pkgsrc/net/wireshark/distinfo
tron 67aa732e1f Update "wireshark" package to version 1.2.2. Changes since version 1.2.1:
- The following vulnerabilities have been fixed. See the security
  advisory for details and a workaround.
  - The GSM A RR dissector could crash.
    Versions affected: 1.2.0 to 1.2.1
  - The OpcUa dissector could use excessive CPU and memory.
    Versions affected: 0.99.6 to 1.0.8, 1.2.0 to 1.2.1
  - The TLS dissector could crash on some platforms.
    Versions affected: 1.2.0 to 1.2.1
- The following bugs have been fixed:
  - The "Capture->Interfaces" window can't be closed. (Bug 1740)
  - tshark-1.0.2 (dumpcap) signal abort core saved. (Bug 2767)
  - Memory leak fixes. (Bug 3330)
  - Display filter autocompletion doesn't work for some RADIUS and
    WiMAX ASNCP fields. (Bug 3538)
  - Wireshark Portable includes wrong WinPcap installer. (Bug
    3547)
  - Crash when loading a profile. (Bug 3640)
  - The proto,colinfo tap doesn't work if the INFO column isn't
    being printed. (Bug 3675)
  - Flow Graph adds too much unnecessary garbage. (Bug 3693)
  - The EAP Diameter dictionary file was missing in the
    distribution. (Bug 3761)
  - Graph analysis window is behind other window. (Bug 3773)
  - IKEv2 Cert Request payload dissection error. (Bug 3782)
  - DNS NAPTR RR (RFC 3403) replacement MUST be a fully qualified
    domain-name. (Bug 3792)
  - Malformed RTCP Packet error while sending Payload specific
    RTCP feedback packet( as per RFC 4585). (Bug 3800)
  - 802.11n Block Ack packet Bitmap field missing. (Bug 3806)
  - Wireshark doesn't decode WBXML/ActiveSync information
    correctly. (Bug 3811)
  - Malformed packet when IPv6 packet has Next Header == 59. (Bug
    3820)
  - Wireshark could crash while reading an ERF file. (Bug 3849)
  - Minor errors in gsm rr dissectors. (Bug 3889)
  - WPA Decryption Issues. (Bug 3890)
  - GSM A RR sys info dissection problem. (Bug 3901)
  - GSM A RR inverts MEAS-VALID values. (Bug 3915)
  - PDML output leaks ~300 bytes / packet. (Bug 3913)
  - Incorrect station identifier parsing in Kingfisher dissector.
    (Bug 3946)
  - DHCPv6, Vendor-Specific Informantion, SubOption"Option
    Request" parser incorrect. (Bug 3987)
  - Wireshark could leak memory while analyzing SSL.
  - Wireshark could crash while updating menu items after reading
    a file in some cases.
  - The Mac OS X ChmodBPF script now works correctly under Snow
    Leopard.
- Updated Protocol Support
  DCERPC, DHCPv6, DNS, E.212, GSM A RR, GTPv2, H.248, IEEE 802.11,
  IPMI, ISAKMP/IKE, ISUP, Kingfisher, LDAP, OpcUA, RTCP, SCTP, SIP,
  SSL, TCP, WBXML, ZRTP
- Updated Capture File Support
  ERF
2009-09-19 06:36:18 +00:00

9 lines
491 B
Text

$NetBSD: distinfo,v 1.24 2009/09/19 06:36:18 tron Exp $
SHA1 (wireshark-1.2.2.tar.bz2) = ad73bf93096344341cd7c99614816555bebdbf45
RMD160 (wireshark-1.2.2.tar.bz2) = 6adbd80e3027a63b456b971edba0185411d30546
Size (wireshark-1.2.2.tar.bz2) = 15186702 bytes
SHA1 (patch-aa) = d0744f069ac2d3a8a43b810e1f958360d99200a9
SHA1 (patch-ab) = 5ae79916603f04c2d362c764d39f0c99728e716c
SHA1 (patch-ac) = 4e985520ea4b118aea6fc001f256b5de96de7840
SHA1 (patch-ad) = fa293d23390d015d0863367033ab07a3472430de