-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 26 Dec 2021 15:31:06 +0200 Source: wireshark Binary: wireshark-common wireshark wireshark-qt wireshark-gtk tshark wireshark-dev wireshark-doc libwireshark11 libwsutil9 libwsutil-dev libwscodecs2 libwireshark-data libwireshark-dev libwiretap8 libwiretap-dev Architecture: source Version: 2.6.20-0+deb9u2 Distribution: stretch-security Urgency: medium Maintainer: Balint Reczey <rbalint@ubuntu.com> Changed-By: Adrian Bunk <bunk@debian.org> Description: libwireshark-data - network packet dissection library -- data files libwireshark-dev - network packet dissection library -- development files libwireshark11 - network packet dissection library -- shared library libwiretap-dev - network packet capture library -- development files libwiretap8 - network packet capture library -- shared library libwscodecs2 - network packet dissection codecs library -- shared library libwsutil-dev - network packet dissection utilities library -- development files libwsutil9 - network packet dissection utilities library -- shared library tshark - network traffic analyzer - console version wireshark - network traffic analyzer - meta-package wireshark-common - network traffic analyzer - common files wireshark-dev - network traffic analyzer - development tools wireshark-doc - network traffic analyzer - documentation wireshark-gtk - network traffic analyzer - GTK+ version wireshark-qt - network traffic analyzer - Qt version Changes: wireshark (2.6.20-0+deb9u2) stretch-security; urgency=medium . * Non-maintainer upload by the LTS team. * CVE-2021-22207: Excessive memory consumption in the MS-WSP dissector. * CVE-2021-22235: Crash in the DNP dissector. * CVE-2021-39921: NULL pointer exception in the Modbus dissector. * CVE-2021-39922: Buffer overflow in the C12.22 dissector. * CVE-2021-39923: Large loop in the PNRP dissector. * CVE-2021-39924: Large loop in the Bluetooth DHT dissector. * CVE-2021-39928: NULL pointer exception in the IEEE 802.11 dissector. * CVE-2021-39929: Uncontrolled Recursion in the Bluetooth DHT dissector. . [ Balint Reczey ] * Fix buffer overflow in the Bluetooth SDP dissector (CVE-2021-39925) Checksums-Sha1: 0548daa0e30a0f5540a9ef4f529f4c4bf4d4baf6 3558 wireshark_2.6.20-0+deb9u2.dsc 2e4295eeba3f54134c1f37a6e931e0f4a67c0487 28805496 wireshark_2.6.20.orig.tar.xz 251bea1b3df0752c2aead50d669dda014235592c 80920 wireshark_2.6.20-0+deb9u2.debian.tar.xz Checksums-Sha256: 507a5d742ad0e9b16627df6d78fcea9e49f70c29201e3ca8a1070e7253eae5b3 3558 wireshark_2.6.20-0+deb9u2.dsc a97a5f3934ef09b93236f7dbc97a162c0348667cbc9dd68291473b8f7b276c60 28805496 wireshark_2.6.20.orig.tar.xz e4958f19c16ace9f66d9a5cd2d0882dfcc34cc04bea86ff571c05b144d7a41ec 80920 wireshark_2.6.20-0+deb9u2.debian.tar.xz Files: 9e7c2e0b74fdb5acedda51d5c2fcb565 3558 net optional wireshark_2.6.20-0+deb9u2.dsc ac4f79c6878703634797e041fd136a98 28805496 net optional wireshark_2.6.20.orig.tar.xz 8a1540d7554e787bf0ec7471e5a0347a 80920 net optional wireshark_2.6.20-0+deb9u2.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmHIg0kACgkQiNJCh6LY mLF1BBAAlu5mAcSUh30X+bLeTZhSvjSBwXpkBUrl+a4wtH0mnvu6vP8ZiKHjxtcK MsZF1m9z1rZEJ2mx91rsZQ8eqwB7sbiGrtGkaW4oR5EegXAU+6T4u2wB5nTsNjUH coytJG8uUht468+7BsBpAQ6KmroivN9pXopL4nJ342QZdhE/6+eDRSGKv7lOmJzO BQTgGOhwa5qqxJsYjTGCMq9hpEA0i9orL1mxDUjHCduA0vl65KDaw8qJkvda4oO1 9aXSJ1VhdOJUxj3fB6WH2fqD5ToWTTcVEIZR9rYxlFiBNkIGCFaU4wQDcgiVMRrd lJWah3JlnKb+yurKT7W+x7L/1skXK2aFKqwP3JSpifaprTi+JRFRhFjV0Tgoe43N WroRBLcHGNE/5SV9KD5G5XeIF8by7bGAzhVCqLT70+8rIHQ1oV2BJQwnlLEHgL+v G2eH4GLyqivDcUqQEkW16jSmxTgKD63yTmzh6ftQglTsbjCM6Wq4txfq6XFlj8Bh fPsW8zgt6kDeRpUfHbBj9R1S5ePEDGC+TnhXc4U3SGvHE4eFIMmdV3ikhvSGRiqw boU3fjqtykEgFz59BbYA5/uH+tSiP46nV/iVt4MO6lFJFe6SmSjWVGpKX421zwWz RSuvh5+GYg+Hw95aP23Rzwh2jKNepT1UCS6+Lixy3pKnY3oajTI= =xO8U -----END PGP SIGNATURE-----