-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 13 Jan 2018 01:31:25 +0100 Source: wireshark Binary: wireshark-common wireshark wireshark-qt wireshark-gtk tshark wireshark-dev wireshark-doc libwireshark10 libwsutil8 libwsutil-dev libwscodecs1 libwireshark-data libwireshark-dev libwiretap7 libwiretap-dev Architecture: source Version: 2.4.4-1 Distribution: unstable Urgency: medium Maintainer: Balint Reczey <rbalint@ubuntu.com> Changed-By: Balint Reczey <rbalint@ubuntu.com> Description: libwireshark-data - network packet dissection library -- data files libwireshark-dev - network packet dissection library -- development files libwireshark10 - network packet dissection library -- shared library libwiretap-dev - network packet capture library -- development files libwiretap7 - network packet capture library -- shared library libwscodecs1 - network packet dissection codecs library -- shared library libwsutil-dev - network packet dissection utilities library -- development files libwsutil8 - network packet dissection utilities library -- shared library tshark - network traffic analyzer - console version wireshark - network traffic analyzer - meta-package wireshark-common - network traffic analyzer - common files wireshark-dev - network traffic analyzer - development tools wireshark-doc - network traffic analyzer - documentation wireshark-gtk - network traffic analyzer - GTK+ version wireshark-qt - network traffic analyzer - Qt version Closes: 885831 886619 Changes: wireshark (2.4.4-1) unstable; urgency=medium . * New upstream release - release notes: https://www.wireshark.org/docs/relnotes/wireshark-2.4.4.html - security fixes: - Multiple dissectors could crash (CVE-2018-5336) - The IxVeriWave file parser could crash (CVE-2018-5334) - The WCP dissector could crash (CVE-2018-5335) - Prior to this release dumpcap enabled the Linux kernel’s BPF JIT compiler via the net.core.bpf_jit_enable sysctl. This could make systems more vulnerable to Spectre variant 1 (CVE-2017-5753) and this feature has been removed (Closes: #886619) - There was a potential buffer underflow in File_read_line function in epan/wslua/wslua_file.c file (CVE-2017-17935) (Closes: #885831) * Update symbols files * Fix dh_clean target in debian/rules * Change wireshark-doc's priority to optional from extra following Policy change Checksums-Sha1: 0a2f402f03ec9f2c4fcb42e9a98f018a74fc22f0 3522 wireshark_2.4.4-1.dsc f49bf9ed9539074f6988bfb14eb657ad7fc0bd84 28379472 wireshark_2.4.4.orig.tar.xz 425edc9c29ea32570ae582c33b4239fe56addce9 66496 wireshark_2.4.4-1.debian.tar.xz Checksums-Sha256: 86aa51e6431c65fd18a2502ce60e0baf92da2909177d7bb7ca07ec75c33c0473 3522 wireshark_2.4.4-1.dsc 848bf9997b8d7a7a34bba7af6e6d4257d29682dd346af12b34cf28fe6cc4259f 28379472 wireshark_2.4.4.orig.tar.xz fa605a47ccbe9cd3d6f036ffd9ac9e09f2e05f8c50ad4e142d3eaa6470759e19 66496 wireshark_2.4.4-1.debian.tar.xz Files: b009130ed343621da927bd1f76cd02dd 3522 net optional wireshark_2.4.4-1.dsc c4c0c99efe0e1023ea60b037386f607e 28379472 net optional wireshark_2.4.4.orig.tar.xz 83673c689e1ea802a9f21d15c839d9bb 66496 net optional wireshark_2.4.4-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIwBAEBCAAaBQJaWWO8ExxyYmFsaW50QHVidW50dS5jb20ACgkQ9mTSVrRpGn2m rRAAxPiiXUiLjWNXbXKflxpo/vZFG69g+gU2L/Sa1h6WHmv18fUZznl1rrGP1m3p 8KUv6TEdbqda/5d5qVV3RH+RBU9WR3phwOfPbj3gq+bzkXCSw+Blb4VvGOsao9EE FulxmiVmYDUT+DaF/yOytwc6UzUBpSHAQFZze85W02yLDSnMFbS77ALB/C/ZXk83 W5ZgUDNk4DXVSurC0qSckW0W6VeGGxeUZxfNeLvyOWH5a7CwcNDnN6ZivON0PgF4 AU3euLAZLBiAy6FGIhWiggdbVU5KdDGhv01OdFT6Z3TDVh+XSs407y4AsybO50Se michtshZjmCPIGnI3L+Mp+mIbkn0LXE6ztlOZVk33rAz/9k+L9N+g1iPba9S5SYh KzWztKNdeBylZKaMSQSQJcXPaz+K6U5qEpiJG7Bf+nUi/MJw4Js4idBTifsQfndc lXPoCRN4cmHTs9rl7mL2ak61HgvlGPmKKAK8C4C4fqFX8b5eahsbjExXy2khdSk0 Sg2HcL81icDy/nOhHHpSVo8eO/HPfqZ8MwOcu+q/2MwyLKewK5ZV/OgbwAYak4Mb fxcWxoMYrYjyOPRv/BvTa6aqpHTIQbo00X4gW3mou64DAybFwCHHZa5w2HXSGp9Z NCbuttBwsRppbERZKJbf/X8ix3mhGR2wTHVeIPO4i0aGMT0= =1mRJ -----END PGP SIGNATURE-----