Debian Security Advisory

DLA-1634-1 wireshark -- LTS security update

Date Reported:
15 Jan 2019
Affected Packages:
Security database references:
In Mitre's CVE dictionary: CVE-2017-7700, CVE-2017-7703, CVE-2017-7746, CVE-2017-7747, CVE-2017-9766, CVE-2017-11406, CVE-2017-11407, CVE-2017-11409, CVE-2017-13765, CVE-2017-15191, CVE-2017-17935, CVE-2017-17997, CVE-2018-7322, CVE-2018-7323, CVE-2018-7324, CVE-2018-7325, CVE-2018-7331, CVE-2018-7336, CVE-2018-7417, CVE-2018-7418, CVE-2018-7420, CVE-2018-9256, CVE-2018-9259, CVE-2018-9260, CVE-2018-9262, CVE-2018-9263, CVE-2018-9265, CVE-2018-9267, CVE-2018-9268, CVE-2018-9269, CVE-2018-9270, CVE-2018-11356, CVE-2018-11357, CVE-2018-11359, CVE-2018-16057, CVE-2018-16058, CVE-2018-19622, CVE-2018-19623, CVE-2018-19624, CVE-2018-19625, CVE-2018-19626.
More information:

Several issues in wireshark, a tool that captures and analyzes packets off the wire, have been found by different people. These are basically issues with length checks or invalid memory access in different dissectors. This could result in infinite loops or crashes by malicious packets.

For Debian 8 Jessie, these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u16.

We recommend that you upgrade your wireshark packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: