./net/wireshark, Network protocol analyzer

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 2.0.4, Package name: wireshark-2.0.4, Maintainer: pkgsrc-users

Wireshark is a network traffic analyzer, or "sniffer", for Unix and
Unix-like operating systems. It uses GTK+, a graphical user interface
library, and libpcap, a packet capture and filtering library.

The Wireshark distribution also comes with TShark, which is a
line-oriented sniffer (similar to Sun's snoop, or tcpdump) that uses the
same dissection, capture-file reading and writing, and packet filtering
code as Wireshark, and with editcap, which is a program to read capture
files and write the packets from that capture file, possibly in a
different capture file format, and with some packets possibly removed
from the capture.

This package tracks version 2 stable branch.


Required to run:
[sysutils/desktop-file-utils] [graphics/hicolor-icon-theme] [security/gnutls] [security/libgcrypt] [devel/glib2] [devel/libsmi] [devel/pcre] [x11/gtk3] [lang/lua52]

Required to build:
[pkgtools/x11-links] [x11/compositeproto] [x11/glproto] [x11/renderproto] [x11/xproto] [x11/xf86vidmodeproto] [x11/xf86driproto] [x11/damageproto] [x11/inputproto] [x11/xextproto] [x11/randrproto] [x11/dri2proto] [x11/xcb-proto] [x11/fixesproto4] [lang/python27]

Package options: gtk3, lua

Master sites:

SHA1: 9d76a28ba4f7566bef1aefbb2868e1ddcb93e999
RMD160: c767f062c421e15cde8f1d83c8fcd7c2c2a138eb
Filesize: 30391.854 KB

Version history: (Expand)


CVS history: (Expand)


   2016-06-11 16:40:17 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated wireshark to 2.0.4.

                         Wireshark 2.0.4 Release Notes
What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2016-29
       The SPOOLS dissector could go into an infinite loop. Discovered by
       the CESG.
     * [2]wnpa-sec-2016-30
       The IEEE 802.11 dissector could crash. ([3]Bug 11585)
     * [4]wnpa-sec-2016-31
       The IEEE 802.11 dissector could crash. Discovered by Mateusz
       Jurczyk. ([5]Bug 12175)
     * [6]wnpa-sec-2016-32
       The UMTS FP dissector could crash. ([7]Bug 12191)
     * [8]wnpa-sec-2016-33
       Some USB dissectors could crash. Discovered by Mateusz Jurczyk.
       ([9]Bug 12356)
     * [10]wnpa-sec-2016-34
       The Toshiba file parser could crash. Discovered by iDefense Labs.
       ([11]Bug 12394)
     * [12]wnpa-sec-2016-35
       The CoSine file parser could crash. Discovered by iDefense Labs.
       ([13]Bug 12395)
     * [14]wnpa-sec-2016-36
       The NetScreen file parser could crash. Discovered by iDefense Labs.
       ([15]Bug 12396)
     * [16]wnpa-sec-2016-37
       The Ethernet dissector could crash. ([17]Bug 12440)

   The following bugs have been fixed:
     * Saving pcap capture file with ERF encapsulation creates an invalid
       pcap file. ([18]Bug 3606)
     * Questionable calling of Ethernet dissector by encapsulating
       protocol dissectors. ([19]Bug 9933)
     * Wireshark 1.12.0 does not dissect HTTP correctly. ([20]Bug 10335)
     * Don't copy details of hidden columns. ([21]Bug 11788)
     * RTP audio player crashes. ([22]Bug 12166)
     * Crash when saving RTP audio Telephony->RTP->RTP
       Streams->Analyze->Save->Audio. ([23]Bug 12211)
     * Edit - preferences - add column field not showing dropdown for
       choices. ([24]Bug 12321)
     * Using _ws.expert in a filter can cause a crash. ([25]Bug 12335)
     * Crash in SCCP dissector UAT (Qt UI only). ([26]Bug 12364)
     * J1939 frame without data = malformed packet ? ([27]Bug 12366)
     * The stream number in tshark's "-z follow,tcp,<stream number>"
       option is 0-origin rather than 1-origin. ([28]Bug 12383)
     * IP Header Length display filter should show calculated value.
       ([29]Bug 12387)
     * Multiple file radio buttons should be check boxes. ([30]Bug 12388)
     * Wrong check for getaddrinfo and gethostbyname on Solaris 11.
       ([31]Bug 12391)
     * ICMPv6 dissector doesn't respect actual packet length. ([32]Bug
       12400)
     * Format DIS header timestamp mm:ss.nnnnnn. ([33]Bug 12402)
     * RTP Stream Analysis can no longer be sorted in 2.0.3. ([34]Bug
       12405)
     * RTP Stream Analysis fails to complete in 2.0.3 when packets are
       sliced. ([35]Bug 12406)
     * Network-Layer Name Resolution uses first 32-bits of IPv6 DNS
       address as IPv4 address in some circumstances. ([36]Bug 12412)
     * BACnet decoder incorrectly flags a valid APDU as a "Malformed
       Packet". ([37]Bug 12422)
     * Valid ISUP messages marked with warnings. ([38]Bug 12423)
     * Profile command line switch "-C" not working in Qt interface.
       ([39]Bug 12425)
     * MRCPv2: info column not showing info correctly. ([40]Bug 12426)
     * Diameter: Experimental result code 5142. ([41]Bug 12428)
     * Tshark crashes when analyzing RTP due to pointer being freed not
       allocated. ([42]Bug 12430)
     * NFS: missing information in getattr for supported exclusive create
       attributes. ([43]Bug 12435)
     * Ethernet type field with a value of 9100 is shown as "Unknown".
       ([44]Bug 12441)
     * Documentation does not include support for Windows Server 2012 R2.
       ([45]Bug 12455)
     * Column preferences ruined too easily. ([46]Bug 12465)
     * SMB Open andX extended response decoded incorrectly. ([47]Bug
       12472)
     * SMB NtCreate andX with extended response sometimes incorrect.
       ([48]Bug 12473)
     * Viewing NFSv3 Data, checking SRTs doesn't work. ([49]Bug 12478)
     * Make wireshark with Qt enabled buildable on ARM. ([50]Bug 12483)

  Updated Protocol Support

   AFS, ANSI IS-637 A, BACapp, BT BNEP, Cisco FabricPath MiM, CSN.1,
   DCERPC SPOOLS, DIS, Ethernet, GSM A RR, ICMPv6, IEEE 802.11, IPv4,
   ISUP, J1939, JXTA, LAPSat, LPADm, LTE-RRC, MRCPv2, NFS, OpenFlow,
   SGsAP, SMB, STT, TZSP, UMTS FP, and USB

  New and Updated Capture File Support

   Aethra, Catapult DCT2000, CoSine, DBS Etherwatch, ERF, iSeries, Ixia
   IxVeriWave, NetScreen, Toshiba, and VMS TCPIPtrace
   2016-04-24 12:02:13 by Thomas Klausner | Files touched by this commit (5) | Package updated
Log message:
Updated wireshark to 2.0.3.

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2016-01
       DLL hijacking vulnerability. [2]CVE-2016-2521
     * [3]wnpa-sec-2016-02
       ASN.1 BER dissector crash. ([4]Bug 11828) [5]CVE-2016-2522
     * [6]wnpa-sec-2016-03
       DNP dissector infinite loop. ([7]Bug 11938) [8]CVE-2016-2523
     * [9]wnpa-sec-2016-04
       X.509AF dissector crash. ([10]Bug 12002) [11]CVE-2016-2524
     * [12]wnpa-sec-2016-05
       HTTP/2 dissector crash. ([13]Bug 12077) [14]CVE-2016-2525
     * [15]wnpa-sec-2016-06
       HiQnet dissector crash. ([16]Bug 11983) [17]CVE-2016-2526
     * [18]wnpa-sec-2016-07
       3GPP TS 32.423 Trace file parser crash. ([19]Bug 11982)
       [20]CVE-2016-2527
     * [21]wnpa-sec-2016-08
       LBMC dissector crash. ([22]Bug 11984) [23]CVE-2016-2528
     * [24]wnpa-sec-2016-09
       iSeries file parser crash. ([25]Bug 11985) [26]CVE-2016-2529
     * [27]wnpa-sec-2016-10
       RSL dissector crash. ([28]Bug 11829) [29]CVE-2016-2530
       [30]CVE-2016-2531
     * [31]wnpa-sec-2016-11
       LLRP dissector crash. ([32]Bug 12048) [33]CVE-2016-2532
     * [34]wnpa-sec-2016-12
       Ixia IxVeriWave file parser crash. ([35]Bug 11795)
     * [36]wnpa-sec-2016-13
       IEEE 802.11 dissector crash. ([37]Bug 11818)
     * [38]wnpa-sec-2016-14
       GSM A-bis OML dissector crash. ([39]Bug 11825)
     * [40]wnpa-sec-2016-15
       ASN.1 BER dissector crash. ([41]Bug 12106)
     * [42]wnpa-sec-2016-16
       SPICE dissector large loop. ([43]Bug 12151)
     * [44]wnpa-sec-2016-17
       NFS dissector crash.
     * [45]wnpa-sec-2016-18
       ASN.1 BER dissector crash. ([46]Bug 11822)

   The following bugs have been fixed:
     * HTTP 302 decoded as TCP when "Allow subdissector to reassemble TCP
       streams" option is enabled. ([47]Bug 9848)
     * Questionable calling of ethernet dissector by encapsulating
       protocol dissectors. ([48]Bug 9933)
     * [Qt & Legacy & probably TShark too] Delta Time Conversation column
       is empty. ([49]Bug 11559)
     * extcap: abort when validating capture filter for DLT 147. ([50]Bug
       11656)
     * Missing columns in Qt Flow Graph. ([51]Bug 11710)
     * Interface list doesn't show well when the list is very long.
       ([52]Bug 11733)
     * Unable to use saved Capture Filters in Qt UI. ([53]Bug 11836)
     * extcap: Capture interface options snaplen, buffer and promiscuous
       not being used. ([54]Bug 11865)
     * Improper RPC reassembly ([55]Bug 11913)
     * GTPv1 Dual Stack with one static and one Dynamic IP. ([56]Bug
       11945)
     * Wireshark 2.0.1 MPLS dissector not decoding payload when control
       word is present in pseudowire. ([57]Bug 11949)
     * "...using this filter" turns white (not green or red). Plus
       dropdown arrow does nothing. ([58]Bug 11950)
     * EIGRP field eigrp.ipv4.destination does not show the correct
       destination. ([59]Bug 11953)
     * tshark -z conv,type[,filter] swapped frame / byte values from / to
       columns. ([60]Bug 11959)
     * The field name nstrace.tcpdbg.tcpack should be
       nstrace.tcpdbg.tcprtt. ([61]Bug 11964)
     * 6LoWPAN IPHC traffic class not decompressed correctly. ([62]Bug
       11971)
     * Crash with snooping NFS file handles. ([63]Bug 11972)
     * 802.11 dissector fails to decrypt some broadcast messages. ([64]Bug
       11973)
     * Wireshark hangs when adding a new profile. ([65]Bug 11979)
     * Issues when closing the application with a running capture without
       packets. ([66]Bug 11981)
     * New Qt UI lacks ability to step through multiple TCP streams with
       Analyze > Follow > TCP Stream. ([67]Bug 11987)
     * GTK: plugin_if_goto_frame causes Access Violation if called before
       capture file is loaded. ([68]Bug 11989)
     * Wireshark 2.0.1 crash on start. ([69]Bug 11992)
     * Wi-Fi 4-way handshake 4/4 is displayed as 2/4. ([70]Bug 11994)
     * ACN: acn.dmx.data has incorrect type. ([71]Bug 11999)
     * editcap packet comment won't add multiple comments. ([72]Bug 12007)
     * DICOM Sequences no longer able to be expanded. ([73]Bug 12011)
     * Wrong TCP stream when port numbers are reused. ([74]Bug 12022)
     * SSL decryption fails in presence of a Client certificate. ([75]Bug
       12042)
     * LUA: TVBs backing a data source is freed too early. ([76]Bug 12050)
     * PIM: pim.group filter have the same name for IPv4 and IPv6.
       ([77]Bug 12061)
     * Failed to parse M3AP IE (TNL information). ([78]Bug 12070)
     * Wrong interpretation of Instance ID value in OSPFv3 packet.
       ([79]Bug 12072)
     * MP2T Dissector does parse RTP properly in 2.0.1. ([80]Bug 12099)
     * editcap does not adjust time for frames with absolute timestamp 0 <
       t < 1 secs. ([81]Bug 12116)
     * Guard Interval is not consistent between Radiotap & wlan_radio.
       ([82]Bug 12123)
     * Calling dumpcap -i- results in access violation. ([83]Bug 12143)
     * Qt: Friendly Name and Interface Name columns should not be
       editable. ([84]Bug 12146)
     * PPTP GRE call ID not always decoded. ([85]Bug 12149)
     * Interface list does not show device description anymore. ([86]Bug
       12156)
     * Find Packet does not highlight the matching tree item or packet
       bytes. ([87]Bug 12157)
     * "total block length ... is too large" error when opening pcapng
       file with multiple SHB sections. ([88]Bug 12167)
     * http.request.full_uri is malformed if an HTTP Proxy is used.
       ([89]Bug 12176)
     * SNMP dissector fails at msgSecurityParameters with long length
       encoding. ([90]Bug 12181)

  Updated Protocol Support

   6LoWPAN, ACN, ASN.1 BER, BATADV, DICOM, DNP3, DOCSIS INT-RNG-REQ, E100,
   EIGRP, GSM A DTAP, GSM SMS, GTP, HiQnet, HTTP, HTTP/2, IEEE 802.11,
   IKEv2, InfiniBand, IPv4, IPv6, LBMC, LLRP, M3AP, MAC LTE, MP2T, MPLS,
   NFS, NS Trace, OSPF, PIM, PPTP, RLC LTE, RoHC, RPC, RSL, SNMP, SPICE,
   SSL, TCP, TRILL, VXLAN, WaveAgent, and X.509AF

  New and Updated Capture File Support

   3GPP TS 32.423 Trace, iSeries, Ixia IxVeriWave, pcap, and pcapng
   2016-04-11 21:02:08 by Ryo ONODERA | Files touched by this commit (527)
Log message:
Recursive revbump from textproc/icu 57.1
   2016-03-05 12:29:49 by Jonathan Perkin | Files touched by this commit (1813) | Package updated
Log message:
Bump PKGREVISION for security/openssl ABI bump.
   2016-03-03 14:33:14 by Thomas Klausner | Files touched by this commit (16)
Log message:
Make wireshark2 the new default wireshark, since it is the default stable
version upstream.
   2016-02-25 17:20:53 by Jonathan Perkin | Files touched by this commit (47)
Log message:
Use OPSYSVARS.
   2016-01-02 12:39:56 by Ryo ONODERA | Files touched by this commit (2) | Package updated
Log message:
Update to 1.12.9

Changelog:
                         Wireshark 1.12.9 Release Notes
     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed:
     * [1]wnpa-sec-2015-31
       NBAP dissector crashes. ([2]Bug 11602, [3]Bug 11835, [4]Bug 11841)
     * [5]wnpa-sec-2015-32
       UMTS FP dissector crashes. ([6]Bug 11602, [7]Bug 11606)
     * [8]wnpa-sec-2015-33
       DCOM dissector crash. ([9]Bug 11610)
     * [10]wnpa-sec-2015-34
       AllJoyn dissector infinite loop. ([11]Bug 11607)
     * [12]wnpa-sec-2015-35
       T.38 dissector crash. ([13]Bug 9887)
     * [14]wnpa-sec-2015-36
       SDP dissector crash. ([15]Bug 9887)
     * [16]wnpa-sec-2015-37
       NLM dissector crash.
     * [17]wnpa-sec-2015-38
       DNS dissector crash. ([18]Bug 10988)
     * [19]wnpa-sec-2015-39
       BER dissector crash.
     * [20]wnpa-sec-2015-40
       Zlib decompression crash. ([21]Bug 11548)
     * [22]wnpa-sec-2015-41
       SCTP dissector crash. ([23]Bug 11767)
     * [24]wnpa-sec-2015-42
       802.11 decryption crash. ([25]Bug 11790, [26]Bug 11826)
     * [27]wnpa-sec-2015-43
       DIAMETER dissector crash. ([28]Bug 11792)
     * [29]wnpa-sec-2015-44
       VeriWave file parser crashes. ([30]Bug 11789, [31]Bug 11791)
     * [32]wnpa-sec-2015-45
       RSVP dissector crash. ([33]Bug 11793)
     * [34]wnpa-sec-2015-46
       ANSI A & GSM A dissector crashes. ([35]Bug 11797)
     * [36]wnpa-sec-2015-47
       Ascend file parser crash. ([37]Bug 11794)
     * [38]wnpa-sec-2015-48
       NBAP dissector crash. ([39]Bug 11815)
     * [40]wnpa-sec-2015-49
       RSL dissector crash. ([41]Bug 11829)
     * [42]wnpa-sec-2015-50
       ZigBee ZCL dissector crash. ([43]Bug 11830)
     * [44]wnpa-sec-2015-51
       Sniffer file parser crash. ([45]Bug 11827)

   The Windows installers are now built using NSIS 2.50 in order to avoid
   [46]DLL hijacking flaws.

   The following bugs have been fixed:
     * Zooming out (Ctrl+-) too far crashes Wireshark. ([47]Bug 8854)
     * IPv6 Next Header is Unknown yet Wireshark tries parsing an IPv6
       Extension Header. ([48]Bug 9996)
     * IPv6 Mobility Header Link-Layer Address Mobility Option is parsed
       incorrectly. ([49]Bug 10627)
     * Windows Wireshark Installer does not detect WinPcap which is
       already installed. ([50]Bug 10867)
     * SSL Decrypted Packet Not Decoded As HTTP. ([51]Bug 10984)
     * Wireshark crashes when using the VoIP player. ([52]Bug 11596)
     * [GSMTAP] Incorrect decoding of MS Radio Access Capability using
       alternative coding. ([53]Bug 11599)
     * TCP sequence analysis (expert info) does not work in 802.1ah
       frames. ([54]Bug 11629)
     * No correct GVCP info message for READREG_ACK command. ([55]Bug
       11639)
     * Bug in EtherCAT dissector with mailbox response. ([56]Bug 11652)
     * NLM v4 statistics crash. ([57]Bug 11654)
     * Malformed packet with IPv6 mobility header. ([58]Bug 11728)
     * LDAP decode shows invalid number of results for searchResEntry
       packets. ([59]Bug 11761)
     * IPv6 RPL Routing Header with length of 8 bytes still reads an
       address. ([60]Bug 11803)
     * g_utf8_validate assertion when reassembling GSM SMS messages
       encoded in UCS2. ([61]Bug 11809)
     * MPEG2TS NULL pkt: AFC: "Should be 0 for NULL packets" wrong.
       ([62]Bug 11921)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   6LoWPAN, 802.1ah, AllJoyn, ANSI A, ASN.1 BER, CLNP, CMS, DCOM,
   DIAMETER, DNS, ERF, GSM A, GSM SMS, GTP, GVCP, HiSLIP, IEEE 802.11,
   IPv4, IPv6, L2TP, LDAP, MIP6, MP2T, NBAP, NLM, ONC RPC, PCP, RSL, RSVP,
   SCTP, SDP, SIGCOMP, SNMP, SPDY, T.38, UMTS FP, and ZigBee ZCL

  New and Updated Capture File Support

   Ascend, ERF, Sniffer, and VeriWave
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [63]https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [64]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([65]Bug 1419)

   The BER dissector might infinitely loop. ([66]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([67]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([68]Bug 2234)

   The 64-bit Windows installer does not support Kerberos decryption.
   ([69]Win64 development page)

   Resolving ([70]Bug 9044) reopens ([71]Bug 3528) so that Wireshark no
   longer automatically decodes gzip data when following a TCP stream.

   Application crash when changing real-time option. ([72]Bug 4035)

   Hex pane display issue after startup. ([73]Bug 4056)

   Packet list rows are oversized. ([74]Bug 4357)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([75]Bug 4985)
     __________________________________________________________________

Getting Help

   Community support is available on [76]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [77]the web site.

   Official Wireshark training and certification are available from
   [78]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [79]Wireshark web site.
     __________________________________________________________________

   Last updated 2015-12-29 08:48:09 PST

References

   1. https://www.wireshark.org/security/wnpa … 15-31.html
   2. https://bugs.wireshark.org/bugzilla/sho … i?id=11602
   3. https://bugs.wireshark.org/bugzilla/sho … i?id=11835
   4. https://bugs.wireshark.org/bugzilla/sho … i?id=11841
   5. https://www.wireshark.org/security/wnpa … 15-32.html
   6. https://bugs.wireshark.org/bugzilla/sho … i?id=11602
   7. https://bugs.wireshark.org/bugzilla/sho … i?id=11606
   8. https://www.wireshark.org/security/wnpa … 15-33.html
   9. https://bugs.wireshark.org/bugzilla/sho … i?id=11610
  10. https://www.wireshark.org/security/wnpa … 15-34.html
  11. https://bugs.wireshark.org/bugzilla/sho … i?id=11607
  12. https://www.wireshark.org/security/wnpa … 15-35.html
  13. https://bugs.wireshark.org/bugzilla/sho … gi?id=9887
  14. https://www.wireshark.org/security/wnpa … 15-36.html
  15. https://bugs.wireshark.org/bugzilla/sho … gi?id=9887
  16. https://www.wireshark.org/security/wnpa … 15-37.html
  17. https://www.wireshark.org/security/wnpa … 15-38.html
  18. https://bugs.wireshark.org/bugzilla/sho … i?id=10988
  19. https://www.wireshark.org/security/wnpa … 15-39.html
  20. https://www.wireshark.org/security/wnpa … 15-40.html
  21. https://bugs.wireshark.org/bugzilla/sho … i?id=11548
  22. https://www.wireshark.org/security/wnpa … 15-41.html
  23. https://bugs.wireshark.org/bugzilla/sho … i?id=11767
  24. https://www.wireshark.org/security/wnpa … 15-42.html
  25. https://bugs.wireshark.org/bugzilla/sho … i?id=11790
  26. https://bugs.wireshark.org/bugzilla/sho … i?id=11826
  27. https://www.wireshark.org/security/wnpa … 15-43.html
  28. https://bugs.wireshark.org/bugzilla/sho … i?id=11792
  29. https://www.wireshark.org/security/wnpa … 15-44.html
  30. https://bugs.wireshark.org/bugzilla/sho … i?id=11789
  31. https://bugs.wireshark.org/bugzilla/sho … i?id=11791
  32. https://www.wireshark.org/security/wnpa … 15-45.html
  33. https://bugs.wireshark.org/bugzilla/sho … i?id=11793
  34. https://www.wireshark.org/security/wnpa … 15-46.html
  35. https://bugs.wireshark.org/bugzilla/sho … i?id=11797
  36. https://www.wireshark.org/security/wnpa … 15-47.html
  37. https://bugs.wireshark.org/bugzilla/sho … i?id=11794
  38. https://www.wireshark.org/security/wnpa … 15-48.html
  39. https://bugs.wireshark.org/bugzilla/sho … i?id=11815
  40. https://www.wireshark.org/security/wnpa … 15-49.html
  41. https://bugs.wireshark.org/bugzilla/sho … i?id=11829
  42. https://www.wireshark.org/security/wnpa … 15-50.html
  43. https://bugs.wireshark.org/bugzilla/sho … i?id=11830
  44. https://www.wireshark.org/security/wnpa … 15-51.html
  45. https://bugs.wireshark.org/bugzilla/sho … i?id=11827
  46. http://nsis.sourceforge.net/Docs/AppendixF.html
  47. https://bugs.wireshark.org/bugzilla/sho … gi?id=8854
  48. https://bugs.wireshark.org/bugzilla/sho … gi?id=9996
  49. https://bugs.wireshark.org/bugzilla/sho … i?id=10627
  50. https://bugs.wireshark.org/bugzilla/sho … i?id=10867
  51. https://bugs.wireshark.org/bugzilla/sho … i?id=10984
  52. https://bugs.wireshark.org/bugzilla/sho … i?id=11596
  53. https://bugs.wireshark.org/bugzilla/sho … i?id=11599
  54. https://bugs.wireshark.org/bugzilla/sho … i?id=11629
  55. https://bugs.wireshark.org/bugzilla/sho … i?id=11639
  56. https://bugs.wireshark.org/bugzilla/sho … i?id=11652
  57. https://bugs.wireshark.org/bugzilla/sho … i?id=11654
  58. https://bugs.wireshark.org/bugzilla/sho … i?id=11728
  59. https://bugs.wireshark.org/bugzilla/sho … i?id=11761
  60. https://bugs.wireshark.org/bugzilla/sho … i?id=11803
  61. https://bugs.wireshark.org/bugzilla/sho … i?id=11809
  62. https://bugs.wireshark.org/bugzilla/sho … i?id=11921
  63. https://www.wireshark.org/download.html
  64. https://www.wireshark.org/download.html#thirdparty
  65. https://bugs.wireshark.org/bugzilla/sho … gi?id=1419
  66. https://bugs.wireshark.org/bugzilla/sho … gi?id=1516
  67. https://bugs.wireshark.org/bugzilla/sho … gi?id=1814
  68. https://bugs.wireshark.org/bugzilla/sho … gi?id=2234
  69. https://wiki.wireshark.org/Development/Win64
  70. https://bugs.wireshark.org/bugzilla/sho … gi?id=9044
  71. https://bugs.wireshark.org/bugzilla/sho … gi?id=3528
  72. https://bugs.wireshark.org/bugzilla/sho … gi?id=4035
  73. https://bugs.wireshark.org/bugzilla/sho … gi?id=4056
  74. https://bugs.wireshark.org/bugzilla/sho … gi?id=4357
  75. https://bugs.wireshark.org/bugzilla/sho … gi?id=4985
  76. https://ask.wireshark.org/
  77. https://www.wireshark.org/lists/
  78. http://www.wiresharktraining.com/
  79. https://www.wireshark.org/faq.html
   2015-12-05 22:26:09 by Adam Ciarcinski | Files touched by this commit (578)
Log message:
Extend PYTHON_VERSIONS_INCOMPATIBLE to 35