Wireshark-users: [Wireshark-users] Wireshark 3.6.11 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 18 Jan 2023 13:58:56 -0800
I'm proud to announce the release of Wireshark 3.6.11.
What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
What’s New
This is the last release branch with support for 32-bit Windows.
Updates will no longer be available after May 22, 2024 for that
platform. Issue 17779[1]
Bug Fixes
The following vulnerabilities have been fixed:
• wnpa-sec-2023-02[2] NFS dissector memory leak. Issue 18628[3].
• wnpa-sec-2023-03[4] Dissection engine crash. Issue 18766[5].
• wnpa-sec-2023-04[6] GNW dissector crash. Issue 18779[7].
• wnpa-sec-2023-05[8] iSCSI dissector crash. Issue 18796[9].
• wnpa-sec-2023-06[10] Multiple dissector excessive loops. Issue
18711[11]. Issue 18720[12], Issue 18737[13].
• wnpa-sec-2023-07[14] TIPC dissector crash. Issue 18770[15].
The following bugs have been fixed:
• Qt: After modifying coloring rules, the coloring rule applied to
the first packet reflects the coloring rules previously in
effect. Issue 12475[16].
• Help file doesn’t display for extcap interfaces Issue 15592[17].
• Dissector bug, protocol DRBD Issue 16689[18].
• For USB traffic on XHC20 interface destination is always given as
Host Issue 16768[19].
• Wrong pointer conversion in get_data_source_tvb_by_name() Issue
18517[20].
• Wrong number of bits skipped while decoding an empty UTF8String
on UPER packet Issue 18702[21].
• Uninitialized values in various dissectors Issue 18742[22].
• Q.850 - error in label for cause 0x7F Issue 18780[23].
• Uninitialized values in CoAP and RTPS dissectors Issue 18785[24].
• Screenshots in AppStream metainfo.xml file not available Issue
18801[25].
New and Updated Features
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
BEEP, BGP, BPv6, BSSGP, CoAP, GNW, GSM A-bis P-GSL, GSM BSSMAP,
iSCSI, ISUP, Kafka, LwM2M-TLV, NAS-5GS, NFS, OPUS, RLC, ROHC, RTPS,
TCP, Telnet, and USB
New and Updated Capture File Support
There is no new or updated capture file support in this release.
New File Format Decoding Support
There is no new or updated file format support in this release.
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[26] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use "Help › About
Wireshark › Folders" or `tshark -G folders` to find the default
locations on your system.
Getting Help
The User’s Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/
Community support is available on Wireshark’s Q&A site[27] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark’s mailing lists can be found on the web site[28].
Bugs and feature requests can be reported on the issue tracker[29].
How You Can Help
The Wireshark Foundation helps as many people as possible understand
their networks as much as possible. You can find out more and donate
at wiresharkfoundation.org[30].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[31].
References
1. https://gitlab.com/wireshark/wireshark/-/issues/17779
2. https://www.wireshark.org/security/wnpa-sec-2023-02
3. https://gitlab.com/wireshark/wireshark/-/issues/18628
4. https://www.wireshark.org/security/wnpa-sec-2023-03
5. https://gitlab.com/wireshark/wireshark/-/issues/18766
6. https://www.wireshark.org/security/wnpa-sec-2023-04
7. https://gitlab.com/wireshark/wireshark/-/issues/18779
8. https://www.wireshark.org/security/wnpa-sec-2023-05
9. https://gitlab.com/wireshark/wireshark/-/issues/18796
10. https://www.wireshark.org/security/wnpa-sec-2023-06
11. https://gitlab.com/wireshark/wireshark/-/issues/18711
12. https://gitlab.com/wireshark/wireshark/-/issues/18720
13. https://gitlab.com/wireshark/wireshark/-/issues/18737
14. https://www.wireshark.org/security/wnpa-sec-2023-07
15. https://gitlab.com/wireshark/wireshark/-/issues/18770
16. https://gitlab.com/wireshark/wireshark/-/issues/12475
17. https://gitlab.com/wireshark/wireshark/-/issues/15592
18. https://gitlab.com/wireshark/wireshark/-/issues/16689
19. https://gitlab.com/wireshark/wireshark/-/issues/16768
20. https://gitlab.com/wireshark/wireshark/-/issues/18517
21. https://gitlab.com/wireshark/wireshark/-/issues/18702
22. https://gitlab.com/wireshark/wireshark/-/issues/18742
23. https://gitlab.com/wireshark/wireshark/-/issues/18780
24. https://gitlab.com/wireshark/wireshark/-/issues/18785
25. https://gitlab.com/wireshark/wireshark/-/issues/18801
26. https://www.wireshark.org/download.html
27. https://ask.wireshark.org/
28. https://www.wireshark.org/lists/
29. https://gitlab.com/wireshark/wireshark/-/issues
30. https://wiresharkfoundation.org
31. https://www.wireshark.org/faq.html
Digests
wireshark-3.6.11.tar.xz: 39967744 bytes
SHA256(wireshark-3.6.11.tar.xz)=d3accbd31acdaaf0921a4584893abd9732b4bb36c9dd2eed4986c3765f01913e
SHA1(wireshark-3.6.11.tar.xz)=ef155d0cf8bbc8fdf892559ab9fff1b795df5d05
Wireshark-win32-3.6.11.exe: 61128592 bytes
SHA256(Wireshark-win32-3.6.11.exe)=989365ec12826a06876d0bc8c7fe0437a1664debf378aaddae34955c2f1dc23d
SHA1(Wireshark-win32-3.6.11.exe)=c1ee791e457d7ed1ef6a88469d51bb7be2936837
Wireshark-win32-3.6.11.msi: 45699072 bytes
SHA256(Wireshark-win32-3.6.11.msi)=0b5922fe3a3644930b77993cab27ee0bcf11e6873d5e9916685613e0e7ac7c26
SHA1(Wireshark-win32-3.6.11.msi)=4988a6683e398088867052c733c25832f5c2413e
WiresharkPortable32_3.6.11.paf.exe: 39696944 bytes
SHA256(WiresharkPortable32_3.6.11.paf.exe)=d17a54a087505745facfcf596ecf27b3555186d19ec66371824af79308c2f120
SHA1(WiresharkPortable32_3.6.11.paf.exe)=792e43f0f1cb2e9858fa3d7a848dd8f3155944ad
Wireshark 3.6.11 Arm 64.dmg: 137810413 bytes
SHA256(Wireshark 3.6.11 Arm 64.dmg)=7e55a19b00680cfdf2503e5f1ea05a6fd66877489863b3b09edf6ffe0c31578a
SHA1(Wireshark 3.6.11 Arm 64.dmg)=4be290b00304a88822d609adca27e5504a4e582f
Wireshark 3.6.11 Intel 64.dmg: 139321905 bytes
SHA256(Wireshark 3.6.11 Intel 64.dmg)=674b2602d723c1751cb73b348009cbb2c5e9d937c99650f25da91e72c36ce81f
SHA1(Wireshark 3.6.11 Intel 64.dmg)=babab0f469eb960eb9e8a23a21451eb41380a6b1
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
OpenPGP_signature
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-users] Wireshark 4.0.3 is now available
- Next by Date: [Wireshark-users] Where to find documentation about the formats when to read pcapng data with python?
- Previous by thread: [Wireshark-users] Wireshark 4.0.3 is now available
- Next by thread: [Wireshark-users] Where to find documentation about the formats when to read pcapng data with python?
- Index(es):