Debian Package Tracker
Register | Log in
Subscribe

wireshark

network traffic analyzer - meta-package

Choose email to subscribe with

general
  • source: wireshark (main)
  • version: 4.0.10-1
  • maintainer: Balint Reczey (DMD)
  • arch: all any
  • std-ver: 4.6.0.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.6.20-0+deb10u4
  • o-o-sec: 2.6.20-0+deb10u7
  • oldstable: 3.4.10-0+deb11u1
  • old-sec: 3.4.10-0+deb11u1
  • stable: 4.0.6-1~deb12u1
  • stable-sec: 4.0.6-1~deb12u1
  • testing: 4.0.8-1
  • unstable: 4.0.10-1
versioned links
  • 2.6.20-0+deb10u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.6.20-0+deb10u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.4.10-0+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.6-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.8-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.10-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libwireshark-data
  • libwireshark-dev
  • libwireshark16
  • libwiretap-dev
  • libwiretap13
  • libwsutil-dev
  • libwsutil14
  • tshark (8 bugs: 0, 3, 5, 0)
  • wireshark (31 bugs: 0, 11, 20, 0)
  • wireshark-common (1 bugs: 0, 1, 0, 0)
  • wireshark-dev
  • wireshark-doc
  • wireshark-qt (1 bugs: 0, 1, 0, 0)
action needed
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2023-5371: RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file
Created: 2023-10-04 Last update: 2023-10-06 23:33
7 security issues in buster high

There are 7 open security issues in buster.

1 important issue:
  • CVE-2023-5371: RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file
6 issues postponed or untriaged:
  • CVE-2023-0667: (needs triaging) Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
  • CVE-2023-2906: (needs triaging) Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.
  • CVE-2023-3649: (needs triaging) iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
  • CVE-2023-4511: (needs triaging) BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file
  • CVE-2023-4512: (needs triaging) CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
  • CVE-2023-4513: (needs triaging) BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file
Created: 2023-10-04 Last update: 2023-10-06 23:33
40 security issues in bullseye high

There are 40 open security issues in bullseye.

1 important issue:
  • CVE-2023-5371: RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file
39 issues left for the package maintainer to handle:
  • CVE-2021-4181: (needs triaging) Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
  • CVE-2021-4182: (needs triaging) Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
  • CVE-2021-4183: (needs triaging) Crash in the pcapng file parser in Wireshark 3.6.0 allows denial of service via crafted capture file
  • CVE-2021-4184: (needs triaging) Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
  • CVE-2021-4185: (needs triaging) Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
  • CVE-2021-4186: (needs triaging) Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
  • CVE-2021-4190: (needs triaging) Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file
  • CVE-2022-0581: (needs triaging) Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
  • CVE-2022-0582: (needs triaging) Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
  • CVE-2022-0583: (needs triaging) Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
  • CVE-2022-0585: (needs triaging) Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file
  • CVE-2022-0586: (needs triaging) Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
  • CVE-2022-3190: (needs triaging) Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file
  • CVE-2022-4344: (needs triaging) Memory exhaustion in the Kafka protocol dissector in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file
  • CVE-2022-4345: (needs triaging) Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file
  • CVE-2023-0411: (needs triaging) Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
  • CVE-2023-0412: (needs triaging) TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
  • CVE-2023-0413: (needs triaging) Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
  • CVE-2023-0414: (needs triaging) Crash in the EAP dissector in Wireshark 4.0.0 to 4.0.2 allows denial of service via packet injection or crafted capture file
  • CVE-2023-0415: (needs triaging) iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
  • CVE-2023-0416: (needs triaging) GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
  • CVE-2023-0417: (needs triaging) Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
  • CVE-2023-0666: (needs triaging) Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
  • CVE-2023-0667: (needs triaging) Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
  • CVE-2023-0668: (needs triaging) Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
  • CVE-2023-1161: (needs triaging) ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file
  • CVE-2023-1992: (needs triaging) RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
  • CVE-2023-1993: (needs triaging) LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
  • CVE-2023-1994: (needs triaging) GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
  • CVE-2023-2855: (needs triaging) Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
  • CVE-2023-2856: (needs triaging) VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
  • CVE-2023-2858: (needs triaging) NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
  • CVE-2023-2879: (needs triaging) GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
  • CVE-2023-2906: (needs triaging) Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.
  • CVE-2023-2952: (needs triaging) XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
  • CVE-2023-3649: (needs triaging) iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
  • CVE-2023-4511: (needs triaging) BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file
  • CVE-2023-4512: (needs triaging) CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
  • CVE-2023-4513: (needs triaging) BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-07-04 Last update: 2023-10-06 23:33
7 security issues in bookworm high

There are 7 open security issues in bookworm.

1 important issue:
  • CVE-2023-5371: RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file
6 issues left for the package maintainer to handle:
  • CVE-2023-2906: (needs triaging) Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.
  • CVE-2023-3648: (needs triaging) Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file
  • CVE-2023-3649: (needs triaging) iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
  • CVE-2023-4511: (needs triaging) BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file
  • CVE-2023-4512: (needs triaging) CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
  • CVE-2023-4513: (needs triaging) BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-07-14 Last update: 2023-10-06 23:33
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2023-09-13 Last update: 2023-10-08 02:35
Depends on packages which need a new maintainer normal
The packages that wireshark depends on which need a new maintainer are:
  • snacc (#1004110)
    • Depends: snacc
  • docbook-xml (#802368)
    • Build-Depends: docbook-xml
  • docbook-xsl (#802370)
    • Build-Depends: docbook-xsl
Created: 2022-01-20 Last update: 2023-10-08 02:22
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2023-09-06 Last update: 2023-10-07 22:02
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2023-10-07 Last update: 2023-10-07 05:36
AppStream hints: 1 warning normal
AppStream found metadata issues for packages:
  • wireshark-qt: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2020-06-01 01:13
debian/patches: 2 patches to forward upstream low

Among the 2 debian patches available in version 4.0.10-1 of the package, we noticed the following issues:

  • 2 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-10-07 00:10
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2020-02-26 Last update: 2023-06-16 13:11
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2023-06-15 Last update: 2023-06-15 03:07
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.6.0.1).
Created: 2022-05-11 Last update: 2023-10-06 19:14
testing migrations
  • excuses:
    • Migration status for wireshark (4.0.8-1 to 4.0.10-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ autopkgtest for forensics-extra/2.49: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Test in progress, s390x: Pass
    • ∙ ∙ autopkgtest for libvirt/9.7.0-1: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Test in progress, s390x: Pass
    • ∙ ∙ autopkgtest for termshark/2.4.0-1: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Test in progress, s390x: Pass
    • ∙ ∙ autopkgtest for wireshark/4.0.10-1: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Test in progress, s390x: Pass
    • ∙ ∙ autopkgtest for xdp-tools/1.4.0-1: amd64: No test results ♻ (reference ♻), arm64: No test results ♻ (reference ♻), armel: No test results ♻ (reference ♻), armhf: No test results ♻ (reference ♻), i386: No test results ♻ (reference ♻), ppc64el: Test in progress, s390x: No test results ♻ (reference ♻)
    • ∙ ∙ Too young, only 2 of 5 days old
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/w/wireshark.html
    • Not considered
news
[rss feed]
  • [2023-10-06] Accepted wireshark 4.0.10-1 (source) into unstable (Balint Reczey)
  • [2023-08-27] wireshark 4.0.8-1 MIGRATED to testing (Debian testing watch)
  • [2023-08-24] Accepted wireshark 4.0.8-1 (source) into unstable (Balint Reczey)
  • [2023-07-18] wireshark 4.0.7-1 MIGRATED to testing (Debian testing watch)
  • [2023-07-14] Accepted wireshark 4.0.7-1 (source) into unstable (Balint Reczey)
  • [2023-06-22] wireshark 4.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-22] wireshark 4.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-16] Accepted wireshark 4.0.6-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Balint Reczey)
  • [2023-06-15] Accepted wireshark 4.0.6-1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Balint Reczey)
  • [2023-06-14] Accepted wireshark 4.0.6-1 (source) into unstable (Balint Reczey)
  • [2023-06-03] Accepted wireshark 2.6.20-0+deb10u7 (source) into oldstable (Adrian Bunk)
  • [2023-05-26] Accepted wireshark 4.0.6-1~exp1 (source) into experimental (Balint Reczey)
  • [2023-04-29] Accepted wireshark 2.6.20-0+deb10u6 (source) into oldstable (Adrian Bunk)
  • [2023-04-24] Accepted wireshark 4.0.5-1~exp1 (source) into experimental (Balint Reczey)
  • [2023-02-08] Accepted wireshark 2.6.20-0+deb10u5 (source) into oldstable (Tobias Frost)
  • [2023-01-23] wireshark 4.0.3-1 MIGRATED to testing (Debian testing watch)
  • [2023-01-20] Accepted wireshark 4.0.3-1 (source) into unstable (Balint Reczey)
  • [2022-12-13] wireshark 4.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-10] Accepted wireshark 4.0.2-1 (source) into unstable (Balint Reczey)
  • [2022-10-31] wireshark 4.0.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-28] Accepted wireshark 4.0.1-1 (source) into unstable (Balint Reczey)
  • [2022-10-11] wireshark 4.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-09] Accepted wireshark 4.0.0-1 (source) into unstable (Balint Reczey)
  • [2022-10-08] Accepted wireshark 4.0.0-1~exp0 (source all amd64) into experimental (Debian FTP Masters) (signed by: Balint Reczey)
  • [2022-09-13] wireshark 3.6.8-1 MIGRATED to testing (Debian testing watch)
  • [2022-09-10] Accepted wireshark 3.6.8-1 (source) into unstable (Balint Reczey)
  • [2022-07-31] wireshark 3.6.7-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-28] Accepted wireshark 3.6.7-1 (source) into unstable (Balint Reczey)
  • [2022-07-17] Accepted wireshark 2.6.20-0+deb10u4 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2022-07-04] wireshark 3.6.6-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 45
  • RC: 0
  • I&N: 16
  • M&W: 29
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (44, 43)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.0.8-1
  • 24 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing