Accepted wireshark 2.0.5+ga3be9c6-1 (source) into unstable
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 02 Aug 2016 11:11:21 +0200
Source: wireshark
Binary: wireshark-common wireshark wireshark-qt wireshark-gtk tshark wireshark-dev wireshark-doc libwireshark6 libwsutil6 libwsutil-dev libwireshark-data libwireshark-dev libwiretap5 libwiretap-dev
Architecture: source
Version: 2.0.5+ga3be9c6-1
Distribution: unstable
Urgency: medium
Maintainer: Balint Reczey <balint@balintreczey.hu>
Changed-By: Balint Reczey <balint@balintreczey.hu>
Description:
libwireshark-data - network packet dissection library -- data files
libwireshark-dev - network packet dissection library -- development files
libwireshark6 - network packet dissection library -- shared library
libwiretap-dev - network packet capture library -- development files
libwiretap5 - network packet capture library -- shared library
libwsutil-dev - network packet dissection utilities library -- development files
libwsutil6 - network packet dissection utilities library -- shared library
tshark - network traffic analyzer - console version
wireshark - network traffic analyzer - meta-package
wireshark-common - network traffic analyzer - common files
wireshark-dev - network traffic analyzer - development tools
wireshark-doc - network traffic analyzer - documentation
wireshark-gtk - network traffic analyzer - GTK+ version
wireshark-qt - network traffic analyzer - Qt version
Closes: 780089 812495 813680 826385 832926
Changes:
wireshark (2.0.5+ga3be9c6-1) unstable; urgency=medium
.
* Generate better pkg-config file (Closes: #832926)
* New upstream release
- release notes:
https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html
- bug fixes
- Allow restoring maximized windows as maximized (Closes: #780089)
- Restart current capture fails with "no interface selected" error
when capturing in promiscuous mode (Closes: #812495, #813680,
#826385)
- security fixes:
- PacketBB dissector could divide by zero (CVE-2016-6505)
- WSP infinite loop (CVE-2016-6506)
- RLC long loop (CVE-2016-6508)
- LDSS dissector crash (CVE-2016-6509)
- RLC dissector crash (CVE-2016-6510)
- OpenFlow long loop (CVE-2016-6511)
- MMSE, WAP, WBXML, and WSP infinite loop (CVE-2016-6512)
- WBXML crash (CVE-2016-6513)
* Bump standards version to 3.9.8
Checksums-Sha1:
be584a956a77b2d4c4ca96596b6ce05fe3f39d38 3355 wireshark_2.0.5+ga3be9c6-1.dsc
763b889938504067afbf5edc38a0334918a84a87 26463100 wireshark_2.0.5+ga3be9c6.orig.tar.xz
fc21b6c5e4c62b6a211f6cc75a9fb83cbe2ae499 62116 wireshark_2.0.5+ga3be9c6-1.debian.tar.xz
Checksums-Sha256:
d8c7e5f7be2782c073ad88c0dbc5bbfd4e5a1f2ba033f0860861d82e47619b08 3355 wireshark_2.0.5+ga3be9c6-1.dsc
21cc9310a00164c301a2a5281a11662107b4696ec618ee2f5fe323283e2a88c6 26463100 wireshark_2.0.5+ga3be9c6.orig.tar.xz
c86df57bdf16b84bb0b4741f8229a09b0fe23ab479f0f29062b7095fbfd1a7dd 62116 wireshark_2.0.5+ga3be9c6-1.debian.tar.xz
Files:
922daddade2777c0c932dcbbd5113b4e 3355 net optional wireshark_2.0.5+ga3be9c6-1.dsc
65c2892cf1472b21210cfe35aa867693 26463100 net optional wireshark_2.0.5+ga3be9c6.orig.tar.xz
756020b0c9b57fc508ef12777b2c950e 62116 net optional wireshark_2.0.5+ga3be9c6-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=JIoj
-----END PGP SIGNATURE-----