Accepting request 1146763 from network:utilities

OBS-URL: https://build.opensuse.org/request/show/1146763
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/wireshark?expand=0&rev=216
This commit is contained in:
Ana Guerrero 2024-02-15 20:00:05 +00:00 committed by Git OBS Bridge
commit 13fa957cd7
6 changed files with 498 additions and 455 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:9e3672be8c6caf9279a5a13582d6711ab699ae2a79323e92a99409c1ead98521
size 44918888

View File

@ -1,53 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
wireshark-4.2.2.tar.xz: 44918888 bytes
SHA256(wireshark-4.2.2.tar.xz)=9e3672be8c6caf9279a5a13582d6711ab699ae2a79323e92a99409c1ead98521
SHA1(wireshark-4.2.2.tar.xz)=b14f94019c0a0d01409d57736dd458c23fceba78
Wireshark-4.2.2-arm64.exe: 67867832 bytes
SHA256(Wireshark-4.2.2-arm64.exe)=1f87e5918604d42956c1ec5ae1aa9aedfe1a50a343dcaa533160c295c3176579
SHA1(Wireshark-4.2.2-arm64.exe)=40819c8ec260c10ed6d23e5ee0e4c15b8100030e
Wireshark-4.2.2-x64.exe: 86375712 bytes
SHA256(Wireshark-4.2.2-x64.exe)=3bd13a521b1e9d100e800b666705da132e584cccbd4f30c88e9cf0d93289b2fa
SHA1(Wireshark-4.2.2-x64.exe)=2b8f90a64b1dad7791de0b430f661788f8d082ce
Wireshark-4.2.2-x64.msi: 62820352 bytes
SHA256(Wireshark-4.2.2-x64.msi)=0ebc060fc70b61396c78fbcdd36ed56f3b64a2c96e1a44eebcc0e852c9bd7c20
SHA1(Wireshark-4.2.2-x64.msi)=efcab3048932cd7824f68697131dff0d77999b9c
WiresharkPortable64_4.2.2.paf.exe: 53519872 bytes
SHA256(WiresharkPortable64_4.2.2.paf.exe)=fe1126ebc15f1c6313ea179d5b1492d5601e5438e17c8c54818694b88d6fcb82
SHA1(WiresharkPortable64_4.2.2.paf.exe)=c2a280421298b506e01ff7ca8e4ecb7545126e36
Wireshark 4.2.2 Arm 64.dmg: 65654850 bytes
SHA256(Wireshark 4.2.2 Arm 64.dmg)=c2fe529ba00f30af30c74d3db79cc353a6c4af75fa9bc6063e5a5b7388762dcc
SHA1(Wireshark 4.2.2 Arm 64.dmg)=f8bfe7f0988b8559341a54b10033d4653d5606b7
Wireshark 4.2.2 Intel 64.dmg: 69032756 bytes
SHA256(Wireshark 4.2.2 Intel 64.dmg)=528971b97c405f180d2532b92fec963c678575cbbacbf7a963936306e7f17260
SHA1(Wireshark 4.2.2 Intel 64.dmg)=f400cc0cb252ade1136e5a58e26745af9dcf4c25
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
-----BEGIN PGP SIGNATURE-----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=o/eM
-----END PGP SIGNATURE-----

BIN
wireshark-4.2.3.tar.xz (Stored with Git LFS) Normal file

Binary file not shown.

View File

@ -0,0 +1,53 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
wireshark-4.2.3.tar.xz: 44970016 bytes
SHA256(wireshark-4.2.3.tar.xz)=958bd5996f543d91779b1a4e7e952dcd7b0245fe82194202c3333a8f78795811
SHA1(wireshark-4.2.3.tar.xz)=b9d2bc4dbcf59c7295fa6cc98f5210a4e98a0b4e
Wireshark-4.2.3-arm64.exe: 67875712 bytes
SHA256(Wireshark-4.2.3-arm64.exe)=e6f10cfd71512c73ce8efcd436eaa811bf643cb45a31d25d9f7878bdd3aeb952
SHA1(Wireshark-4.2.3-arm64.exe)=a1e50f3b743ff9ffde7e66c6399d317c5872e7c7
Wireshark-4.2.3-x64.exe: 86371496 bytes
SHA256(Wireshark-4.2.3-x64.exe)=3bf71d8753e3033376de95b8cde58d3f2a1a60e529b1dbdadfe907500c1f6525
SHA1(Wireshark-4.2.3-x64.exe)=cd1ed1b825d825ed526a822a8237e8970dd53ff2
Wireshark-4.2.3-x64.msi: 62910464 bytes
SHA256(Wireshark-4.2.3-x64.msi)=565b2ec6aff533eb0059b3d7c7a512b62327edd2c29a6f5146a76bbf8227f072
SHA1(Wireshark-4.2.3-x64.msi)=b6317a1af15a3e0a6439fa3971ab6588b8509738
WiresharkPortable64_4.2.3.paf.exe: 53536936 bytes
SHA256(WiresharkPortable64_4.2.3.paf.exe)=d115c2cd5cc7b198d798d4734ecebb4bd47ad64b3051d5f3c0689f52e3fda0d0
SHA1(WiresharkPortable64_4.2.3.paf.exe)=f72a3cd0999c01fde8db3fd3ea6ddb5ff9ad4a76
Wireshark 4.2.3 Arm 64.dmg: 65590438 bytes
SHA256(Wireshark 4.2.3 Arm 64.dmg)=b11d86f650f4f751fbff4d741b16cbe2d57a35d8b83e87dcbd159c6980eff7ff
SHA1(Wireshark 4.2.3 Arm 64.dmg)=1ffeee06f4cb0c8852321c248a9b5dcd2503c93c
Wireshark 4.2.3 Intel 64.dmg: 69388046 bytes
SHA256(Wireshark 4.2.3 Intel 64.dmg)=cea02d3d36c1cb8568abeb42a50b5169a26fd179a3726f4451e167c61243b846
SHA1(Wireshark 4.2.3 Intel 64.dmg)=6d280914b3ac8eae7cad1073335ebba824d6de32
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
-----BEGIN PGP SIGNATURE-----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=HNLY
-----END PGP SIGNATURE-----

View File

@ -1,3 +1,41 @@
-------------------------------------------------------------------
Thu Feb 15 08:13:24 UTC 2024 - Robert Frohl <rfrohl@suse.com>
- Wireshark 4.2.3:
* Capture start fails when file set enabled and file extension not supplied if directory contains a period.
* Cannot drag and move custom filter buttons in toolbar.
* Not equal wont work when used with wlan.addr.
* sshdump fails to connect with private key (ssh-rsa)
* ChmodBPF installation fails on macOS Sonoma 14.1.2.
* Windows installers should check for Windows 8.1.
* Fuzz job crash output: fuzz-2024-01-05-7725.pcap.
* Fuzz job crash output: fuzz-2024-01-06-7734.pcap.
* Incorrect recursion depth assert failure when dissecting a legitimate GOOSE message.
* OPC UA - large read request is reported as malformed in 4.2.1 but not in 4.0.12.
* TFTP dissector bug type listed as netscii instead of netascii doesnt show all TFTP packets including TFTP blocks.
* SMB1 replies from LAN Drive app only show up as NBSS Continuation Message.
* ciscodump - older SSH key exchange algorithms not supported.
* Problem decoding LAPB/X.25/FTAM after adding X.75 decoding.
* Wireshark Filter not working.
* CFLOW: failure to decode 0 length data fields of
* Copy ...as Printable Text Feature Missing in 4.1/4.2.
* Export Objects - HTTP is missing some HTTP/2 files in a two-pass analysis.
* ASAM-CMP Plugin: Malformed message, length mismatch if vendor defined data of status messages has odd length.
* OSS-Fuzz 66561: wireshark:fuzzshark_ip_proto-udp: Null-dereference READ in wmem_map_lookup.
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.3.html
-------------------------------------------------------------------
Mon Feb 12 17:05:49 UTC 2024 - Dirk Müller <dmueller@suse.com>
- handle one more mismatch in docdir handling
-------------------------------------------------------------------
Mon Jan 29 10:02:28 UTC 2024 - Dirk Müller <dmueller@suse.com>
- handle different CMAKE_INSTALL_DOCDIR setting between
tumbleweed and leap
------------------------------------------------------------------- -------------------------------------------------------------------
Fri Jan 5 08:05:05 UTC 2024 - Robert Frohl <rfrohl@suse.com> Fri Jan 5 08:05:05 UTC 2024 - Robert Frohl <rfrohl@suse.com>

View File

@ -28,7 +28,7 @@
%bcond_with lz4 %bcond_with lz4
%endif %endif
Name: wireshark Name: wireshark
Version: 4.2.2 Version: 4.2.3
Release: 0 Release: 0
Summary: A Network Traffic Analyser Summary: A Network Traffic Analyser
License: GPL-2.0-or-later AND GPL-3.0-or-later License: GPL-2.0-or-later AND GPL-3.0-or-later
@ -198,11 +198,16 @@ echo "`grep %{name}-%{version}.tar.xz %{SOURCE2} | grep SHA256 | head -n1 | cut
%install %install
%cmake_install %cmake_install
cmake --install build --component Development --prefix %{buildroot}%{_prefix} cmake --install build --component Development --prefix %{buildroot}%{_prefix}
# removing doc files that are not needed`
rm %{buildroot}/usr/share/doc/wireshark/COPYING cmakedocdir=/usr/share/doc/packages/wireshark
rm %{buildroot}/usr/share/doc/wireshark/README.xml-output if [ -d %{buildroot}/usr/share/doc/wireshark ]; then
rm %{buildroot}/usr/share/doc/wireshark/pdml2html.xsl cmakedocdir=/usr/share/doc/wireshark
rm %{buildroot}/usr/share/doc/wireshark/ws.css fi
# removing doc files that are not needed
rm %{buildroot}/${cmakedocdir}/COPYING
rm %{buildroot}/${cmakedocdir}/README.xml-output
rm %{buildroot}/${cmakedocdir}/pdml2html.xsl
rm %{buildroot}/${cmakedocdir}/ws.css
install -d -m 0755 %{buildroot}%{_sysconfdir} install -d -m 0755 %{buildroot}%{_sysconfdir}
install -d -m 0755 %{buildroot}%{_mandir}/man1/ install -d -m 0755 %{buildroot}%{_mandir}/man1/
@ -215,7 +220,7 @@ sed -i -e 's|Exec=wireshark %f|Exec=xdg-su -c wireshark %f|g' %{buildroot}%{_dat
%suse_update_desktop_file %{org_name} %suse_update_desktop_file %{org_name}
%suse_update_desktop_file %{org_name}-su %suse_update_desktop_file %{org_name}-su
rm -f %{buildroot}%{_datadir}/doc/wireshark/*.html rm -f %{buildroot}${cmakedocdir}/*.html
%pre %pre
getent group wireshark >/dev/null || groupadd -r wireshark getent group wireshark >/dev/null || groupadd -r wireshark