| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: wireshark-ui-qt | Distribution: openSUSE Tumbleweed |
| Version: 4.4.10 | Vendor: openSUSE |
| Release: 1.1 | Build date: Thu Oct 9 11:19:17 2025 |
| Group: Productivity/Networking/Diagnostic | Build host: reproducible |
| Size: 9388371 | Source RPM: wireshark-4.4.10-1.1.src.rpm |
| Packager: http://bugs.opensuse.org | |
| Url: https://www.wireshark.org/ | |
| Summary: A Network Traffic Analyser - Qt UI | |
This package contains the Qt based UI for Wireshark.
GPL-2.0-or-later AND GPL-3.0-or-later
* Thu Oct 09 2025 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.10
* MONGO dissector infinite loop.
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.10.html
* Tue Sep 02 2025 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.9
* CVE-2025-9817: SSH dissector crash (bsc#1249090).
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.9.html
* Wed Jul 16 2025 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.8
* Renegotiated DTLS session is not being decrypted.
* Wireshark is completely stuck in initialization because androiddump recv()
is blocked.
* Fuzz job UTF-8 encoding issue: fuzz-2025-06-20-7318.pcap.
* Crash when showing packet in new window after reloading Lua plugins with a
certain gui.column.format preference.
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.8.html
* Thu Jun 05 2025 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.7
* CVE-2025-5601: Dissection engine crash (boo#1244081).
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.7.html
* Wed Apr 16 2025 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.6
* Bug in EtherCAT dissector with ECS order.
* QUIC dissector breaks when src and dst change.
* Trailing octet after IPv4 packet end is not detected or displayed in raw bytes.
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.6.html
* Mon Feb 24 2025 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.5
* GRPC: protobuf_json only displays the truncated string value.
* Wireshark crashes when clicking on a column title/header.
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.5.html
* Wed Feb 19 2025 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.4
* CVE-2025-1492: Bundle Protocol and CBOR dissector crash (boo#1237414).
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.4.html
* Tue Feb 04 2025 ecsos <ecsos@opensuse.org>
- Fix build error for Leap.
* Tue Jan 28 2025 Robert Frohl <rfrohl@suse.com>
- Default to building with qt6
* Thu Jan 09 2025 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.3
* Potential mis-match in GSM MAP dissector for uncertainty radius and its
filter key
* The NFSv2 Dissector appears to be swapping Character Special File and
Directory in mode decoding
* VOIP Calls call flow displaying hours
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.3.html
- move to default system Lua, instead of using explicit version
* Sat Dec 28 2024 J P <opensuse-738561@jspam.de>
- Update Lua from 5.1 to 5.4
* Thu Nov 21 2024 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.2
* CVE-2024-11595: FiveCo RAP dissector infinite loop (boo#1233594).
* CVE-2024-11596: ECMP dissector crash (boo#1233593).
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.2.html
* Thu Oct 10 2024 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.1
* CVE-2024-9780: ITS dissector crash (boo#1231475).
* CVE-2024-9781: AppleTalk and RELOAD Framing dissector crashes (boo#1231476).
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.1.html
* Fri Aug 30 2024 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.4.0
* Many improvements and fixes to the graphing dialogs, including I/O Graphs,
Flow Graph / VoIP Calls, and TCP Stream Graphs
* Custom columns can be defined using any valid field expression, such as
display filter functions, packet slices, arithmetic calculations, logical
tests, raw byte addressing, and protocol layer modifiers
* Wireshark now supports automatic profile switching. You can associate a
display filter with a configuration profile, and when you open a capture
file that matches the filter, Wireshark will automatically switch to that
profile.
* Improved display filter support for value strings (optional string
representations for numeric fields).
- Many more features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.4.0.html
- drop wireshark-0000-wsutil-implicit_declaration_memcpy.patch: included upstream
- update wireshark-0010-dumpcap-permission-denied.patch
* Thu Aug 29 2024 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.2.7:
* CVE-2024-8250: NTLMSSP dissector crash (boo#1229907).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.7.html
* Wed Jul 10 2024 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.2.6 (jsc#PED-8517):
* CVE-2024-8645: SPRT dissector crash (boo#1230372).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.6.html
* Wed Jun 19 2024 Markus Ebner <info@ebner-markus.de>
- Fix Wireshark Super User Mode starter
* Wed May 15 2024 Andreas Stieger <andreas.stieger@gmx.de>
- Wireshark 4.2.5:
* CVE-2024-4854: MONGO and ZigBee TLV dissector infinite loops
(wnpa-sec-2024-07 boo#1224274)
* CVE-2024-4853: The editcap command line utility could crash
when chopping bytes from the beginning of a packet
(wnpa-sec-2024-08 boo#1224259)
* CVE-2024-4855: The editcap command line utility could crash
when injecting secrets while writing multiple files
(wnpa-sec-2024-09 boo#1224276)
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.5.html
* Thu Mar 28 2024 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.2.4:
* CVE-2024-2955: T.38 dissector crash (boo#1222030).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.4.html
* Thu Feb 15 2024 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.2.3:
* Capture start fails when file set enabled and file extension not supplied if directory contains a period.
* Cannot drag and move custom filter buttons in toolbar.
* Not equal won’t work when used with wlan.addr.
* sshdump fails to connect with private key (ssh-rsa)
* ChmodBPF installation fails on macOS Sonoma 14.1.2.
* Windows installers should check for Windows 8.1.
* Fuzz job crash output: fuzz-2024-01-05-7725.pcap.
* Fuzz job crash output: fuzz-2024-01-06-7734.pcap.
* Incorrect recursion depth assert failure when dissecting a legitimate GOOSE message.
* OPC UA - large read request is reported as malformed in 4.2.1 but not in 4.0.12.
* TFTP dissector bug type listed as netscii instead of netascii doesn’t show all TFTP packets including TFTP blocks.
* SMB1 replies from LAN Drive app only show up as NBSS Continuation Message.
* ciscodump - older SSH key exchange algorithms not supported.
* Problem decoding LAPB/X.25/FTAM after adding X.75 decoding.
* Wireshark Filter not working.
* CFLOW: failure to decode 0 length data fields of
* Copy ...as Printable Text Feature Missing in 4.1/4.2.
* Export Objects - HTTP is missing some HTTP/2 files in a two-pass analysis.
* ASAM-CMP Plugin: Malformed message, length mismatch if vendor defined data of status messages has odd length.
* OSS-Fuzz 66561: wireshark:fuzzshark_ip_proto-udp: Null-dereference READ in wmem_map_lookup.
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.3.html
* Mon Feb 12 2024 Dirk Müller <dmueller@suse.com>
- handle one more mismatch in docdir handling
* Mon Jan 29 2024 Dirk Müller <dmueller@suse.com>
- handle different CMAKE_INSTALL_DOCDIR setting between
tumbleweed and leap
* Fri Jan 05 2024 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.2.2:
* minor bug fix release
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.2.html
* Thu Jan 04 2024 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.2.1:
* CVE-2024-0207: HTTP3 dissector crash (boo#1218503).
* CVE-2024-0208: GVCP dissector crash (boo#1218504).
* CVE-2024-0209: IEEE 1609.2 dissector crash (boo#1218505).
* CVE-2024-0210: Zigbee TLV dissector crash (boo#1218506).
* CVE-2024-0211: DOCSIS dissector crash (boo#1218507).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.1.html
* Wed Nov 29 2023 Dominique Leuenberger <dimstar@opensuse.org>
- Install SDK using cmake --install --component Development instead
of manually copying. This brings back the .pc file and simplifies
the spec file.
* Fri Nov 24 2023 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.2.0:
* CVE-2024-24476: Fixed buffer overflow in ws_manuf_lookup_str() (boo#1220181).
* CVE-2022-3725: Fixed integer overflow in the OPUS dissector (boo#1204822).
* Packet list sorting has been improved.
* Wireshark and TShark are now better about generating valid UTF-8 output.
* A new display filter feature for filtering raw bytes has been added.
* Display filter autocomplete is smarter about not suggesting invalid syntax.
* Tools › MAC Address Blocks can lookup a MAC address in the IEEE OUI registry.
* The installation target no longer installs development headers by default.
* The Wireshark installation is relocatable on Linux (and other ELF platforms with support for relative RPATHs).
* Tools › Browser (SSL Keylog) can launch your web browser with the SSLKEYLOGFILE environment variable set to the appropriate value.
* Wireshark now supports the Korean language.
* Many other improvements have been made. See the “New and Updated Features” section below for more details.
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.0.html
- Updated patches
wireshark-0000-wsutil-implicit_declaration_memcpy.patch
wireshark-0010-dumpcap-permission-denied.patch
* Thu Nov 16 2023 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.11:
* CVE-2023-6174: SSH dissector crash (boo#1217247).
* CVE-2023-6175: NetScreen file parser crash (boo#1217272).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.11.html
* Thu Oct 05 2023 Andreas Stieger <andreas.stieger@gmx.de>
- Wireshark 4.0.10:
* CVE-2023-5371: RTPS dissector memory leak (wnpa-sec-2023-27, boo#1215959)
* Fix a number of bugs in protocol parsers, including:
* RTP/RFC 4571: Wrong desegmentation/reassembly in RTP over TCP packets
* Incorrect bit values and namings in BSS Configuration Report TLV
* Wireshark 4.0.9 contained a bug affecting other platforms
* Wed Aug 23 2023 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.8:
* CVE-2023-4512: CBOR dissector crash (boo#1214561).
* CVE-2023-4511: BT SDP dissector infinite loop (boo#1214560).
* CVE-2023-4513: BT SDP dissector memory leak (boo#1214562).
* CVE-2023-2906: CP2179 dissector crash (boo#1214652).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.8.html
* Thu Jul 13 2023 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.7:
* CVE-2023-3648: Kafka dissector crash (boo#1213319).
* CVE-2023-3649: iSCSI dissector crash (boo#1213318).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.7.html
* Thu May 25 2023 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.6:
* CVE-2023-2854: BLF file parser crash (boo#1211708).
* CVE-2023-2855: Candump log file parser crash (boo#1211703).
* CVE-2023-2856: VMS TCPIPtrace file parser crash (boo#1211707).
* CVE-2023-2857: BLF file parser crash (boo#1211705).
* CVE-2023-2858: NetScaler file parser crash (boo#1211706).
* CVE-2023-0666: RTPS dissector crash (boo#1211709).
* CVE-2023-0668: IEEE C37.118 Synchrophasor dissector crash (boo#1211710).
* CVE-2023-2879: GDSDB dissector infinite loop (boo#1211793).
* CVE-2023-2952: XRA dissector infinite loop (boo#1211844).
* CVE-2023-0667: MS-MMS: failure to validate packet length (bsc#1212084).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
* Thu Apr 13 2023 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.5:
* CVE-2023-1992: RPCoRDMA dissector crash (boo#1210405).
* CVE-2023-1993: LISP dissector large loop (boo#1210404).
* CVE-2023-1994: GQUIC dissector crash (boo#1210403).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.5.html
* Fri Mar 03 2023 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.4:
* CVE-2023-1161: ISO 15765 and ISO 10681 dissector crash (boo#1208914).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.4.html
* Thu Jan 19 2023 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.3 (boo#1207447):
* CVE-2023-0414: EAP dissector crash (boo#1207666).
* CVE-2023-0417: NFS dissector memory leak (boo#1207669).
* CVE-2023-0413: Dissection engine crash (boo#1207665).
* CVE-2023-0416: GNW dissector crash (boo#1207668).
* CVE-2023-0415: iSCSI dissector crash (boo#1207667).
* CVE-2023-0411: Multiple dissector excessive loops (boo#1207663).
* CVE-2023-0412: TIPC dissector crash (boo#1207664).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.3.html
* Thu Dec 08 2022 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.2:
* CVE-2022-4345: Multiple dissector infinite loops (boo#1206189).
* Kafka dissector memory exhaustion (boo#1206190).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.2.html
* Thu Oct 27 2022 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.1:
* Comparing a boolean field against 1 always succeeds on big-endian machines.
* Qt: MaxMind GeoIP columns not added to Endpoints table.
* Fuzz job crash output: fuzz-2022-10-04-7131.pcap.
* The RTP player might not play audio on Windows.
* Wireshark 4.0 breaks display filter expression with > sign.
* Capture filters not working when using SSH capture and dumpcap.
* Packet diagram field values are not terminated.
* Packet bytes not displayed completely if scrolling.
* Fuzz job crash output: fuzz-2022-10-13-7166.pcap.
* Decoding bug H.245 userInput Signal.
* CFDP dissector doesn’t handle \"destination filename\" only.
* Home page capture button doesn’t pop up capture options dialog.
* Missing dot in H.248 protocol name.
* Missing dot for protocol H.264 in protocol column.
* Fuzz job crash output: fuzz-2022-10-23-7240.pcap.
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.1.html
* Fri Oct 07 2022 ecsos <ecsos@opensuse.org>
- Added an additional desktopfile to start wireshark which asks for
the super user password.
* Thu Oct 06 2022 ecsos <ecsos@opensuse.org>
- Fix build error for Leap.
* Wed Oct 05 2022 Robert Frohl <rfrohl@suse.com>
- Wireshark 4.0.0:
* The display filter syntax is more powerful with many new extensions.
* The Conversation and Endpoint dialogs have been redesigned.
* The default main window layout has been changed so that the Packet Detail and Packet Bytes are side by side underneath the Packet List pane.
* Hex dump imports from Wireshark and from text2pcap have been improved.
* Speed when using MaxMind geolocation has been greatly improved.
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-4.0.0.html
- updated wireshark-0010-dumpcap-permission-denied.patch
- dropped wireshark-0001-pkgconfig.patch which was accepted upstream
* Thu Sep 08 2022 Robert Frohl <rfrohl@suse.com>
- Wireshark 3.6.8:
* CVE-2022-3190: F5 Ethernet Trailer dissector infinite loop (boo#1203388).
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.8.html
* Thu Jul 28 2022 Robert Frohl <rfrohl@suse.com>
- Wireshark 3.6.7:
* Multiple Files preference "Create new file automatically… after" [time] working incorrectly.
* get_filter Lua function doesn’t return the filter.
* Dissector bug, protocol HTTP failed assertion "saved_layers_len < 500" with chunked/multipart.
* Wrong EtherCAT bit label (possible dissector bug).
* UDP packets falsely marked as "malformed packet".
* TLS certificate parser with filter crash.
* Incorrect type for the IEC 60870 APDU appears in packet details pane.
* NHRP Problem.
* EtherCAT CoE header unknown type.
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.7.html
* Mon Jun 20 2022 Robert Frohl <rfrohl@suse.com>
- Wireshark 3.6.6:
* TLS: RSA decryption fails with Extended Master Secret and renegotiation.
* "dfilter" file on Windows adds carriage returns, and requires line feeds.
* "Browse" button in Prefs/Name Resolution/MaxMind crashes Wireshark on macOS.
* TFTP: some packets are not recognized as TFTP packets with 3.6.5.
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.6.html
* Thu May 05 2022 Robert Frohl <rfrohl@suse.com>
- Wireshark 3.6.5 and 3.6.4:
* The 3.6.5 release fixes an installation issue on Windows which was introduced in the 3.6.4 release
* Build failure with GCC 7.5, Linux.
* RDP dissected as SSL.
* IPFIX/cflow dissector asserts when varlen field length is zero.
* 802.11ax HE PHY "Device Class" dissected incorrectly.
* DHCPv6 Option 15 User-Class incorrectly parsed in Wireshark.
* ICMPv6 dissector: PREF64 option parsing only works for prefix length 96.
* Switch macOS updater to Sparkle 2.
* CQL timestamp dissector displays the wrong timestamp.
* Unable to dissect 802.11ax Target Wake Time (TWT) packets.
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.4.html
* Thu Mar 24 2022 Robert Frohl <rfrohl@suse.com>
- Wireshark 3.6.3:
* Fuzz job crash output: fuzz-2021-01-19-7399.pcap.
* TLS dissector incorrectly reports JA3 values.
* "Wiki Protocol page" in packet details menu is broken - wiki pages not migrated to GitLab?.
* Dissector bug, protocol PFCP display Flow Description IE value error in Additional Flow Description of PFD Management Request Message.
* Bluetooth: Fails to open Log file for SCO connection.
* Fuzz job crash output: fuzz-2022-03-07-10896.pcap.
* libwiretap: Save as ERF causes segmentation fault.
* HTTP server returning multiple early hints shows too many responses in "Follow HTTP Stream".
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.3.html
* Fri Feb 11 2022 Robert Frohl <rfrohl@suse.com>
- Wireshark 3.6.2:
* CVE-2022-0586: RTMPT dissector infinite loop (boo#1195866)
* CVE-2022-0585: Large loops in multiple dissectors (boo#1195867)
* CVE-2022-0583: PVFS dissector crash (boo#1195868)
* CVE-2022-0582: CSN.1 dissector crash (boo#1195869)
* CVE-2022-0581: CMS dissector crash (boo#1195870)
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.2.html
* Tue Jan 18 2022 Robert Frohl <rfrohl@suse.com>
- Fix wireshark-plugin-libvirt build after wmem_alloc() moved from
libwireshark.so to libwsutil.so (bsc#1194780)
* Added wireshark-0001-pkgconfig.patch
- Renamed wireshark-0001-dumpcap-permission-denied.patch
to wireshark-0010-dumpcap-permission-denied.patch
* Mon Jan 10 2022 Robert Frohl <rfrohl@suse.com>
- Fix SLE15 build issue
added wireshark-0000-wsutil-implicit_declaration_memcpy.patch
/usr/bin/wireshark /usr/share/applications/org.wireshark.Wireshark-su.desktop /usr/share/applications/org.wireshark.Wireshark.desktop /usr/share/icons/hicolor/128x128/apps/org.wireshark.Wireshark.png /usr/share/icons/hicolor/128x128/mimetypes/org.wireshark.Wireshark-mimetype.png /usr/share/icons/hicolor/16x16/apps/org.wireshark.Wireshark.png /usr/share/icons/hicolor/16x16/mimetypes/org.wireshark.Wireshark-mimetype.png /usr/share/icons/hicolor/24x24/apps/org.wireshark.Wireshark.png /usr/share/icons/hicolor/24x24/mimetypes/org.wireshark.Wireshark-mimetype.png /usr/share/icons/hicolor/256x256/apps/org.wireshark.Wireshark.png /usr/share/icons/hicolor/256x256/mimetypes/org.wireshark.Wireshark-mimetype.png /usr/share/icons/hicolor/32x32/apps/org.wireshark.Wireshark.png /usr/share/icons/hicolor/32x32/mimetypes/org.wireshark.Wireshark-mimetype.png /usr/share/icons/hicolor/48x48/apps/org.wireshark.Wireshark.png /usr/share/icons/hicolor/48x48/mimetypes/org.wireshark.Wireshark-mimetype.png /usr/share/icons/hicolor/64x64/apps/org.wireshark.Wireshark.png /usr/share/icons/hicolor/64x64/mimetypes/org.wireshark.Wireshark-mimetype.png /usr/share/licenses/wireshark-ui-qt /usr/share/licenses/wireshark-ui-qt/COPYING /usr/share/metainfo/org.wireshark.Wireshark.metainfo.xml /usr/share/mime/packages/org.wireshark.Wireshark.xml
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Oct 23 22:58:29 2025