[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 4217-1] wireshark security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4217-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
June 03, 2018                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2018-9273 CVE-2018-7320 CVE-2018-7334 CVE-2018-7335 
                 CVE-2018-7419 CVE-2018-9261 CVE-2018-9264 CVE-2018-11358 
                 CVE-2018-11360 CVE-2018-11362

It was discovered that Wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors for PCP, ADB, NBAP, UMTS MAC,
IEEE 802.11, SIGCOMP, LDSS, GSM A DTAP and Q.931, which result in denial
of service or the execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.12.1+g01b65bf-4+deb8u14.

For the stable distribution (stretch), these problems have been fixed in
version 2.2.6+g32dac6a-2+deb9u3.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=FNmT
-----END PGP SIGNATURE-----


Reply to: