Software 43380 Published by

Wireshark 4.4.7 is now available. The release addresses bug fixes for vulnerabilities, including wnpa-sec-2025-02 and LIN "go to sleep" in TECMP and CMP, as well as protocol issues, such as Protocol CIGI. The release additionally features new protocol support for AT, BT LE LL, CIGI, genl, LDAP, LIN, Logcat Text, net_dm, netfilter, nvme, SSH, TCPCL, TLS, WebSocket, ZigBee, and ZigBee ZCL.

The release does not introduce any new capture file support or file format decoding capabilities. Earlier iterations of Wireshark 4.4.6 contained issues within the EtherCAT dissector related to ECS order, as well as problems with conversation dialog columns reverting to their default width with each new packet during live capture. Additionally, there were complications associated with LTO-enabled builds on Ubuntu/Debian systems.



Wireshark 4.4.7 is now available

I'm proud to announce the release of Wireshark 4.4.7.

What is Wireshark?

Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education.

Wireshark is hosted by the Wireshark Foundation, a nonprofit which promotes protocol analysis education. Wireshark and the foundation depend on your contributions in order to do their work! If you or your organization would like to contribute or become a sponsor, please visit wiresharkfoundation.org[1].

What’s New

Bug Fixes

The following vulnerabilities have been fixed:

• wnpa-sec-2025-02[2] Dissection engine crash. Issue 20509[3]. CVE-2025-5601[4].

The following bugs have been fixed:

• Wireshark does not correctly decode LIN "go to sleep" in TECMP and CMP. Issue 20463[5].

• Dissector bug, Protocol CIGI. Issue 20496[6].

• Green power packets are not dissected when proto_version == ZBEE_VERSION_GREEN_POWER. Issue 20497[7].

• Packet diagrams misalign or drop bitfields. Issue 20507[8].

• Corruption when setting heuristic dissector table UI name from Lua. Issue 20523[9].

• LDAP dissector incorrectly displays filters with singleton "&" Issue 20527[10].

• WebSocket per-message compression extentions: fail to decompress server messages (from the 2nd) due to parameter handling. Issue 20531[11].

• The LL_PERIODIC_SYNC_WR_IND packet is not properly dissected (packet-btle.c) Issue 20554[12].

New and Updated Features

New Protocol Support

There are no new protocols in this release.

Updated Protocol Support

AT, BT LE LL, CIGI, genl, LDAP, LIN, Logcat Text, net_dm, netfilter, nvme, SSH, TCPCL, TLS, WebSocket, ZigBee, and ZigBee ZCL

New and Updated Capture File Support

There is no new or updated capture file support in this release.

Updated File Format Decoding Support

There is no updated file format support in this release.

Prior Versions

Wireshark 4.4.6 included the following changes. See the release notes[13] for details:

• Bug in EtherCAT dissector with ECS order. Issue 13718[14].

• Conversation dialog columns return to default width on each new packet in live capture. Issue 15978[15].

• Tests fail in LTO-enabled builds in Ubuntu/Debian. Issue 18216[16].

• Incorrect conditions in BFCP dissector. Issue 18717[17].

• Static build fails on Ubuntu 24.04 because the c-ares library isn’t found. Issue 20343[18].

• Flutter’s Image Picker Generated JPEG Files Detected as Malformed Packet. Issue 20355[19].

• QUIC dissector breaks when src and dst change. Issue 20371[20].

• s390x: build fail on Ubuntu PPA nighty build. Issue 20372[21].

• Trailing octet after IPv4 packet end is not detected or displayed in raw bytes. Issue 20423[22].

• [packet-ax25-nol3.c] Only call APRS dissector on UI Frames. Issue 20429[23].

• Wireshark hangs when refreshing interfaces with the debug console preference set to "always" and a file open (Windows) Issue 20434[24].

• BGP EVPN - Type-8 route not correctly read after addition of Max. Response Time field. Issue 20459[25].

• Wireshark does not correctly decode LIN "go to sleep" in TECMP and CMP. Issue 20463[26].

• MQTT-SN: WILLTOPIC message not decoded correctly (missing some flags) Issue 20476[27].

Wireshark 4.4.5 included the following changes. See the release notes[28] for details:

• GRPC: protobuf_json only displays the truncated string value. Issue 20392[29].

• Wireshark crashes when clicking on a column title/header. Issue 20403[30].

Wireshark 4.4.4 included the following changes. See the release notes[31] for details:

• wnpa-sec-2025-01[32] Bundle Protocol and CBOR dissector {crash,infinite loop,memory leak}. Issue 20373[33].

• Crash when sorting columns during capture with display filter active. Issue 20263[34].

• OSS-Fuzz 384757274: Invalid-bool-value in dissect_tcp. Issue 20300[35].

• Test failure in 4.4.2/4.4.3: test_sharkd_req_follow_http2. Issue 20330[36].

• Regression in extcap interface toolbar. Issue 20354[37].

• Clicking outside columns in TCP tab of Statistics → Conversations window causes crash. Issue 20357[38].

• FTBFS with Ubuntu development (25.04) release. Issue 20359[39].

• DNS enable_qname_stats crash Wireshark when QDCOUNT == 0. Issue 20367[40].

• Windows: Android extcap plugin fails with "Broken socket connection" if there are no new packets for 2sec. Issue 20386[41].

• TECMP: Calculation of lifecycle start in Status message is wrong. Issue 20387[42].

• MQTT v5.0 properties total length presentation is incorrect. Issue 20389[43].

• TShark doesn’t resolve addresses in custom "hosts" files. Issue 20391[44].

• Incorrect JA4 fingerprint with empty ciphers. Issue 20394[45].

Wireshark 4.4.3 included the following changes. See the release notes[46] for details:

• Potential mis-match in GSM MAP dissector for uncertainty radius and its filter key. Issue 20247[47].

• Macro eNodeB ID and Extended Macro eNodeB ID not decoded by User Location Information. Issue 20276[48].

• The NFSv2 Dissector appears to be swapping Character Special File and Directory in mode decoding. Issue 20290[49].

• CMake discovers Strawberry Perl’s zlib DLL when it shouldn’t. Issue 20304[50].

• VOIP Calls call flow displaying hours. Issue 20311[51].

• Fuzz job issue: fuzz-2024-12-26-7898.pcap. Issue 20313[52].

• sFlow: Incorrect length passed to header sample dissector. Issue 20320[53].

• wsutil: Should link against -lm due to missing fabs() when built with -fno-builtin. Issue 20326[54].

Wireshark 4.4.2 included the following changes. See the release notes[55] for details:

• wnpa-sec-2024-14[56] FiveCo RAP dissector infinite loop. Issue 20176[57].

• wnpa-sec-2024-15[58] ECMP dissector crash. Issue 20214[59].

• CIP I/O is not detected by "enip" filter anymore. Issue 19517[60].

• Fuzz job issue: fuzz-2024-09-03-7550.pcap. Issue 20041[61].

• OSS-Fuzz 71476: wireshark:fuzzshark_ip_proto-udp: Index-out-of-bounds in DOFObjectID_Create_Unmarshal. Issue 20065[62].

• JA4_c hashes an empty field to e3b0c44298fc when it should be 000000000000. Issue 20066[63].

• Opening Wireshark 4.4.0 on macOS 15.0 disconnects iPhone Mirroring. Issue 20082[64].

• PTP analysis loses track of message associations in case of sequence number resets. Issue 20099[65].

• USB CCID: response packet in case SetParameters command is unsupported is flagged as malformed. Issue 20107[66].

• dumpcap crashes when run from TShark with a capture filter. Issue 20108[67].

• SRT dissector: The StreamID (SID) in the handshake extension is displayed without regarding the control characters and with NUL as terminating. Issue 20113[68].

• Ghost error message on POP3 packets. Issue 20124[69].

• Building against c-ares 1.34 fails. Issue 20125[70].

• D-Bus is not optional anymore. Issue 20126[71].

• macOS Intel DMGs aren’t fully notarized. Issue 20129[72].

• Incorrect name for MLD Capabilities and Operations Present flag in dissection of MLD Capabilities for MLO wifi-7 capture. Issue 20134[73].

• CQL Malformed Packet v4 S → C Type RESULT: Prepared[Malformed Packet] Issue 20142[74].

• Wi-Fi: 256 Block Ack (BA) is not parsed properly. Issue 20156[75].

• BACnet ReadPropertyMultiple request Maximum allowed recursion depth reached. Issue 20159[76].

• Statistics→I/O Graph crashes when using simple moving average. Issue 20163[77].

• HTTP2 body decompression fails on DATA with a single padded frame. Issue 20167[78].

• Compiler warning for ui/tap-rtp-common.c (ignoring return value) Issue 20169[79].

• SIP dissector bug due to "be-route" param in VIA header. Issue 20173[80].

• Coredump after trying to open 'Follow TCP stream' Issue 20174[81].

• Protobuf JSON mapping error. Issue 20182[82].

• Display filter "!stp.pvst.origvlan in { vlan.id }" causes a crash (Version 4.4.1) Issue 20183[83].

• Extcap plugins shipped with Wireshark Portable are not found in version 4.4.1. Issue 20184[84].

• IEEE 802.11be: Wrong regulatory info in HE Operation IE in Beacon frame. Issue 20187[85].

• Wireshark 4.4.1 does not decode RTCP packets. Issue 20188[86].

• Qt: Display filter sub-menu can only be opened on the triangle, not the full name. Issue 20190[87].

• Qt: Changing the display filter does not update the Conversations or Endpoints dialogs. Issue 20191[88].

• MODBUS Dissector bug. Issue 20192[89].

• Modbus dissector bug - Field Occurence and Layer Operator modbus.bitval field. Issue 20193[90].

• Wireshark crashes when a field is dragged from packet details towards the find input. Issue 20204[91].

• Lua DissectorTable("") : set ("10,11") unexpected behavior in locales with comma as decimal separator. Issue 20216[92].

The TCP dissector no longer falls back to using the client port as a criterion for selecting a payload dissector when the server port does not select a payload dissector (except for port 20, active FTP). This behavior can be changed using the "Client port dissectors" preference.

Display filters now correctly handle floating point conversion errors.

The Lua API now has better support for comma-separated ranges in different locales.

Wireshark 4.4.1 included the following changes. See the release notes[93] for details:

• wnpa-sec-2024-12[94] ITS dissector crash. Issue 20026[95].

• wnpa-sec-2024-13[96] AppleTalk and RELOAD Framing dissector crashes. Issue 20114[97].

• Refresh interface during live-capture leads to corrupt interface handling. Issue 11176[98].

• Media type "application/octet-stream" registered for both Thread and UASIP. Issue 14729[99].

• Extcap toolbar stops working when new interface is added. Issue 19854[100].

• Decoding error ITS CPM version 2.1.1. Issue 19886[101].

• Build error in 4.3.0: sync_pipe_run_command_actual error: argument 2 is null but the corresponding size argument 3 value is 512004 [-Werror=nonnull] Issue 19930[102].

• html2text.py doesn’t handle the `sup` tag. Issue 20020[103].

    • Incorrect NetFlow v8 TOS AS aggregation dissection. Issue  20021[104].

• The Windows packages don’t ship with the IP address plugin. Issue  20030[105].

• O_PATH is Linux-and-FreeBSD-specific. Issue 20031[106].

• Wireshark 4.4.0 doesn’t install USBcap USBcapCMD.exe in the  correct directory. Issue 20040[107].

• OER dissector is not considering the preamble if ASN.1 SEQUENCE  definition includes extension marker but no OPTIONAL items. Issue  20044[108].

• Bluetooth classic L2CAP incorrect dissection with connectionless  reception channel. Issue 20047[109].

• Profile auto switch filters : Grayed Display Filter Expression dialog box when opened from Configuration Profiles dialog box. Issue 20049[110].

• Wireshark 4.4.0 / macOS 14.6.1 wifi if monitor mode. Issue 20051[111].

• TECMP Data Type passes too much data to sub dissectors. Issue 20052[112].

• Wireshark and tshark 4.4.0 ignore extcap options specified on the command line. Issue 20054[113].

• Cannot open release notes due to incorrect path with duplicated directory components. Issue 20055[114].

• Unable to open "Release Notes" from the "Help" menu. Issue 20056[115].

• No capture interfaces if Wireshark is started from command line with certain paths. Issue 20057[116].

• Wireshark 4.4.0 extcap path change breaks third party extcap installers. Issue 20069[117].

• Fuzz job UTF-8 encoding issue: fuzz-2024-09-10-7618.pcap. Issue 20071[118].

• Unable to create larger files than 99 size units. Issue 20079[119].

• Opening Wireshark 4.4.0 on macOS 15.0 disconnects iPhone Mirroring. Issue 20082[120].

• PRP trailer not shown for L2 IEC 61850 GOOSE packets in 4.4.0 (was working in 4.2.7) Issue 20088[121].

• GUI lags because NetworkManager keeps turning 802.11 monitor mode off. Issue 20090[122].

• Error while getting Bluetooth application process id by shell:ps -A | grep com.*android.bluetooth Issue 20100[123].

• Fuzz job assertion: randpkt-2024-10-05-7200.pcap. Issue 20110[124].

  Wireshark 4.4.0 included the following changes. See the release notes[125] for details:

  Many improvements and fixes to the graphing dialogs, including I/O Graphs, Flow Graph / VoIP Calls, and TCP Stream Graphs.

  Wireshark now supports automatic profile switching. You can associate a display filter with a configuration profile, and when you open a capture file that matches the filter, Wireshark will automatically switch to that profile.

  Support for Lua 5.3 and 5.4 has been added, and support for Lua 5.1 and 5.2 has been removed. The Windows and macOS installers now ship with Lua 5.4.6.

  Improved display filter support for value strings (optional string representations for numeric fields).

  Display filter functions can be implemented as plugins, similar to protocol dissectors and file parsers.

  Display filters can be translated to pcap filters using "Edit › Copy › Display filter as pcap filter" if each display filter field has a corresponding pcap filter equivalent.

  Custom columns can be defined using any valid field expression, such as display filter functions, packet slices, arithmetic calculations, logical tests, raw byte addressing, and protocol layer modifiers.

  Custom output fields for `tshark -e` can also be defined using any valid field expression.

  Wireshark can be built with the zlib-ng instead of zlib for compressed file support. Zlib-ng is substantially faster than zlib. The official Windows and macOS packages include this feature.

 Getting Wireshark

  Wireshark source code and installation packages are available from   https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You  can usually install or upgrade Wireshark using the package management  system specific to that platform. A list of third-party packages can  be found on the download page[126] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use "Help › About Wireshark › Folders" or `tshark -G folders` to find the default locations on your system.

 Getting Help

  The User’s Guide, manual pages and various other documentation can be found at https://www.wireshark.org/docs/

  Community support is available on Wireshark’s Q&A site[127] and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark’s mailing lists can be found on the mailing list  site[128].

  Bugs and feature requests can be reported on the issue tracker[129].

  You can learn protocol analysis and meet Wireshark’s developers at  SharkFest[130].

 Getting Certified

  You can become a Wireshark Certified Analyst! Learn more at   https://www.wireshark.org/certifications

 How You Can Help

  The Wireshark Foundation helps as many people as possible understand their networks as much as possible. You can find out more and donate at wiresharkfoundation.org[131].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[132].

 References

   1. https://wiresharkfoundation.org
   2. https://www.wireshark.org/security/wnpa-sec-2025-02
   3. https://gitlab.com/wireshark/wireshark/-/issues/20509
   4. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
   5. https://gitlab.com/wireshark/wireshark/-/issues/20463
   6. https://gitlab.com/wireshark/wireshark/-/issues/20496
   7. https://gitlab.com/wireshark/wireshark/-/issues/20497
   8. https://gitlab.com/wireshark/wireshark/-/issues/20507
   9. https://gitlab.com/wireshark/wireshark/-/issues/20523
  10. https://gitlab.com/wireshark/wireshark/-/issues/20527
  11. https://gitlab.com/wireshark/wireshark/-/issues/20531
  12. https://gitlab.com/wireshark/wireshark/-/issues/20554
  13. https://www.wireshark.org/docs/relnotes/wireshark-4.4.6.html
  14. https://gitlab.com/wireshark/wireshark/-/issues/13718
  15. https://gitlab.com/wireshark/wireshark/-/issues/15978
  16. https://gitlab.com/wireshark/wireshark/-/issues/18216
  17. https://gitlab.com/wireshark/wireshark/-/issues/18717
  18. https://gitlab.com/wireshark/wireshark/-/issues/20343
  19. https://gitlab.com/wireshark/wireshark/-/issues/20355
  20. https://gitlab.com/wireshark/wireshark/-/issues/20371
  21. https://gitlab.com/wireshark/wireshark/-/issues/20372
  22. https://gitlab.com/wireshark/wireshark/-/issues/20423
  23. https://gitlab.com/wireshark/wireshark/-/issues/20429
  24. https://gitlab.com/wireshark/wireshark/-/issues/20434
  25. https://gitlab.com/wireshark/wireshark/-/issues/20459
  26. https://gitlab.com/wireshark/wireshark/-/issues/20463
  27. https://gitlab.com/wireshark/wireshark/-/issues/20476
  28. https://www.wireshark.org/docs/relnotes/wireshark-4.4.5.html
  29. https://gitlab.com/wireshark/wireshark/-/issues/20392
  30. https://gitlab.com/wireshark/wireshark/-/issues/20403
  31. https://www.wireshark.org/docs/relnotes/wireshark-4.4.4.html
  32. https://www.wireshark.org/security/wnpa-sec-2025-01
  33. https://gitlab.com/wireshark/wireshark/-/issues/20373
  34. https://gitlab.com/wireshark/wireshark/-/issues/20263
  35. https://gitlab.com/wireshark/wireshark/-/issues/20300
  36. https://gitlab.com/wireshark/wireshark/-/issues/20330
  37. https://gitlab.com/wireshark/wireshark/-/issues/20354
  38. https://gitlab.com/wireshark/wireshark/-/issues/20357
  39. https://gitlab.com/wireshark/wireshark/-/issues/20359
  40. https://gitlab.com/wireshark/wireshark/-/issues/20367
  41. https://gitlab.com/wireshark/wireshark/-/issues/20386
  42. https://gitlab.com/wireshark/wireshark/-/issues/20387
  43. https://gitlab.com/wireshark/wireshark/-/issues/20389
  44. https://gitlab.com/wireshark/wireshark/-/issues/20391
  45. https://gitlab.com/wireshark/wireshark/-/issues/20394
  46. https://www.wireshark.org/docs/relnotes/wireshark-4.4.3.html
  47. https://gitlab.com/wireshark/wireshark/-/issues/20247
  48. https://gitlab.com/wireshark/wireshark/-/issues/20276
  49. https://gitlab.com/wireshark/wireshark/-/issues/20290
  50. https://gitlab.com/wireshark/wireshark/-/issues/20304
  51. https://gitlab.com/wireshark/wireshark/-/issues/20311
  52. https://gitlab.com/wireshark/wireshark/-/issues/20313
  53. https://gitlab.com/wireshark/wireshark/-/issues/20320
  54. https://gitlab.com/wireshark/wireshark/-/issues/20326
  55. https://www.wireshark.org/docs/relnotes/wireshark-4.4.2.html
  56. https://www.wireshark.org/security/wnpa-sec-2024-14
  57. https://gitlab.com/wireshark/wireshark/-/issues/20176
  58. https://www.wireshark.org/security/wnpa-sec-2024-15
  59. https://gitlab.com/wireshark/wireshark/-/issues/20214
  60. https://gitlab.com/wireshark/wireshark/-/issues/19517
  61. https://gitlab.com/wireshark/wireshark/-/issues/20041
  62. https://gitlab.com/wireshark/wireshark/-/issues/20065
  63. https://gitlab.com/wireshark/wireshark/-/issues/20066
  64. https://gitlab.com/wireshark/wireshark/-/issues/20082
  65. https://gitlab.com/wireshark/wireshark/-/issues/20099
  66. https://gitlab.com/wireshark/wireshark/-/issues/20107
  67. https://gitlab.com/wireshark/wireshark/-/issues/20108
  68. https://gitlab.com/wireshark/wireshark/-/issues/20113
  69. https://gitlab.com/wireshark/wireshark/-/issues/20124
  70. https://gitlab.com/wireshark/wireshark/-/issues/20125
  71. https://gitlab.com/wireshark/wireshark/-/issues/20126
  72. https://gitlab.com/wireshark/wireshark/-/issues/20129
  73. https://gitlab.com/wireshark/wireshark/-/issues/20134
  74. https://gitlab.com/wireshark/wireshark/-/issues/20142
  75. https://gitlab.com/wireshark/wireshark/-/issues/20156
  76. https://gitlab.com/wireshark/wireshark/-/issues/20159
  77. https://gitlab.com/wireshark/wireshark/-/issues/20163
  78. https://gitlab.com/wireshark/wireshark/-/issues/20167
  79. https://gitlab.com/wireshark/wireshark/-/issues/20169
  80. https://gitlab.com/wireshark/wireshark/-/issues/20173
  81. https://gitlab.com/wireshark/wireshark/-/issues/20174
  82. https://gitlab.com/wireshark/wireshark/-/issues/20182
  83. https://gitlab.com/wireshark/wireshark/-/issues/20183
  84. https://gitlab.com/wireshark/wireshark/-/issues/20184
  85. https://gitlab.com/wireshark/wireshark/-/issues/20187
  86. https://gitlab.com/wireshark/wireshark/-/issues/20188
  87. https://gitlab.com/wireshark/wireshark/-/issues/20190
  88. https://gitlab.com/wireshark/wireshark/-/issues/20191
  89. https://gitlab.com/wireshark/wireshark/-/issues/20192
  90. https://gitlab.com/wireshark/wireshark/-/issues/20193
  91. https://gitlab.com/wireshark/wireshark/-/issues/20204
  92. https://gitlab.com/wireshark/wireshark/-/issues/20216
  93. https://www.wireshark.org/docs/relnotes/wireshark-4.4.1.html
  94. https://www.wireshark.org/security/wnpa-sec-2024-12
  95. https://gitlab.com/wireshark/wireshark/-/issues/20026
  96. https://www.wireshark.org/security/wnpa-sec-2024-13
  97. https://gitlab.com/wireshark/wireshark/-/issues/20114
  98. https://gitlab.com/wireshark/wireshark/-/issues/11176
  99. https://gitlab.com/wireshark/wireshark/-/issues/14729
  100. https://gitlab.com/wireshark/wireshark/-/issues/19854
  101. https://gitlab.com/wireshark/wireshark/-/issues/19886
  102. https://gitlab.com/wireshark/wireshark/-/issues/19930
  103. https://gitlab.com/wireshark/wireshark/-/issues/20020
  104. https://gitlab.com/wireshark/wireshark/-/issues/20021
  105. https://gitlab.com/wireshark/wireshark/-/issues/20030
  106. https://gitlab.com/wireshark/wireshark/-/issues/20031
  107. https://gitlab.com/wireshark/wireshark/-/issues/20040
  108. https://gitlab.com/wireshark/wireshark/-/issues/20044
  109. https://gitlab.com/wireshark/wireshark/-/issues/20047
  110. https://gitlab.com/wireshark/wireshark/-/issues/20049
  111. https://gitlab.com/wireshark/wireshark/-/issues/20051
  112. https://gitlab.com/wireshark/wireshark/-/issues/20052
  113. https://gitlab.com/wireshark/wireshark/-/issues/20054
  114. https://gitlab.com/wireshark/wireshark/-/issues/20055
  115. https://gitlab.com/wireshark/wireshark/-/issues/20056
  116. https://gitlab.com/wireshark/wireshark/-/issues/20057
  117. https://gitlab.com/wireshark/wireshark/-/issues/20069
  118. https://gitlab.com/wireshark/wireshark/-/issues/20071
  119. https://gitlab.com/wireshark/wireshark/-/issues/20079
  120. https://gitlab.com/wireshark/wireshark/-/issues/20082
  121. https://gitlab.com/wireshark/wireshark/-/issues/20088
  122. https://gitlab.com/wireshark/wireshark/-/issues/20090
  123. https://gitlab.com/wireshark/wireshark/-/issues/20100
  124. https://gitlab.com/wireshark/wireshark/-/issues/20110
  125. https://www.wireshark.org/docs/relnotes/wireshark-4.4.0.html
  126. https://www.wireshark.org/download.html
  127. https://ask.wireshark.org/
  128. https://lists.wireshark.org/lists/
  129. https://gitlab.com/wireshark/wireshark/-/issues
  130. https://sharkfest.wireshark.org
  131. https://wiresharkfoundation.org
  132. https://www.wireshark.org/faq.html

Digests

wireshark-4.4.7.tar.xz: 46812644 bytes
SHA256(wireshark-4.4.7.tar.xz)=5644143fed6363fa6c0cf58c2a6fe9ba0922efaea8f981c7228260bf46f1494b
SHA1(wireshark-4.4.7.tar.xz)=40e6137d62c37b8194f07e40ef1d64883edb625b

Wireshark-4.4.7-arm64.exe: 68810760 bytes
SHA256(Wireshark-4.4.7-arm64.exe)=0cf111154d7234983ef08ba6d25447a2aa019f1e033e1505f7cff90f38bdb0f5
SHA1(Wireshark-4.4.7-arm64.exe)=5d87da6ff3f382f619f45106bc41ea4c7dfef2c6

Wireshark-4.4.7-x64.exe: 87351272 bytes
SHA256(Wireshark-4.4.7-x64.exe)=2e33fbda09cbc697a293faeba8a4fe4c2fcfc57db7ccf6421ec1f2c05223e6ac
SHA1(Wireshark-4.4.7-x64.exe)=cc8e0e33b29840015e83bf98f6eb54b27b6feb87

Wireshark-4.4.7-x64.msi: 64106496 bytes
SHA256(Wireshark-4.4.7-x64.msi)=6a6db09cb77689adff86ae5af2fb783573778c01644f61d39de28789ae71a765
SHA1(Wireshark-4.4.7-x64.msi)=8d4a4a1708e4bc090e51d85c711b2e544733e55c

WiresharkPortable64_4.4.7.paf.exe: 64489728 bytes
SHA256(WiresharkPortable64_4.4.7.paf.exe)=6c808766180ff9252b1ab4797f95f8f23655248f938439d0e41521d12d60d941
SHA1(WiresharkPortable64_4.4.7.paf.exe)=7e757ef6de9d84e0b81ebe46823e842f944f99d5

Wireshark 4.4.7 Arm 64.dmg: 65473014 bytes
SHA256(Wireshark 4.4.7 Arm 64.dmg)=af1189f35774c2cf86578c4c143a79824c43070c59f7b01acff27469a40a847a
SHA1(Wireshark 4.4.7 Arm 64.dmg)=01a20de023b3cbd8ecc5800270a41e1131a1fb29

Wireshark 4.4.7 Intel 64.dmg: 69195978 bytes
SHA256(Wireshark 4.4.7 Intel 64.dmg)=dd735fa58a7390e242717a9badcc2168ff9c41ec559a4897b193d5b46f3b2788
SHA1(Wireshark 4.4.7 Intel 64.dmg)=135549e0c213037d5bf9625a7e7010091012b1d0

You can validate these hashes using the following commands (among others):

    Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

Screenshot_from_2025_06_05_08_21_06