[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2849-1] wireshark security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2849-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                          Adrian Bunk
December 26, 2021                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : wireshark
Version        : 2.6.20-0+deb9u2
CVE ID         : CVE-2021-22207 CVE-2021-22235 CVE-2021-39921 CVE-2021-39922 
                 CVE-2021-39923 CVE-2021-39924 CVE-2021-39925 CVE-2021-39928 
                 CVE-2021-39929
Debian Bug     : 987853

Several vulnerabilities were fixed in the network traffic analyzer Wireshark.

CVE-2021-22207

    Excessive memory consumption in the MS-WSP dissector.

CVE-2021-22235

    Crash in the DNP dissector.

CVE-2021-39921

    NULL pointer exception in the Modbus dissector.

CVE-2021-39922

    Buffer overflow in the C12.22 dissector.

CVE-2021-39923

    Large loop in the PNRP dissector.

CVE-2021-39924

    Large loop in the Bluetooth DHT dissector.

CVE-2021-39925

    Buffer overflow in the Bluetooth SDP dissector.

CVE-2021-39928

    NULL pointer exception in the IEEE 802.11 dissector.

CVE-2021-39929

    Uncontrolled Recursion in the Bluetooth DHT dissector.

For Debian 9 stretch, these problems have been fixed in version
2.6.20-0+deb9u2.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmHIwmAACgkQiNJCh6LY
mLHgMg/+Kd1wRS3kNX5Qxvf3Zi/+kAWLOcLGeTzsuXG6Gxvokyh957PV6TiCe+N2
J3m1h0oZQECWrPf/4l/m2I3adA6P7xlOX2ozO5PbtRPju1+FmqY8fs4mEDEgrR5d
z608Cvyl32Y+vffze9/rpSK6UzLzW7QnKX5SKRNt6q03q2pnAOjT7ED79AAZXPL0
b3mTHQsiAQO93t+6D0dXf8oUjZ/FFM2anTDPbRcGQu5f32pFv+KCLWEMDUwdA8Nx
iVbVk/FL+tMKtd/kABUFwa3gpYDbm/1fH9kHFEamElOsv+R9qFzITgnZr+tKRb6P
1AP8FJhLwcNMSk8FXK7BEIOIfxOTh3I/9eC4KLOznKIfGqPYSrQmFJIqJ/l5xyej
PXyo/Ygf58OQbeLSZkOiTlq5yhJmxOj/G81sDx0VxBgnt6JStBo3Vhqlz2Tj0nYp
WuOLFUW+k74NpG0rtfFU8hJjdrKzvvqGhS6XBmDuH9RThKwi/xyPEhZI+DQxL06n
l1qaJ1tfGiOS0mLWP+ZU8cOLdmc2jiQvdOdAe9onFyQPkJ8Knsa+ik+OuVC3VMXK
X0NwdVPpb+p5DcIV4cE8yei0YXZ2CZDugA8s4I92HwIQ/Gn6tYq1lmYpG44pigGI
i6ZJczH9UYzOXpJIiHlqg6OsorE0mJxynLbWdYo0lXnbqNOWcAk=
=b+J5
-----END PGP SIGNATURE-----


Reply to: