs and feature requests can be reported on the issue tracker[43]. You can learn protocol analysis and meet Wireshark’s developers at SharkFest[44]. How You Can Help The Wireshark Foundation helps as many people as possible understand their networks as much as possible. You can find out more and donate at wiresharkfoundation.org[45]. Frequently Asked Questions A complete FAQ is available on the Wireshark web site[46]. References 1. https://wiresharkfoundation.org 2. https://www.wireshark.org/security/wnpa-sec-2024-01 3. https://gitlab.com/wireshark/wireshark/-/issues/19496 4. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208 5. https://www.wireshark.org/security/wnpa-sec-2024-02 6. https://gitlab.com/wireshark/wireshark/-/issues/19501 7. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209 8. https://www.wireshark.org/security/wnpa-sec-2024-03 9. https://gitlab.com/wireshark/wireshark/-/issues/19502 10. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0207 11. https://www.wireshark.org/security/wnpa-sec-2024-04 12. https://gitlab.com/wireshark/wireshark/-/issues/19504 13. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0210 14. https://www.wireshark.org/security/wnpa-sec-2024-05 15. https://gitlab.com/wireshark/wireshark/-/issues/19557 16. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211 17. https://gitlab.com/wireshark/wireshark/-/issues/12918 18. https://gitlab.com/wireshark/wireshark/-/issues/13720 19. https://gitlab.com/wireshark/wireshark/-/issues/19490 20. https://gitlab.com/wireshark/wireshark/-/issues/14549 21. https://gitlab.com/wireshark/wireshark/-/issues/16693 22. https://gitlab.com/wireshark/wireshark/-/issues/18464 23. https://gitlab.com/wireshark/wireshark/-/issues/19133 24. https://gitlab.com/wireshark/wireshark/-/issues/19475 25. https://gitlab.com/wireshark/wireshark/-/issues/19480 26. https://gitlab.com/wireshark/wireshark/-/issues/19485 27. https://gitlab.com/wireshark/wireshark/-/issues/19489 28. https://gitlab.com/wireshark/wireshark/-/issues/19493 29. https://gitlab.com/wireshark/wireshark/-/issues/19494 30. https://gitlab.com/wireshark/wireshark/-/issues/19497 31. https://gitlab.com/wireshark/wireshark/-/issues/19503 32. https://gitlab.com/wireshark/wireshark/-/issues/19512 33. https://gitlab.com/wireshark/wireshark/-/issues/19516 34. https://gitlab.com/wireshark/wireshark/-/issues/19518 35. https://gitlab.com/wireshark/wireshark/-/issues/19520 36. https://gitlab.com/wireshark/wireshark/-/issues/19521 37. https://gitlab.com/wireshark/wireshark/-/issues/19525 38. https://gitlab.com/wireshark/wireshark/-/issues/19529 39. https://www.wireshark.org/docs/relnotes/wireshark-4.2.0.html 40. https://www.wireshark.org/download.html 41. https://ask.wireshark.org/ 42. https://www.wireshark.org/lists/ 43. https://gitlab.com/wireshark/wireshark/-/issues 44. https://sharkfest.wireshark.org 45. https://wiresharkfoundation.org 46. https://www.wireshark.org/faq.html Digests wireshark-4.2.1.tar.xz: 44942940 bytes SHA256(wireshark-4.2.1.tar.xz)=50669fb0894310b68372ec8ff6a353d4c23b692121c529b8806b2e332b7d8770 SHA1(wireshark-4.2.1.tar.xz)=3fa6ddbac07fb64ed5e447086542cabb9e4cfee0 Wireshark-4.2.1-arm64.exe: 67816800 bytes SHA256(Wireshark-4.2.1-arm64.exe)=8bbc0827c1ab410dbca6b6026790c2ba03a58ea864a56056ff9208dae6bcd1aa SHA1(Wireshark-4.2.1-arm64.exe)=0530f1f74b6c74fde3e8ec5790f9d9edde917ba6 Wireshark-4.2.1-x64.exe: 86312224 bytes SHA256(Wireshark-4.2.1-x64.exe)=c9e89dd241b7e0bdc86eb23be60ff6039a3cc69e8abd1a029112dcc642c98e86 SHA1(Wireshark-4.2.1-x64.exe)=bd3bbb77d9531753fa9f63db36e1b4e62699397f Wireshark-4.2.1-x64.msi: 62750720 bytes SHA256(Wireshark-4.2.1-x64.msi)=7bf64faeb2c2bd85287e3ca304330461fc1d8801c0ebbf1c0c3a30aab644e05f SHA1(Wireshark-4.2.1-x64.msi)=ecab5fc9bf6cd1e19771209bfe1f3831d13efa10 WiresharkPortable64_4.2.1.paf.exe: 53527432 bytes SHA256(WiresharkPortable64_4.2.1.paf.exe)=f76b7341741f1d331de7e23ac5ea48498e24209289fe3c1fba7f4e81bd3661b4 SHA1(WiresharkPortable64_4.2.1.paf.exe)=e03ad0d5696788f52aaa7d3fd247f6f72b28c5c4 Wireshark 4.2.1 Arm 64.dmg: 65655893 bytes SHA256(Wireshark 4.2.1 Arm 64.dmg)=9ca7fcdb382c0665c77d580dd6b6db8a5d2e50758fc9f34bffbba267cfb49b37 SHA1(Wireshark 4.2.1 Arm 64.dmg)=2d568c35ca95eefa9e9e7a3838dcd0441d0bfd06 Wireshark 4.2.1 Intel 64.dmg: 69037550 bytes SHA256(Wireshark 4.2.1 Intel 64.dmg)=35080517e048a7ca7a3fe80b88c9f4457e8b6f9948b3cbeb22c920fbacd7e234 SHA1(Wireshark 4.2.1 Intel 64.dmg)=5a0e2a4830e06d04a6196fa9df762ce9ed4d2ae5 You can validate these hashes using the following commands (among others): Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256 Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg" Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
OpenPGP_signature.asc
Description: OpenPGP digital signature
- Next by Date: Re: [Wireshark-dev] Input plugin for PEAK Systems CAN interfaces
- Next by thread: Re: [Wireshark-dev] Input plugin for PEAK Systems CAN interfaces
- Index(es):