-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 01 May 2026 17:07:33 -0300 Source: wireshark Binary: libwireshark-data wireshark-doc Architecture: all Version: 4.4.15-0+deb13u1 Distribution: trixie-security Urgency: medium Maintainer: all Build Daemon (x86-grnet-02) Changed-By: Matheus Polkorny Description: libwireshark-data - network packet dissection library -- data files wireshark-doc - network traffic analyzer - documentation Closes: 1135323 Changes: wireshark (4.4.15-0+deb13u1) trixie-security; urgency=medium . * Team upload. * New upstream version 4.4.15 (Closes: #1135323) - CVE-2026-7379: Memory leak in sharkd, allows DoS - CVE-2026-7378: Crash in sharkd, allows DoS - CVE-2026-7376: Crash in sharkd, allows DoS - CVE-2026-7375: UDS Infinite loop, allows DoS - CVE-2026-6870: GSM dissector crash leading to DoS - CVE-2026-6869: WebSocket dissector crash leading to DoS - CVE-2026-6868: HTTP dissector crash leading to DoS - CVE-2026-6867: SMB2 dissector crash leading to DoS - CVE-2026-6538: BEEP dissector crash leading to DoS - CVE-2026-6537: ZigBee dissector crash leading to DoS - CVE-2026-6535: zlib crash in Wireshark, allows DoS - CVE-2026-6534: USB infinite loop, allows DoS - CVE-2026-6533: LZ77 crash in Wireshark, allows DoS - CVE-2026-6532: Kismet crash in Wireshark, allows DoS - CVE-2026-6531: SANE Infinite loop, allows DoS - CVE-2026-6530: DCP-ETSI crash in Wireshark, allows DoS - CVE-2026-6529: iLBC crash in Wireshark, allows DoS - CVE-2026-6527: ASN.1 crash in Wireshark, allows DoS - CVE-2026-6524: MySQL crash in Wireshark, allows DoS - CVE-2026-6523: GNW Infinite loop, allows DoS - CVE-2026-6522: RPKI-Router Infinite loop, allows DoS - CVE-2026-6521: OpenFlow v5 Infinite loop, allows DoS - CVE-2026-6520: OpenFlow v6 Infinite loop, allows DoS - CVE-2026-6519: MBIM Infinite loop, allows DoS - CVE-2026-5657: iLBC crash in Wireshark, allows DoS - CVE-2026-5656: Profile import path traversal DoS/RCE - CVE-2026-5654: AMR-NB crash in Wireshark, allows DoS - CVE-2026-5653: DCP-ETSI crash in Wireshark, allows DoS - CVE-2026-5409: Monero crash in Wireshark, allows DoS - CVE-2026-5408: BT-DHT crash in Wireshark, allows DoS - CVE-2026-5407: SMB2 Infinite loop, allows DoS - CVE-2026-5406: FC-SWILS crash in Wireshark, allows DoS - CVE-2026-5405: RDP crash in Wireshark, allows DoS/RCE - CVE-2026-5404: K12 RF5 parser crash DoS, allows DoS - CVE-2026-5403: SBC crash in Wireshark, allows DoS/RCE - CVE-2026-5401: AFP Spotlight crash in Wireshark, allows DoS - CVE-2026-5299: ICMPv6 PvD crash in Wireshark, allows DoS * d/gbp.conf: Update to trixie * d/libwsutil16.symbols: Update symbols to reflect upstream * d/libwireshark18.symbols: Update symbols to reflect upstream * d/watch: Restrict to 4.4.x releases Checksums-Sha1: fb7811cb907fcbe4fae4ed207ccfbcb4acb48edb 467864 libwireshark-data_4.4.15-0+deb13u1_all.deb 3c923e7911acd94bc09cb864100c1ed2e75049e8 10479596 wireshark-doc_4.4.15-0+deb13u1_all.deb 8a6f67bb52c46cc8945552142010219e3759266d 19843 wireshark_4.4.15-0+deb13u1_all-buildd.buildinfo Checksums-Sha256: 954def2841afe19dcf81b3c5e12f1d6a9bbe62064c3faa2407e71530efb46283 467864 libwireshark-data_4.4.15-0+deb13u1_all.deb 35b33c96fd01cafd2b64736cc4a379242509f19ffdacdb7b0e0b55f51286b1bb 10479596 wireshark-doc_4.4.15-0+deb13u1_all.deb 8cf3c704ed97a267926a8a9f51b0b7de205693c6b0b43d7afde57941ac338307 19843 wireshark_4.4.15-0+deb13u1_all-buildd.buildinfo Files: 3c89619699c366176dc1fe299d0a371d 467864 libs optional libwireshark-data_4.4.15-0+deb13u1_all.deb 137e1b76e6851cd294128f22d826dfd7 10479596 doc optional wireshark-doc_4.4.15-0+deb13u1_all.deb 0264c47d9adc148229a84b44427ec70a 19843 net optional wireshark_4.4.15-0+deb13u1_all-buildd.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE81O8NL+3kjBAqEvLmgPNRvTf/zcFAmn5LhEACgkQmgPNRvTf /zcwRQ/8Caad2rp9hEZ0hXbPBnxDW210jM7NNMDhe3Azg1uxWdcsaekRJ0vRM1ZK n5QK7w2hvHyggJPbEalerrMNf8yDTzh7d9pqMvDD1T2QL7XQ+klscSdsLvEWH88s PbRradsE1A/PDcSDYGCUdy1roqBfix2brvVDmEJp291JzhtmPB7oJRlN7vIHAXvC rz4xTkshU3ShGcZR/w9r/2Vvc1ClhWN+6BUU5nu4j+O7iYkeDJj/eaeFH5niwH+f YUD2oKM8l4zMOtBYG5MvEFSsOj74IsahDFzfymSRW8LSN08EM1yiAPPuskrlp+tE wGuF9U3qvy5hmZjQVywSEUgCeVlyjx+EkWwn4RlOzQwxsbibPsDKrJaSwazaoDs9 yVvlWfhXY1mbJDEIZzI3deS9i+OI38yoQXSpa7p9dqxf99OK0EOnoKbhhiXGnvVk VOxBFY8p/G+nNUYXrHm15bUkWYrVR25Ukz2RuzHAA+l1ZhLHxxLvVT1XHVT2FpSp ufiuiSIcqT1zzvcnIa+FEWucjpO04VkjSrS0N0uzkkZCiYo/Ig6gLfGIvK0rgWxd SxG2YIhwWl7+qsp+6NN5MNx4ZpGxUQwXgleUfBHouALorVqxl8bFg4Eg87M/tV31 A5QXFb7ZteVrKYrFj7kZtF8jdk133rGbX9XB1fxRYnP9MdMlKJM= =Kb7m -----END PGP SIGNATURE-----