Accepting request 1146736 from home:rfrohl:branches:network:utilities

wireshark 4.2.3

OBS-URL: https://build.opensuse.org/request/show/1146736
OBS-URL: https://build.opensuse.org/package/show/network:utilities/wireshark?expand=0&rev=429
This commit is contained in:
Robert Frohl 2024-02-15 09:38:20 +00:00 committed by Git OBS Bridge
parent ce0a65cf4e
commit e27d9fa0b6
6 changed files with 84 additions and 57 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:9e3672be8c6caf9279a5a13582d6711ab699ae2a79323e92a99409c1ead98521
size 44918888

View File

@ -1,53 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
wireshark-4.2.2.tar.xz: 44918888 bytes
SHA256(wireshark-4.2.2.tar.xz)=9e3672be8c6caf9279a5a13582d6711ab699ae2a79323e92a99409c1ead98521
SHA1(wireshark-4.2.2.tar.xz)=b14f94019c0a0d01409d57736dd458c23fceba78
Wireshark-4.2.2-arm64.exe: 67867832 bytes
SHA256(Wireshark-4.2.2-arm64.exe)=1f87e5918604d42956c1ec5ae1aa9aedfe1a50a343dcaa533160c295c3176579
SHA1(Wireshark-4.2.2-arm64.exe)=40819c8ec260c10ed6d23e5ee0e4c15b8100030e
Wireshark-4.2.2-x64.exe: 86375712 bytes
SHA256(Wireshark-4.2.2-x64.exe)=3bd13a521b1e9d100e800b666705da132e584cccbd4f30c88e9cf0d93289b2fa
SHA1(Wireshark-4.2.2-x64.exe)=2b8f90a64b1dad7791de0b430f661788f8d082ce
Wireshark-4.2.2-x64.msi: 62820352 bytes
SHA256(Wireshark-4.2.2-x64.msi)=0ebc060fc70b61396c78fbcdd36ed56f3b64a2c96e1a44eebcc0e852c9bd7c20
SHA1(Wireshark-4.2.2-x64.msi)=efcab3048932cd7824f68697131dff0d77999b9c
WiresharkPortable64_4.2.2.paf.exe: 53519872 bytes
SHA256(WiresharkPortable64_4.2.2.paf.exe)=fe1126ebc15f1c6313ea179d5b1492d5601e5438e17c8c54818694b88d6fcb82
SHA1(WiresharkPortable64_4.2.2.paf.exe)=c2a280421298b506e01ff7ca8e4ecb7545126e36
Wireshark 4.2.2 Arm 64.dmg: 65654850 bytes
SHA256(Wireshark 4.2.2 Arm 64.dmg)=c2fe529ba00f30af30c74d3db79cc353a6c4af75fa9bc6063e5a5b7388762dcc
SHA1(Wireshark 4.2.2 Arm 64.dmg)=f8bfe7f0988b8559341a54b10033d4653d5606b7
Wireshark 4.2.2 Intel 64.dmg: 69032756 bytes
SHA256(Wireshark 4.2.2 Intel 64.dmg)=528971b97c405f180d2532b92fec963c678575cbbacbf7a963936306e7f17260
SHA1(Wireshark 4.2.2 Intel 64.dmg)=f400cc0cb252ade1136e5a58e26745af9dcf4c25
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
-----BEGIN PGP SIGNATURE-----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=o/eM
-----END PGP SIGNATURE-----

BIN
wireshark-4.2.3.tar.xz (Stored with Git LFS) Normal file

Binary file not shown.

View File

@ -0,0 +1,53 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
wireshark-4.2.3.tar.xz: 44970016 bytes
SHA256(wireshark-4.2.3.tar.xz)=958bd5996f543d91779b1a4e7e952dcd7b0245fe82194202c3333a8f78795811
SHA1(wireshark-4.2.3.tar.xz)=b9d2bc4dbcf59c7295fa6cc98f5210a4e98a0b4e
Wireshark-4.2.3-arm64.exe: 67875712 bytes
SHA256(Wireshark-4.2.3-arm64.exe)=e6f10cfd71512c73ce8efcd436eaa811bf643cb45a31d25d9f7878bdd3aeb952
SHA1(Wireshark-4.2.3-arm64.exe)=a1e50f3b743ff9ffde7e66c6399d317c5872e7c7
Wireshark-4.2.3-x64.exe: 86371496 bytes
SHA256(Wireshark-4.2.3-x64.exe)=3bf71d8753e3033376de95b8cde58d3f2a1a60e529b1dbdadfe907500c1f6525
SHA1(Wireshark-4.2.3-x64.exe)=cd1ed1b825d825ed526a822a8237e8970dd53ff2
Wireshark-4.2.3-x64.msi: 62910464 bytes
SHA256(Wireshark-4.2.3-x64.msi)=565b2ec6aff533eb0059b3d7c7a512b62327edd2c29a6f5146a76bbf8227f072
SHA1(Wireshark-4.2.3-x64.msi)=b6317a1af15a3e0a6439fa3971ab6588b8509738
WiresharkPortable64_4.2.3.paf.exe: 53536936 bytes
SHA256(WiresharkPortable64_4.2.3.paf.exe)=d115c2cd5cc7b198d798d4734ecebb4bd47ad64b3051d5f3c0689f52e3fda0d0
SHA1(WiresharkPortable64_4.2.3.paf.exe)=f72a3cd0999c01fde8db3fd3ea6ddb5ff9ad4a76
Wireshark 4.2.3 Arm 64.dmg: 65590438 bytes
SHA256(Wireshark 4.2.3 Arm 64.dmg)=b11d86f650f4f751fbff4d741b16cbe2d57a35d8b83e87dcbd159c6980eff7ff
SHA1(Wireshark 4.2.3 Arm 64.dmg)=1ffeee06f4cb0c8852321c248a9b5dcd2503c93c
Wireshark 4.2.3 Intel 64.dmg: 69388046 bytes
SHA256(Wireshark 4.2.3 Intel 64.dmg)=cea02d3d36c1cb8568abeb42a50b5169a26fd179a3726f4451e167c61243b846
SHA1(Wireshark 4.2.3 Intel 64.dmg)=6d280914b3ac8eae7cad1073335ebba824d6de32
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Arm 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
-----BEGIN PGP SIGNATURE-----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=HNLY
-----END PGP SIGNATURE-----

View File

@ -1,3 +1,30 @@
-------------------------------------------------------------------
Thu Feb 15 08:13:24 UTC 2024 - Robert Frohl <rfrohl@suse.com>
- Wireshark 4.2.3:
* Capture start fails when file set enabled and file extension not supplied if directory contains a period.
* Cannot drag and move custom filter buttons in toolbar.
* Not equal wont work when used with wlan.addr.
* sshdump fails to connect with private key (ssh-rsa)
* ChmodBPF installation fails on macOS Sonoma 14.1.2.
* Windows installers should check for Windows 8.1.
* Fuzz job crash output: fuzz-2024-01-05-7725.pcap.
* Fuzz job crash output: fuzz-2024-01-06-7734.pcap.
* Incorrect recursion depth assert failure when dissecting a legitimate GOOSE message.
* OPC UA - large read request is reported as malformed in 4.2.1 but not in 4.0.12.
* TFTP dissector bug type listed as netscii instead of netascii doesnt show all TFTP packets including TFTP blocks.
* SMB1 replies from LAN Drive app only show up as NBSS Continuation Message.
* ciscodump - older SSH key exchange algorithms not supported.
* Problem decoding LAPB/X.25/FTAM after adding X.75 decoding.
* Wireshark Filter not working.
* CFLOW: failure to decode 0 length data fields of
* Copy ...as Printable Text Feature Missing in 4.1/4.2.
* Export Objects - HTTP is missing some HTTP/2 files in a two-pass analysis.
* ASAM-CMP Plugin: Malformed message, length mismatch if vendor defined data of status messages has odd length.
* OSS-Fuzz 66561: wireshark:fuzzshark_ip_proto-udp: Null-dereference READ in wmem_map_lookup.
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.3.html
-------------------------------------------------------------------
Mon Feb 12 17:05:49 UTC 2024 - Dirk Müller <dmueller@suse.com>

View File

@ -28,7 +28,7 @@
%bcond_with lz4
%endif
Name: wireshark
Version: 4.2.2
Version: 4.2.3
Release: 0
Summary: A Network Traffic Analyser
License: GPL-2.0-or-later AND GPL-3.0-or-later