-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2849-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Adrian Bunk December 26, 2021 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : wireshark Version : 2.6.20-0+deb9u2 CVE ID : CVE-2021-22207 CVE-2021-22235 CVE-2021-39921 CVE-2021-39922 CVE-2021-39923 CVE-2021-39924 CVE-2021-39925 CVE-2021-39928 CVE-2021-39929 Debian Bug : 987853 Several vulnerabilities were fixed in the network traffic analyzer Wireshark. CVE-2021-22207 Excessive memory consumption in the MS-WSP dissector. CVE-2021-22235 Crash in the DNP dissector. CVE-2021-39921 NULL pointer exception in the Modbus dissector. CVE-2021-39922 Buffer overflow in the C12.22 dissector. CVE-2021-39923 Large loop in the PNRP dissector. CVE-2021-39924 Large loop in the Bluetooth DHT dissector. CVE-2021-39925 Buffer overflow in the Bluetooth SDP dissector. CVE-2021-39928 NULL pointer exception in the IEEE 802.11 dissector. CVE-2021-39929 Uncontrolled Recursion in the Bluetooth DHT dissector. For Debian 9 stretch, these problems have been fixed in version 2.6.20-0+deb9u2. We recommend that you upgrade your wireshark packages. For the detailed security status of wireshark please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wireshark Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmHIwmAACgkQiNJCh6LY mLHgMg/+Kd1wRS3kNX5Qxvf3Zi/+kAWLOcLGeTzsuXG6Gxvokyh957PV6TiCe+N2 J3m1h0oZQECWrPf/4l/m2I3adA6P7xlOX2ozO5PbtRPju1+FmqY8fs4mEDEgrR5d z608Cvyl32Y+vffze9/rpSK6UzLzW7QnKX5SKRNt6q03q2pnAOjT7ED79AAZXPL0 b3mTHQsiAQO93t+6D0dXf8oUjZ/FFM2anTDPbRcGQu5f32pFv+KCLWEMDUwdA8Nx iVbVk/FL+tMKtd/kABUFwa3gpYDbm/1fH9kHFEamElOsv+R9qFzITgnZr+tKRb6P 1AP8FJhLwcNMSk8FXK7BEIOIfxOTh3I/9eC4KLOznKIfGqPYSrQmFJIqJ/l5xyej PXyo/Ygf58OQbeLSZkOiTlq5yhJmxOj/G81sDx0VxBgnt6JStBo3Vhqlz2Tj0nYp WuOLFUW+k74NpG0rtfFU8hJjdrKzvvqGhS6XBmDuH9RThKwi/xyPEhZI+DQxL06n l1qaJ1tfGiOS0mLWP+ZU8cOLdmc2jiQvdOdAe9onFyQPkJ8Knsa+ik+OuVC3VMXK X0NwdVPpb+p5DcIV4cE8yei0YXZ2CZDugA8s4I92HwIQ/Gn6tYq1lmYpG44pigGI i6ZJczH9UYzOXpJIiHlqg6OsorE0mJxynLbWdYo0lXnbqNOWcAk= =b+J5 -----END PGP SIGNATURE-----