-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 01 May 2026 17:07:33 -0300 Source: wireshark Architecture: source Version: 4.4.15-0+deb13u1 Distribution: trixie-security Urgency: medium Maintainer: Balint Reczey <balint@balintreczey.hu> Changed-By: Matheus Polkorny <mpolkorny@gmail.com> Closes: 1135323 Changes: wireshark (4.4.15-0+deb13u1) trixie-security; urgency=medium . * Team upload. * New upstream version 4.4.15 (Closes: #1135323) - CVE-2026-7379: Memory leak in sharkd, allows DoS - CVE-2026-7378: Crash in sharkd, allows DoS - CVE-2026-7376: Crash in sharkd, allows DoS - CVE-2026-7375: UDS Infinite loop, allows DoS - CVE-2026-6870: GSM dissector crash leading to DoS - CVE-2026-6869: WebSocket dissector crash leading to DoS - CVE-2026-6868: HTTP dissector crash leading to DoS - CVE-2026-6867: SMB2 dissector crash leading to DoS - CVE-2026-6538: BEEP dissector crash leading to DoS - CVE-2026-6537: ZigBee dissector crash leading to DoS - CVE-2026-6535: zlib crash in Wireshark, allows DoS - CVE-2026-6534: USB infinite loop, allows DoS - CVE-2026-6533: LZ77 crash in Wireshark, allows DoS - CVE-2026-6532: Kismet crash in Wireshark, allows DoS - CVE-2026-6531: SANE Infinite loop, allows DoS - CVE-2026-6530: DCP-ETSI crash in Wireshark, allows DoS - CVE-2026-6529: iLBC crash in Wireshark, allows DoS - CVE-2026-6527: ASN.1 crash in Wireshark, allows DoS - CVE-2026-6524: MySQL crash in Wireshark, allows DoS - CVE-2026-6523: GNW Infinite loop, allows DoS - CVE-2026-6522: RPKI-Router Infinite loop, allows DoS - CVE-2026-6521: OpenFlow v5 Infinite loop, allows DoS - CVE-2026-6520: OpenFlow v6 Infinite loop, allows DoS - CVE-2026-6519: MBIM Infinite loop, allows DoS - CVE-2026-5657: iLBC crash in Wireshark, allows DoS - CVE-2026-5656: Profile import path traversal DoS/RCE - CVE-2026-5654: AMR-NB crash in Wireshark, allows DoS - CVE-2026-5653: DCP-ETSI crash in Wireshark, allows DoS - CVE-2026-5409: Monero crash in Wireshark, allows DoS - CVE-2026-5408: BT-DHT crash in Wireshark, allows DoS - CVE-2026-5407: SMB2 Infinite loop, allows DoS - CVE-2026-5406: FC-SWILS crash in Wireshark, allows DoS - CVE-2026-5405: RDP crash in Wireshark, allows DoS/RCE - CVE-2026-5404: K12 RF5 parser crash DoS, allows DoS - CVE-2026-5403: SBC crash in Wireshark, allows DoS/RCE - CVE-2026-5401: AFP Spotlight crash in Wireshark, allows DoS - CVE-2026-5299: ICMPv6 PvD crash in Wireshark, allows DoS * d/gbp.conf: Update to trixie * d/libwsutil16.symbols: Update symbols to reflect upstream * d/libwireshark18.symbols: Update symbols to reflect upstream * d/watch: Restrict to 4.4.x releases Checksums-Sha1: 864b3e2aeac83917723956c96e543bb8dd26b4a3 3470 wireshark_4.4.15-0+deb13u1.dsc 078f37e29642c8845798d366678f3e39f74443d5 50773890 wireshark_4.4.15.orig.tar.bz2 994b321e689ce488e0d022773ab3b65b57afa466 87000 wireshark_4.4.15-0+deb13u1.debian.tar.xz 743c7eb17d24c6bc7c977c0ed3a62a57491cdea4 25390 wireshark_4.4.15-0+deb13u1_amd64.buildinfo Checksums-Sha256: 0cd47ab9c11b37a5f8d700c93648d9983e1261361fa4179cec0e146977bbf7e5 3470 wireshark_4.4.15-0+deb13u1.dsc 81f3b7b3f4a8ec40f499127fa9a647bd036688c6fc982b2fcd7e0a9a26a31dda 50773890 wireshark_4.4.15.orig.tar.bz2 0e8fb03ad8185387f87193f37ff45bf81a81eff0c8f63789dba74f4250365fc2 87000 wireshark_4.4.15-0+deb13u1.debian.tar.xz cfe36750dc70323ba61fcb6e294a28f5a97ec436e63d9f3ddce230bcc66d88e0 25390 wireshark_4.4.15-0+deb13u1_amd64.buildinfo Files: 1b5819b57a9039ff16e88594d3090ced 3470 net optional wireshark_4.4.15-0+deb13u1.dsc 66b064839f433757b5451f5561cefa06 50773890 net optional wireshark_4.4.15.orig.tar.bz2 4aedb2a2328c51712917d38f12354f32 87000 net optional wireshark_4.4.15-0+deb13u1.debian.tar.xz 0da81f308f42a8fb1d368573149433fa 25390 net optional wireshark_4.4.15-0+deb13u1_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEECgzx8d8+AINglLHJt4M9ggJ8mQsFAmn5Jn8ACgkQt4M9ggJ8 mQtiNw/6A4qL6W0VHUmVd6FIpbyx/yJPnvQtJbMDy8WFCYIV75tH3gzKejmAQSBh z0iudO7vZH1ihhwIb4ED83aPVFrZwCBrCKGFTojtS7gp75m60HbbHXM5veGp2KYk PCD9WL+ojfZ18XQiIMkcYLeEiMDmPwT5b65uEg+GvROCYJ49JFGBrYJr0Hqc5MGt jNdEiNXdFy19drUAV3Q2kEXyuxgi77Tdb5ECWQF6LyMM8kfKfuKFRot0gSB5RsKQ tlPWimTC466kzOSWm4wfPbdjPgXL2q1Jxyac+T5AAWIuFnUcENy2Myo+tK5xceiK WV9Pb+WH7D0FXY7fNr25HqqnmhPDZ5Zty20xsBmdE/61W0x34cDLqeMGk9oomYXf KXLHwki86AxgRiZ9xx8+pbLYz0nYZjfjGWQoUB+i+vltrrzg7ssm22/FREReYjYZ YrW0KCUfnaRAPwwS2Upc3dFtTcDJ607A5/WbQm3m62ccQKgjMSngvu+QXrDSWLou BrjzAPRguonu28gi5OuZqcYUKZhC9KeDVErwRdShesNdB2zoyJGiKJyhRV29dCMh djlnUY7+wT5gob8cywt626C2b3i6jjAXzMXtCuxKSTqzpQVYTIT4xHOotLiY94ny CSsBaG6CgmxXHTUwsW8nyCYh18cPzrRMr+QzdbLnD9MOXo8eTQg= =T7FS -----END PGP SIGNATURE-----