Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-announce: [Wireshark-announce] Wireshark 4.0.4 is now available

From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Thu, 2 Mar 2023 13:37:40 -0800
I'm proud to announce the release of Wireshark 4.0.4.


 What is Wireshark?

  Wireshark is the world’s most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

 What’s New

  We do not ship official 32-bit Windows packages for Wireshark 4.0 and
  later. If you need to use Wireshark on that platform, we recommend
  using the latest 3.6 release. Issue 17779[1]

  If you’re running Wireshark on macOS and upgraded to macOS 13 from an
  earlier version, you will likely have to open and run the “Uninstall
  ChmodBPF” package, then open and run “Install ChmodBPF” in order to
  reset the ChmodBPF Launch Daemon. Issue 18734[2].

  Bug Fixes

   The following vulnerabilities have been fixed:

     • wnpa-sec-2023-08[3] ISO 15765 and ISO 10681 dissector crash.
       Issue 18839[4].

   The following bugs have been fixed:

     • UTF-8 characters end up escaped in PSML output. Issue 10445[5].

     • Export filtered displayed packets won’t save IP fragments of SCTP
       fragments needed to reassemble a displayed frame. Issue 12597[6].

     • DICOM dissection in reassembled PDV goes wrong. Issue 13388[7].

     • "Export Objects - IMF" produces incorrect file, TCP reassembly
       fails with retransmissions that have additional data. Issue
       13523[8].

     • The intelligent scroll bar or minimap is not predictable on
       locating and scrolling. Issue 13989[9].

     • If you mark (or unmark) the currently-selected frame, the packet
       details still say it’s not marked (or it is marked) Issue
       14330[10].

     • An out-of-order packet incorrectly detected as retransmission
       breaks desegmentation of TCP stream. Issue 15993[11].

     • Sorting Packet Loss Column is not sorting correct. Issue
       16785[12].

     • Some HTTPS packets cannot be decrypted. Issue 17406[13].

     • SIP TCP decoding regression from Wireshark 1.99.0 to 3.6.8. Issue
       18411[14].

     • Frame comments not preserved when using filter to write new pcap
       from tshark. Issue 18693[15].

     • ChmodBPF not working on macOS Ventura 13.1. Issue 18734[16].

     • Wireshark GUI and window manager stuck after setting display
       filter. Issue 18809[17].

     • Dissector bug, protocol H.261. Issue 18812[18].

     • File extension heuristics are case-sensitive. Issue 18821[19].

     • Symbolic links to packages in macOS dmg can’t be double-clicked
       to install on macOS 13.2. Issue 18830[20].

     • Potential memory leak in tshark.c. Issue 18837[21].

     • Fuzz job crash output: fuzz-2023-02-05-7303.pcap. Issue
       18842[22].

     • f5fileinfo: Hardware platforms missing descriptions. Issue
       18848[23].

     • The lines in the intelligent scrollbar are off by one. Issue
       18850[24].

     • Wireshark crashes on invalid UDS packet in Lua context. Issue
       18865[25].

     • TECMP dissector shows the wrong Voltage in Vendor Data. Issue
       18871[26].

     • UDS: Names of RDTCI subfunctions 0x0b …​ 0x0e are not correct.
       Issue 18873[27].

  New and Updated Features

   There are no new or updated features in this release.

  Removed Features and Support

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   ASTERIX, BGP, DHCP, ERF, F5 Ethernet trailer, GMR-1 RR, Gryphon, GSM
   SMS, H.261, H.450, ISO 10681, ISO 15765, MIPv6, NAS-5gs, NR RRC, NS
   Trace, OptoMMP, PDCP-LTE, PDCP-NR, QSIG, ROHC, RSVP, RTCP, SCTP, SIP,
   TCP, TECMP, TWAMP, UDS, and UMTS RLC

  New and Updated Capture File Support

   There is no new or updated capture file support in this release.

  New File Format Decoding Support

   There is no new or updated file format support in this release.

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[28] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use "Help › About
  Wireshark › Folders" or `tshark -G folders` to find the default
  locations on your system.

 Getting Help

  The User’s Guide, manual pages and various other documentation can be
  found at https://www.wireshark.org/docs/

  Community support is available on Wireshark’s Q&A site[29] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark’s mailing lists can be found on the web site[30].

  Bugs and feature requests can be reported on the issue tracker[31].

  You can learn protocol analysis and meet Wireshark’s developers at
  SharkFest[32].

 How You Can Help

  The Wireshark Foundation helps as many people as possible understand
  their networks as much as possible. You can find out more and donate
  at wiresharkfoundation.org[33].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[34].

 References

   1. https://gitlab.com/wireshark/wireshark/-/issues/17779
   2. https://gitlab.com/wireshark/wireshark/-/issues/18734
   3. https://www.wireshark.org/security/wnpa-sec-2023-08
   4. https://gitlab.com/wireshark/wireshark/-/issues/18839
   5. https://gitlab.com/wireshark/wireshark/-/issues/10445
   6. https://gitlab.com/wireshark/wireshark/-/issues/12597
   7. https://gitlab.com/wireshark/wireshark/-/issues/13388
   8. https://gitlab.com/wireshark/wireshark/-/issues/13523
   9. https://gitlab.com/wireshark/wireshark/-/issues/13989
  10. https://gitlab.com/wireshark/wireshark/-/issues/14330
  11. https://gitlab.com/wireshark/wireshark/-/issues/15993
  12. https://gitlab.com/wireshark/wireshark/-/issues/16785
  13. https://gitlab.com/wireshark/wireshark/-/issues/17406
  14. https://gitlab.com/wireshark/wireshark/-/issues/18411
  15. https://gitlab.com/wireshark/wireshark/-/issues/18693
  16. https://gitlab.com/wireshark/wireshark/-/issues/18734
  17. https://gitlab.com/wireshark/wireshark/-/issues/18809
  18. https://gitlab.com/wireshark/wireshark/-/issues/18812
  19. https://gitlab.com/wireshark/wireshark/-/issues/18821
  20. https://gitlab.com/wireshark/wireshark/-/issues/18830
  21. https://gitlab.com/wireshark/wireshark/-/issues/18837
  22. https://gitlab.com/wireshark/wireshark/-/issues/18842
  23. https://gitlab.com/wireshark/wireshark/-/issues/18848
  24. https://gitlab.com/wireshark/wireshark/-/issues/18850
  25. https://gitlab.com/wireshark/wireshark/-/issues/18865
  26. https://gitlab.com/wireshark/wireshark/-/issues/18871
  27. https://gitlab.com/wireshark/wireshark/-/issues/18873
  28. https://www.wireshark.org/download.html
  29. https://ask.wireshark.org/
  30. https://www.wireshark.org/lists/
  31. https://gitlab.com/wireshark/wireshark/-/issues
  32. https://sharkfest.wireshark.org
  33. https://wiresharkfoundation.org
  34. https://www.wireshark.org/faq.html


Digests

wireshark-4.0.4.tar.xz: 41399396 bytes
SHA256(wireshark-4.0.4.tar.xz)=a4a09f6564f00639036ffe5064ac4dc2176adfa3e484c539c9c73f835436e74b
SHA1(wireshark-4.0.4.tar.xz)=ae3c28d6966c420ee3a8d058ea212a1b6adab50f

Wireshark-win64-4.0.4.exe: 78751312 bytes
SHA256(Wireshark-win64-4.0.4.exe)=042732cd3a86688cc1b83b2f9473335e80280933634f74efc8c277833fb46abb
SHA1(Wireshark-win64-4.0.4.exe)=b19ab42a1ee21dc6543b41e26c8a0af90dd7e1d1

Wireshark-win64-4.0.4.msi: 52166656 bytes
SHA256(Wireshark-win64-4.0.4.msi)=9c2e5d1467547399eb08990b00fd48d84e5adc788eafe30aaf0333156c446b96
SHA1(Wireshark-win64-4.0.4.msi)=3e79936563a0a993e35793101df1d2a66cca5094

WiresharkPortable64_4.0.4.paf.exe: 45527960 bytes
SHA256(WiresharkPortable64_4.0.4.paf.exe)=d72789ce7ca3715c044ac0913ba0603df89699ebb6f3839547d64ac1fd9a1518
SHA1(WiresharkPortable64_4.0.4.paf.exe)=36f44b55d6987724c3489caee635e82762c9fef1

Wireshark 4.0.4 Arm 64.dmg: 64614285 bytes
SHA256(Wireshark 4.0.4 Arm 64.dmg)=6434479defbb2edd6457b9f395c119799310e4675f9fe1145df40c1266bda5e4
SHA1(Wireshark 4.0.4 Arm 64.dmg)=6acb6739f10d98f1fb0659374ca51ec90a75355c

Wireshark 4.0.4 Intel 64.dmg: 68081342 bytes
SHA256(Wireshark 4.0.4 Intel 64.dmg)=86f14b2b839a9d2793ce9c0531ddab70e31475541fa9744f26ac8b1227dd29cc
SHA1(Wireshark 4.0.4 Intel 64.dmg)=75d5ae40cc1af0e6b8f48d8c4e60788e141820ed

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

Attachment: OpenPGP_signature
Description: OpenPGP digital signature