[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1388-1] wireshark security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : wireshark
Version        : 1.12.1+g01b65bf-4+deb8u6~deb7u11
CVE ID         : CVE-2018-9258 CVE-2018-9260 CVE-2018-9261 CVE-2018-9263
                 CVE-2018-9268 CVE-2018-9269 CVE-2018-9270 CVE-2018-11358
                 CVE-2018-11362


Several issues that could result in a crash within different dissectors have been fixed. Other issues are related to memory leaks or heap-based buffer overflows.

All issue could be caused by special crafted and malformed packets.


For Debian 7 "Wheezy", these problems have been fixed in version
1.12.1+g01b65bf-4+deb8u6~deb7u11.

We recommend that you upgrade your wireshark packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=QXVq
-----END PGP SIGNATURE-----


Reply to: