[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2547-1] wireshark security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2547-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                          Adrian Bunk
February 06, 2021                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : wireshark
Version        : 2.6.20-0+deb9u1
CVE ID         : CVE-2019-13619 CVE-2019-16319 CVE-2019-19553 CVE-2020-7045
                 CVE-2020-9428 CVE-2020-9430 CVE-2020-9431 CVE-2020-11647
                 CVE-2020-13164 CVE-2020-15466 CVE-2020-25862 CVE-2020-25863
                 CVE-2020-26418 CVE-2020-26421 CVE-2020-26575 CVE-2020-28030
Debian Bug     : 958213 974688 974689

Several vulnerabilities were fixed in Wireshark, a network sniffer.

CVE-2019-13619

    ASN.1 BER and related dissectors crash.

CVE-2019-16319

    The Gryphon dissector could go into an infinite loop.

CVE-2019-19553

    The CMS dissector could crash.

CVE-2020-7045

    The BT ATT dissector could crash.

CVE-2020-9428

    The EAP dissector could crash.

CVE-2020-9430

    The WiMax DLMAP dissector could crash.

CVE-2020-9431

    The LTE RRC dissector could leak memory.

CVE-2020-11647

    The BACapp dissector could crash.

CVE-2020-13164

    The NFS dissector could crash.

CVE-2020-15466

    The GVCP dissector could go into an infinite loop.

CVE-2020-25862

    The TCP dissector could crash.

CVE-2020-25863

    The MIME Multipart dissector could crash.

CVE-2020-26418

    Memory leak in the Kafka protocol dissector.

CVE-2020-26421

    Crash in USB HID protocol dissector.

CVE-2020-26575

    The Facebook Zero Protocol (aka FBZERO) dissector
    could enter an infinite loop.

CVE-2020-28030

    The GQUIC dissector could crash.

For Debian 9 stretch, these problems have been fixed in version
2.6.20-0+deb9u1.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmAe/OcACgkQiNJCh6LY
mLHeUxAAprtNtAcO4sZ1bVL6OCpLZyd0HxQ5lFPFpvZWaCzXXDcngk9419kfVDFI
/tbgssx0HKVhcyrqTyb9JJ+WIkTYLt01aR9JmGZX4TBzu2n3el/qyp66iPRhAibn
AtEGIy6FVvqoTXEGTJseRVMssPXjdNKTlYI9qCdZd/UbGS6yhjvjz3BEWTb66C9A
dBpZrOIEO5kMotL2tahWmySvqbxfL7W14XNks3o1d8IK2hJg0YZi8+1InrIYFmRl
FF+nNTswxHfEerR4r893MTFc7mbX+B8ehYfFBQpOSKquvP04f/k0sJGOuatg0z5s
XGQ9PDKEbW0dSH9MGghw4UsUEvhpkGhf1z/iEFbffY8bf0Yq18j/+27zTmg+arV7
10NGXnn4qSg6MZ0wQFxo1noTerhXIAW/6+Uf1KrG5SrAEH+Pp8sJsrALRog7lPa7
bQJaqWsQdyfNBTuoPmKjQMkJtr5Lw0N5v+ro4SB0g4I2KGRYTaTD9bWq4es7jHD6
IpcLx6HO2uZX6osTiErZVcTDDYy23EDe/Tu9p9PF1TN3ACybMQfaUcov3zfRTnlI
ZeWJOMOTx47X+b11uVKETp1eGlovYRuSnfukjp5amVFITcn8lB5rmzhqp5Dgo14p
Zcr2ahh4LDTO9NFliKf0Dh4wQstehE6f94/mkqqxOfakIMMZLJw=
=ds+T
-----END PGP SIGNATURE-----


Reply to: