-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Tue, 02 Aug 2016 11:11:21 +0200 Source: wireshark Binary: wireshark-common wireshark wireshark-qt wireshark-gtk tshark wireshark-dev wireshark-doc libwireshark6 libwsutil6 libwsutil-dev libwireshark-data libwireshark-dev libwiretap5 libwiretap-dev Architecture: source Version: 2.0.5+ga3be9c6-1 Distribution: unstable Urgency: medium Maintainer: Balint Reczey <balint@balintreczey.hu> Changed-By: Balint Reczey <balint@balintreczey.hu> Description: libwireshark-data - network packet dissection library -- data files libwireshark-dev - network packet dissection library -- development files libwireshark6 - network packet dissection library -- shared library libwiretap-dev - network packet capture library -- development files libwiretap5 - network packet capture library -- shared library libwsutil-dev - network packet dissection utilities library -- development files libwsutil6 - network packet dissection utilities library -- shared library tshark - network traffic analyzer - console version wireshark - network traffic analyzer - meta-package wireshark-common - network traffic analyzer - common files wireshark-dev - network traffic analyzer - development tools wireshark-doc - network traffic analyzer - documentation wireshark-gtk - network traffic analyzer - GTK+ version wireshark-qt - network traffic analyzer - Qt version Closes: 780089 812495 813680 826385 832926 Changes: wireshark (2.0.5+ga3be9c6-1) unstable; urgency=medium . * Generate better pkg-config file (Closes: #832926) * New upstream release - release notes: https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html - bug fixes - Allow restoring maximized windows as maximized (Closes: #780089) - Restart current capture fails with "no interface selected" error when capturing in promiscuous mode (Closes: #812495, #813680, #826385) - security fixes: - PacketBB dissector could divide by zero (CVE-2016-6505) - WSP infinite loop (CVE-2016-6506) - RLC long loop (CVE-2016-6508) - LDSS dissector crash (CVE-2016-6509) - RLC dissector crash (CVE-2016-6510) - OpenFlow long loop (CVE-2016-6511) - MMSE, WAP, WBXML, and WSP infinite loop (CVE-2016-6512) - WBXML crash (CVE-2016-6513) * Bump standards version to 3.9.8 Checksums-Sha1: be584a956a77b2d4c4ca96596b6ce05fe3f39d38 3355 wireshark_2.0.5+ga3be9c6-1.dsc 763b889938504067afbf5edc38a0334918a84a87 26463100 wireshark_2.0.5+ga3be9c6.orig.tar.xz fc21b6c5e4c62b6a211f6cc75a9fb83cbe2ae499 62116 wireshark_2.0.5+ga3be9c6-1.debian.tar.xz Checksums-Sha256: d8c7e5f7be2782c073ad88c0dbc5bbfd4e5a1f2ba033f0860861d82e47619b08 3355 wireshark_2.0.5+ga3be9c6-1.dsc 21cc9310a00164c301a2a5281a11662107b4696ec618ee2f5fe323283e2a88c6 26463100 wireshark_2.0.5+ga3be9c6.orig.tar.xz c86df57bdf16b84bb0b4741f8229a09b0fe23ab479f0f29062b7095fbfd1a7dd 62116 wireshark_2.0.5+ga3be9c6-1.debian.tar.xz Files: 922daddade2777c0c932dcbbd5113b4e 3355 net optional wireshark_2.0.5+ga3be9c6-1.dsc 65c2892cf1472b21210cfe35aa867693 26463100 net optional wireshark_2.0.5+ga3be9c6.orig.tar.xz 756020b0c9b57fc508ef12777b2c950e 62116 net optional wireshark_2.0.5+ga3be9c6-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJXoGwRAAoJEPZk0la0aRp9mjIP/R/fwPmyztEfW8vHUS+TmBmx qm3h5XQzqcD932d3+/LCfG7SaDFVL3d0ft0wcrkBb3KoH/enrjsMW25SmflYqvV0 +TA8SKhxGAxmbPH+Eo7Wxl7oL0x4pCnwajjLJym7qLgERBWAUfBr++Jkf+ez3/cf H84NZmoyV01GZfzBI5vD9qnvKMgBw3IJz9gTalswM+pHW8ckDegodTFtlEoIQYCP DcbinQ311wASge7J+hFvMPBeVlzH4oQs3+fTxanXxdr/V8dAJ04pic3dRjs2stXq eqrSf97paWV/sDensFR4N6GRnyJAWjvv7yb1+RKKCE+CZxkKr/3cxQn33veV2nF2 3PwIDULmmETvIuNu4y0SbJOGknvCCI6LZ6/VYFgw4z+5Ph5qFCgg3Oqp510B4kYP ZVxR32wZrqKso0XOAO00iR2i8rnS+zaw/slxo4oHZnV0cmbZ8Qnhmed2IZru/HXN XB7gJfF86haDLxJW9La5BQ24EzovAsNwy/vl4jy0NgwiEGFvnP3jiuixQ7XZWDNb VKqTMVIMFlbaHw4bWM5O5LiERpQtjHhRtSnKVv27J1Mtnc/iHDj0f4GCckwf37/C TkWHi6WItCp0UWpTs4h8S1fnprm1PuWaO+8/+srVQW0gib4NWsPObXVND7KKUGY+ 2NYXyehhXb1hkfLvyS83 =JIoj -----END PGP SIGNATURE-----