[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3906-1] wireshark security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3906-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                          Adrian Bunk
September 30, 2024                            https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : wireshark
Version        : 3.4.16-0+deb11u1
CVE ID         : CVE-2021-4181 CVE-2021-4182 CVE-2021-4184 CVE-2021-4185 
                 CVE-2021-4186 CVE-2021-4190 CVE-2022-0581 CVE-2022-0582 
                 CVE-2022-0583 CVE-2022-0585 CVE-2022-0586 CVE-2022-3190 
                 CVE-2022-4344 CVE-2022-4345 CVE-2023-0411 CVE-2023-0412 
                 CVE-2023-0413 CVE-2023-0415 CVE-2023-0416 CVE-2023-0417 
                 CVE-2023-0666 CVE-2023-0667 CVE-2023-0668 CVE-2023-1161 
                 CVE-2023-1992 CVE-2023-1993 CVE-2023-1994 CVE-2023-2855 
                 CVE-2023-2856 CVE-2023-2858 CVE-2023-2879 CVE-2023-2906 
                 CVE-2023-2952 CVE-2023-3648 CVE-2023-3649 CVE-2023-4511 
                 CVE-2023-4512 CVE-2023-4513 CVE-2023-6175 CVE-2024-0208 
                 CVE-2024-0209 CVE-2024-0211 CVE-2024-2955 CVE-2024-4853 
                 CVE-2024-4854 CVE-2024-8250 CVE-2024-8645
Debian Bug     : 1033756 1034721 1041101 1059925 1068111 1080298

Multiple vulnerabilities have been fixed in the network traffic analyzer 
Wireshark.

CVE-2021-4181

    Sysdig Event dissector crash

CVE-2021-4182

    RFC 7468 dissector crash

CVE-2021-4184

    BitTorrent DHT dissector infinite loop

CVE-2021-4185

    RTMPT dissector infinite loop

CVE-2021-4186

    Gryphon dissector crash

CVE-2021-4190

    Kafka dissector large loop DoS

CVE-2022-0581

    CMS protocol dissector crash

CVE-2022-0582

    CSN.1 protocol dissector unaligned access

CVE-2022-0583

    PVFS protocol dissector crash

CVE-2022-0585

    Large loops in multiple dissectors

CVE-2022-0586

    RTMPT protocol dissector infinite loop

CVE-2022-3190

    F5 Ethernet Trailer dissector infinite loop

CVE-2022-4344

    Kafka protocol dissector memory exhaustion

CVE-2022-4345

    Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors

CVE-2023-0411

    Excessive loops in the BPv6, NCP and RTPS protocol dissectors

CVE-2023-0412

    TIPC dissector crash

CVE-2023-0413

    Dissection engine bug DoS

CVE-2023-0415

    iSCSI dissector crash

CVE-2023-0416

    GNW dissector crash

CVE-2023-0417

    NFS dissector memory leak

CVE-2023-0666

    RTPS parsing heap overflow

CVE-2023-0667

    MSMMS dissector buffer overflow

CVE-2023-0668

    IEEE C37.118 Synchrophasor dissector crash

CVE-2023-1161

    ISO 15765 dissector crash

CVE-2023-1992

    RPCoRDMA dissector crash

CVE-2023-1993

    LISP dissector large loop

CVE-2023-1994

    GQUIC dissector crash

CVE-2023-2855

    Candump log parser crash

CVE-2023-2856

    VMS TCPIPtrace file parser crash

CVE-2023-2858

    NetScaler file parser crash

CVE-2023-2879

    GDSDB dissector infinite loop

CVE-2023-2906

    CP2179 dissector crash

CVE-2023-2952

    XRA dissector infinite loop

CVE-2023-3648

    Kafka dissector crash

CVE-2023-3649

    iSCSI dissector crash

CVE-2023-4511

    BT SDP dissector infinite loop

CVE-2023-4512

    CBOR dissector crash

CVE-2023-4513

    BT SDP dissector memory leak

CVE-2023-6175

    NetScreen file parser crash

CVE-2024-0208

    GVCP dissector crash

CVE-2024-0209

    IEEE 1609.2 dissector crash

CVE-2024-0211

    DOCSIS dissector crash

CVE-2024-2955

    T.38 dissector crash

CVE-2024-4853

    Editcap byte chopping crash

CVE-2024-4854

    MONGO dissector infinite loop

CVE-2024-8250

    NTLMSSP dissector crash

CVE-2024-8645

    SPRT dissector crash

For Debian 11 bullseye, these problems have been fixed in version
3.4.16-0+deb11u1.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmb6VcUACgkQiNJCh6LY
mLH/dBAAnbKnPgHPIc086jce0c/s4A67r89LBFDHMoJbWA88/0zHjq6ZygqibvRJ
YZ5hX3xkjI3akFRx8muRftWNpmv5nzD/vVXm8/OLVmW2xyYhNdm7lsWZfZtWR1/l
uXG0puo3yrnGR4cnlmoYrlGmA8o3k1XQnOtDQ6jPXWlJW+nFBBPeNhcBV4Avk4xs
MQRKZtOxlAmgNvtVCs/Fd/oNqGxmyhPKvrNOpJh0bBclotapdXrwwEc42H5HoKoq
ohMDpe4f9SY7Rv62YfHJUAIRoS6vMP4xOBHgAdWxcokRtNY6r6vODN03QLEgwF1m
1R12kFb+emWOFlVbEgIHbkdXXVMapItT3SvsoQ6TcDYVG3byIJG81h/zv97ElvHC
/ukxsWdMx1ycxEVYcytqEiaIQFQmUSLfwE5+oLZqlu87VUjddtTU1EuPjlADE5eQ
iQpOsUZwGN4n4OcqVddyzRpSEb4yW/CQ7AV+YzI71rLKNA+GzvFIikzlenoqfs20
5imBd25qNaFQJ/aYaIvQ/kDMSjaYxq+PbV0r7kMU5ZK15HKfCzTyFkz9tqs1GYa/
Eam1jZFeXs04IfvnJvqkacviSL60ghDOiyMUXrsWgrtNAL8+AWG/oPqKtXeEPwjq
XisHZzr/luIjNbKH+2iy3l4So86kiu+Df+S075nHYt2+mN3YaCY=
=EMuS
-----END PGP SIGNATURE-----


Reply to: