Wireshark-dev: [Wireshark-dev] Wireshark 4.6.2 is now available
Date Prev
·
Date Next
·
Thread Prev
·
Thread Next
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 3 Dec 2025 12:06:40 -0800
I'm proud to announce the release of Wireshark 4.6.2.
What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
Wireshark is hosted by the Wireshark Foundation, a nonprofit which
promotes protocol analysis education. Wireshark and the foundation
depend on your contributions in order to do their work. If you or your
organization would like to contribute or become a sponsor, please
visit wiresharkfoundation.org[1].
If you use Wireshark professionally or you just want to learn more
about protocol analysis, you should join us at SharkFest[2], the
Wireshark developer and user conference.
You can also become a Wireshark Certified Analyst! Official Wireshark
training and certification are available from the Wireshark
Foundation[3].
What’s New
Bug Fixes
This release fixes an API/ABI change that was introduced in Wireshark
4.6.1, which caused a compatibility issue with plugins built for
Wireshark 4.6.0. Issue 20881[4].
The following vulnerabilities have been fixed:
• wnpa-sec-2025-07[5] HTTP3 dissector crash. Issue 20860[6].
• wnpa-sec-2025-08[7] MEGACO dissector infinite loop. Issue
20884[8].
The following bugs have been fixed:
• ws_base32_decode should be named *_encode ? Issue 20754[9].
• Omnipeek files not working in 4.6.1. Issue 20876[10].
• Stack buffer overflow in wiretap/ber.c (ber_open) Issue
20878[11].
• Plugins incompatibility between 4.6.0 & 4.6.1. Issue 20881[12].
• Fuzz job crash: fuzz-2025-11-30-12266121180.pcap. Issue
20883[13].
New and Updated Features
• The Windows installers now ship with the Visual C++
Redistributable version 14.44.35112. They previously shipped with
14.40.33807.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
ATM PW, COSEM, COTP, DECT NR+, DMP, Fc00, GTP, HTTP3, IEEE 802.15.4,
ISIS HELLO, ISOBUS, MAC-LTE, MAUSB, MEGACO, MPEG DSM-CC, OsmoTRXD,
PTP, RLC, SAPDIAG, and SMTP
New and Updated Capture File Support
Peektagged
New and Updated File Format Decoding Support
There is no new or updated file format support in this release.
Prior Versions
Wireshark 4.6.1 included the following changes. See the release
notes[14] for details:
• wnpa-sec-2025-05[15] BPv7 dissector crash. Issue 20770[16].
• wnpa-sec-2025-06[17] Kafka dissector crash. Issue 20823[18].
• L2CAP dissector doesn’t understand retransmission mode. Issue
2241[19].
• DNS HIP dissector labels PK algorithm as HIT length. Issue
20768[20].
• clang-cl error in "packet-zbee-direct.c" Issue 20776[21].
• Writing to an LZ4-compressed output file might fail. Issue
20779[22].
• endian.h conflics with libc for building plugins. Issue 20786[23].
• TShark crash caused by Lua plugin. Issue 20794[24].
• Wireshark stalls for a few seconds when selecting specific
messages. Issue 20797[25].
• TLS Abbreviated Handshake Using New Session Ticket. Issue
20802[26].
• Custom websocket dissector does not run. Issue 20803[27].
• WINREG QueryValue triggers dissector bug in packet-dcerpc.c. Issue
20813[28].
• Lua: FileHandler causing crash when reading packets. Issue
20817[29].
• Apply As Filter for field with FT_NONE and BASE_NONE for a single
byte does not use the hex value. Issue 20818[30].
• Layout preference Pane 3 problem with selecting Packet Diagram or
None. Issue 20819[31].
• TCP dissector creates invalid packet diagram. Issue 20820[32].
• Too many nested VLAN tags when opening as File Format. Issue
20831[33].
• Omnipeek files not working in 4.6.0. Issue 20842[34].
• Support UTF-16 strings in the IsoBus dissector for the string
operations. Issue 20845[35].
• SNMP getBulkRequest request-id does not get filtered for
correctly. Issue 20849[36].
• Fuzz job issue: fuzz-2025-11-12-12064814316.pcap. Issue 20852[37].
• UDP Port 853 (DoQ) should be decoded as QUIC. Issue 20856[38].
Wireshark 4.6.0 included the following changes. See the release
notes[39] for details:
Wireshark can dissect process information, packet metadata, flow IDs,
drop information, and other information provided by `tcpdump` on
macOS.
We now ship universal macOS installers instead of separate packages
for Arm64 and Intel. Issue 17294[40]
WinPcap is no longer supported. On Windows, use Npcap instead,
uninstalling WinPcap if necessary. The final release of WinPcap was
version 4.1.3 in 2013. It only supports up to Windows 8, which is no
longer supported by Microsoft or Wireshark.
A new “Plots” dialog has been added, which provides scatter plots in
contrast to the “I/O Graphs” dialog, which provides histograms. The
Plots dialog window supports multiple plots, markers, and automatic
scrolling.
Live captures can be compressed while writing. (Previously there was
support for compressing when performing multiple file capture, at file
rotation time.) The `--compress` option in TShark works on live
captures as well. Issue 9311[41]
Wireshark can now decrypt NTP packets using NTS (Network Time
Security). To decrypt packets, the NTS-KE (Network Time Security Key
Establishment Protocol) packets need to be present, alongside the TLS
client and exporter secrets.
Wireshark’s ability to decrypt MACsec packets has been expanded to
either use the SAK unwrapped by the MKA dissector, or the PSK
configured in the MACsec dissector.
The TCP Stream Graph axes now use units with SI prefixes. Issue
20197[42]
Display filter functions `float` and `double` are added to allow
explicitly converting field types like integers and times to single
and double precision floats.
A "Edit › Copy › as HTML" menu item has been added, along with
associated context menu items and a keyboard shortcut.
The Conversations and Endpoints dialogs have an option to display byte
counts and bit rates in exact counts instead of human-readable numbers
with SI units.
The color scheme can be set to Light or Dark mode independently of the
current OS default on Windows and macOS, if Wireshark is built with Qt
6.8 or later as the official installers are. Issue 19328[43]
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[44] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use "Help › About
Wireshark › Folders" or `tshark -G folders` to find the default
locations on your system.
Getting Help
The User’s Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/
Community support is available on Wireshark’s Q&A site[45] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark’s mailing lists can be found on the mailing list
site[46].
Bugs and feature requests can be reported on the issue tracker[47].
You can learn protocol analysis and meet Wireshark’s developers at
SharkFest[48].
How You Can Help
The Wireshark Foundation helps as many people as possible understand
their networks as much as possible. You can find out more and donate
at wiresharkfoundation.org[49].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[50].
References
1. https://wiresharkfoundation.org
2. https://sharkfest.wireshark.org/
3. https://www.wireshark.org/certifications
4. https://gitlab.com/wireshark/wireshark/-/issues/20881
5. https://www.wireshark.org/security/wnpa-sec-2025-07
6. https://gitlab.com/wireshark/wireshark/-/issues/20860
7. https://www.wireshark.org/security/wnpa-sec-2025-08
8. https://gitlab.com/wireshark/wireshark/-/issues/20884
9. https://gitlab.com/wireshark/wireshark/-/issues/20754
10. https://gitlab.com/wireshark/wireshark/-/issues/20876
11. https://gitlab.com/wireshark/wireshark/-/issues/20878
12. https://gitlab.com/wireshark/wireshark/-/issues/20881
13. https://gitlab.com/wireshark/wireshark/-/issues/20883
14. https://www.wireshark.org/docs/relnotes/wireshark-4.6.1.html
15. https://www.wireshark.org/security/wnpa-sec-2025-05
16. https://gitlab.com/wireshark/wireshark/-/issues/20770
17. https://www.wireshark.org/security/wnpa-sec-2025-06
18. https://gitlab.com/wireshark/wireshark/-/issues/20823
19. https://gitlab.com/wireshark/wireshark/-/issues/2241
20. https://gitlab.com/wireshark/wireshark/-/issues/20768
21. https://gitlab.com/wireshark/wireshark/-/issues/20776
22. https://gitlab.com/wireshark/wireshark/-/issues/20779
23. https://gitlab.com/wireshark/wireshark/-/issues/20786
24. https://gitlab.com/wireshark/wireshark/-/issues/20794
25. https://gitlab.com/wireshark/wireshark/-/issues/20797
26. https://gitlab.com/wireshark/wireshark/-/issues/20802
27. https://gitlab.com/wireshark/wireshark/-/issues/20803
28. https://gitlab.com/wireshark/wireshark/-/issues/20813
29. https://gitlab.com/wireshark/wireshark/-/issues/20817
30. https://gitlab.com/wireshark/wireshark/-/issues/20818
31. https://gitlab.com/wireshark/wireshark/-/issues/20819
32. https://gitlab.com/wireshark/wireshark/-/issues/20820
33. https://gitlab.com/wireshark/wireshark/-/issues/20831
34. https://gitlab.com/wireshark/wireshark/-/issues/20842
35. https://gitlab.com/wireshark/wireshark/-/issues/20845
36. https://gitlab.com/wireshark/wireshark/-/issues/20849
37. https://gitlab.com/wireshark/wireshark/-/issues/20852
38. https://gitlab.com/wireshark/wireshark/-/issues/20856
39. https://www.wireshark.org/docs/relnotes/wireshark-4.6.0.html
40. https://gitlab.com/wireshark/wireshark/-/issues/17294
41. https://gitlab.com/wireshark/wireshark/-/issues/9311
42. https://gitlab.com/wireshark/wireshark/-/issues/20197
43. https://gitlab.com/wireshark/wireshark/-/issues/19328
44. https://www.wireshark.org/download.html
45. https://ask.wireshark.org/
46. https://lists.wireshark.org/lists/
47. https://gitlab.com/wireshark/wireshark/-/issues
48. https://sharkfest.wireshark.org
49. https://wiresharkfoundation.org
50. https://www.wireshark.org/faq.html
Digests
wireshark-4.6.2.tar.xz: 50581900 bytes
SHA256(wireshark-4.6.2.tar.xz)=e218e3b3899e5d6e35a5fe95eeeabead587ed084cbf5fc330ac827f9a3137de8
SHA1(wireshark-4.6.2.tar.xz)=7b87d40d80552708befbb852bb1414c02010b2dc
Wireshark-4.6.2-arm64.exe: 75342184 bytes
SHA256(Wireshark-4.6.2-arm64.exe)=ed0f03cc3d4a0815731ca3c8531a5ec05e5a0d965a2c868d1d4c995d025f3758
SHA1(Wireshark-4.6.2-arm64.exe)=c93d4d271e01a9400f215ede235b2d86e344a4fa
Wireshark-4.6.2-x64.exe: 96624568 bytes
SHA256(Wireshark-4.6.2-x64.exe)=373a93e9b5ffa3559938424a2aabd3338786cff7bef084641c2c5e5bfb44325e
SHA1(Wireshark-4.6.2-x64.exe)=9680681c8426ed46bbe10533817dd067e73473cf
Wireshark-4.6.2-x64.msi: 73805824 bytes
SHA256(Wireshark-4.6.2-x64.msi)=fa979913b8caceaec071156b50be0b4a999bb0c21d29f05e1a8ee61ed90c1b45
SHA1(Wireshark-4.6.2-x64.msi)=b23a77980cf01f31fcc62b8ed9a7bc602f1d31cd
WiresharkPortable64_4.6.2.paf.exe: 95699608 bytes
SHA256(WiresharkPortable64_4.6.2.paf.exe)=00e42c7c303cda98266dea27cf6e744f1bda882d03384a484a5662ea9f943ffe
SHA1(WiresharkPortable64_4.6.2.paf.exe)=75d3edd27386dc2352ab1056b42297b8214150f7
Wireshark 4.6.2.dmg: 141491581 bytes
SHA256(Wireshark 4.6.2.dmg)=238af1a676f66a465de3edb6dfb7ce8bed5e91e91b26030f4c1a231982f8d206
SHA1(Wireshark 4.6.2.dmg)=c5f1d1bf5680f3b6fcfde75766dc1be5bdc5ea3b
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-x.y.z-x64.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
OpenPGP_signature.asc
Description: OpenPGP digital signature