sleuthkit 4.12.1+dfsg-1.1ubuntu2 source package in Ubuntu

Changelog

sleuthkit (4.12.1+dfsg-1.1ubuntu2) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- William Grant <email address hidden>  Mon, 01 Apr 2024 15:45:07 +1100

Upload details

Uploaded by:
William Grant
Uploaded to:
Noble
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe admin
Noble release universe admin

Downloads

File Size SHA-256 Checksum
sleuthkit_4.12.1+dfsg.orig.tar.xz 2.3 MiB 88e15a90f09e83405dff9bcb274b30308de07408116c6190b29f4383fe7ec5f0
sleuthkit_4.12.1+dfsg-1.1ubuntu2.debian.tar.xz 33.3 KiB 6d48b09822e191b9ad84a7008e0d3bcf53666acff31d69c310d3aaaeb5497c21
sleuthkit_4.12.1+dfsg-1.1ubuntu2.dsc 2.2 KiB 7e5e3a449dff8be871c48d835b30711bb84f30c6ec25ed4f33f2fbbe01476eee

View changes file

Binary packages built by this source

libtsk-dev: library for forensics analysis (development files)

 The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
 line file and volume system forensic analysis tools. The filesystem tools
 allow you to examine filesystems of a suspect computer in a non-intrusive
 fashion. Because the tools do not rely on the operating system to process the
 filesystems, deleted and hidden content is shown.
 .
 The volume system (media management) tools allow you to examine the layout of
 disks and other media. You can also recover deleted files, get information
 stored in slack spaces, examine filesystems journal, see partitions layout on
 disks or images etc. But is very important clarify that the TSK acts over the
 current filesystem only.
 .
 The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
 partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
 tools, you can identify where partitions are located and extract them so that
 they can be analyzed with filesystem analysis tools.
 .
 Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
 Ext4, UFS and YAFFS2.
 .
 This package contains header files and static version of the library.

libtsk19t64: No summary available for libtsk19t64 in ubuntu oracular.

No description available for libtsk19t64 in ubuntu oracular.

libtsk19t64-dbgsym: debug symbols for libtsk19t64
sleuthkit: tools for forensics analysis on volume and filesystem data

 The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
 line file and volume system forensic analysis tools. The filesystem tools
 allow you to examine filesystems of a suspect computer in a non-intrusive
 fashion. Because the tools do not rely on the operating system to process the
 filesystems, deleted and hidden content is shown.
 .
 The volume system (media management) tools allow you to examine the layout of
 disks and other media. You can also recover deleted files, get information
 stored in slack spaces, examine filesystems journal, see partitions layout on
 disks or images etc. But is very important clarify that the TSK acts over the
 current filesystem only.
 .
 The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
 partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
 tools, you can identify where partitions are located and extract them so that
 they can be analyzed with filesystem analysis tools.
 .
 Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
 Ext4, UFS and YAFFS2.
 .
 This package contains the set of command line tools in The Sleuth Kit.

sleuthkit-dbgsym: debug symbols for sleuthkit