Debian Package Tracker
Register | Log in
Subscribe

wireshark

network traffic analyzer - graphical interface

Choose email to subscribe with

general
  • source: wireshark (main)
  • version: 4.6.5-1
  • maintainer: Debian Security Tools (DMD)
  • uploaders: Balint Reczey [DMD]
  • arch: all any
  • std-ver: 4.6.0.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.4.10-0+deb11u1
  • o-o-sec: 3.4.16-0+deb11u2
  • oldstable: 4.0.17-0+deb12u1
  • old-sec: 4.0.11-1~deb12u1
  • old-p-u: 4.0.17-0+deb12u2
  • stable: 4.4.14-0+deb13u1
  • stable-sec: 4.4.13-0+deb13u1
  • testing: 4.6.4-1
  • unstable: 4.6.5-1
versioned links
  • 3.4.10-0+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.4.16-0+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.6-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.11-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.17-0+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.17-0+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.4.13-0+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.4.14-0+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.6.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.6.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libwireshark-data (1 bugs: 0, 0, 1, 0)
  • libwireshark-dev
  • libwireshark19
  • libwiretap-dev
  • libwiretap16
  • libwsutil-dev
  • libwsutil17
  • stratoshark (1 bugs: 0, 1, 0, 0)
  • tshark (8 bugs: 0, 3, 5, 0)
  • wireshark (32 bugs: 0, 11, 21, 0)
  • wireshark-common (1 bugs: 0, 1, 0, 0)
  • wireshark-dev
  • wireshark-doc
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:01:01
    Last run: 2026-04-21T23:20:45.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:01:14
    Last run: 2026-01-31T13:34:40.000Z
    Previous status: unknown

  • stable: pass (log)
    The tests ran in 0:01:08
    Last run: 2025-11-09T13:41:34.000Z
    Previous status: unknown

Created: 2026-04-22 Last update: 2026-05-04 22:04
37 security issues in trixie high

There are 37 open security issues in trixie.

4 important issues:
  • CVE-2026-5405: RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5653: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6529: iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6530: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
33 issues left for the package maintainer to handle:
  • CVE-2026-5299: (needs triaging) ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5401: (needs triaging) AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5403: (needs triaging) SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5404: (needs triaging) K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5406: (needs triaging) FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5407: (needs triaging) SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5408: (needs triaging) BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5409: (needs triaging) Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5654: (needs triaging) AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5656: (needs triaging) Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5657: (needs triaging) iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6519: (needs triaging) MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6520: (needs triaging) OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6521: (needs triaging) OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6522: (needs triaging) RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6523: (needs triaging) GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6524: (needs triaging) MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6527: (needs triaging) ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6531: (needs triaging) SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6532: (needs triaging) Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6533: (needs triaging) Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6534: (needs triaging) USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6535: (needs triaging) Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6537: (needs triaging) ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6538: (needs triaging) BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6867: (needs triaging) SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6868: (needs triaging) HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6869: (needs triaging) WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6870: (needs triaging) GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7375: (needs triaging) UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7376: (needs triaging) Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7378: (needs triaging) Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7379: (needs triaging) Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-04-30 Last update: 2026-05-04 06:17
43 security issues in forky high

There are 43 open security issues in forky.

43 important issues:
  • CVE-2026-5299: ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5401: AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5402: TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution
  • CVE-2026-5403: SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5404: K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5405: RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5406: FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5407: SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5408: BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5409: Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5653: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5654: AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5655: SDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-5656: Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5657: iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6519: MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6520: OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6521: OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6522: RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6523: GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6524: MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6525: IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6526: RTSP protocol dissector crash in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6527: ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6528: TLS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-6529: iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6530: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6531: SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6532: Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6533: Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6534: USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6535: Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6536: DLMS/COSEM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6537: ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6538: BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6867: SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6868: HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6869: WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6870: GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7375: UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7376: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7378: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7379: Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Created: 2026-04-30 Last update: 2026-05-04 06:17
43 security issues in bullseye high

There are 43 open security issues in bullseye.

42 important issues:
  • CVE-2026-5299: ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5401: AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5402: TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution
  • CVE-2026-5403: SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5404: K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5405: RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5406: FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5407: SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5408: BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5409: Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5653: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5654: AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5655: SDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-5656: Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5657: iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6519: MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6520: OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6521: OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6522: RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6523: GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6524: MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6526: RTSP protocol dissector crash in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6527: ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6528: TLS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-6529: iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6530: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6531: SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6532: Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6533: Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6534: USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6535: Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6536: DLMS/COSEM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6537: ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6538: BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6867: SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6868: HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6869: WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6870: GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7375: UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7376: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7378: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7379: Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
1 issue postponed or untriaged:
  • CVE-2026-3203: (postponed; to be fixed through a stable update) RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service
Created: 2026-04-30 Last update: 2026-05-04 06:17
39 security issues in bookworm high

There are 39 open security issues in bookworm.

4 important issues:
  • CVE-2026-5405: RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5653: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6529: iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6530: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
35 issues left for the package maintainer to handle:
  • CVE-2026-3201: (needs triaging) USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service
  • CVE-2026-3203: (needs triaging) RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service
  • CVE-2026-5299: (needs triaging) ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5401: (needs triaging) AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5403: (needs triaging) SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5404: (needs triaging) K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5406: (needs triaging) FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5407: (needs triaging) SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5408: (needs triaging) BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5409: (needs triaging) Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5654: (needs triaging) AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5656: (needs triaging) Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5657: (needs triaging) iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6519: (needs triaging) MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6520: (needs triaging) OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6521: (needs triaging) OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6522: (needs triaging) RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6523: (needs triaging) GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6524: (needs triaging) MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6527: (needs triaging) ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6531: (needs triaging) SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6532: (needs triaging) Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6533: (needs triaging) Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6534: (needs triaging) USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6535: (needs triaging) Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6537: (needs triaging) ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6538: (needs triaging) BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6867: (needs triaging) SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6868: (needs triaging) HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6869: (needs triaging) WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6870: (needs triaging) GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7375: (needs triaging) UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7376: (needs triaging) Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7378: (needs triaging) Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7379: (needs triaging) Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

You can find information about how to handle these issues in the security team's documentation.

10 issues that should be fixed with the next stable update:
  • CVE-2024-9781: AppleTalk and RELOAD Framing dissector crash in Wireshark 4.4.0 and 4.2.0 to 4.2.7 allows denial of service via packet injection or crafted capture file
  • CVE-2025-1492: Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file
  • CVE-2025-5601: Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file
  • CVE-2025-9817: SSH dissector crash in Wireshark 4.4.0 to 4.4.8 allows denial of service
  • CVE-2026-0960: HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2 allows denial of service
  • CVE-2024-11596: ECMP dissector crash in Wireshark 4.4.0 to 4.4.1 and 4.2.0 to 4.2.8 allows denial of service via packet injection or crafted capture file
  • CVE-2025-11626: MONGO dissector infinite loop in Wireshark 4.4.0 to 4.4.9 and 4.2.0 to 4.2.13 allows denial of service
  • CVE-2025-13499: Kafka dissector crash in Wireshark 4.6.0 and 4.4.0 to 4.4.10 allows denial of service
  • CVE-2025-13945: HTTP3 dissector crash in Wireshark 4.6.0 and 4.6.1 allows denial of service
  • CVE-2025-13946: MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service
Created: 2026-02-26 Last update: 2026-05-04 06:17
Depends on packages which need a new maintainer normal
The packages that wireshark depends on which need a new maintainer are:
  • esnacc (#1004270)
    • Depends: esnacc
  • speexdsp (#1093634)
    • Depends: libspeexdsp1 libspeexdsp1
    • Build-Depends: libspeexdsp-dev
  • docbook-xml (#802368)
    • Build-Depends: docbook-xml
  • docbook-xsl (#802370)
    • Build-Depends: docbook-xsl
Created: 2022-01-20 Last update: 2026-05-04 22:01
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2026-04-06 Last update: 2026-05-04 22:00
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-05-03 Last update: 2026-05-03 05:01
1 open merge request in Salsa normal
There is 1 open merge request for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2026-02-07 05:32
AppStream hints: 3 warnings for stratoshark,wireshark normal
AppStream found metadata issues for packages:
  • stratoshark: 3 warnings
You should get rid of them to provide more metadata about this software.
Created: 2025-10-14 Last update: 2025-10-14 09:01
debian/patches: 2 patches to forward upstream low

Among the 2 debian patches available in version 4.6.5-1 of the package, we noticed the following issues:

  • 2 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-05-03 00:00
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2020-02-26 Last update: 2026-01-17 11:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.6.0.1).
Created: 2022-05-11 Last update: 2026-05-02 18:18
testing migrations
  • excuses:
    • Migration status for wireshark (4.6.4-1 to 4.6.5-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for forensics-extra/2.61: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libvirt/12.2.0-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for mimic/0.7.0+ds-2: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, ppc64el: No tests, superficial or marked flaky ♻, riscv64: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for termshark/2.4.0-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for wifite/2.8.2-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for wireshark/4.6.5-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for xdp-tools/1.6.3-1: amd64: Pass, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, ppc64el: No tests, superficial or marked flaky ♻, riscv64: Test triggered, s390x: Test triggered
    • ∙ ∙ Too young, only 3 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Updating wireshark will fix bugs in testing: #1135323
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/w/wireshark.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproduced on arm64
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproducibility check waiting for results on ppc64el
    • Not considered
news
[rss feed]
  • [2026-05-02] Accepted wireshark 4.0.17-0+deb12u2 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Jochen Sprickerhof)
  • [2026-05-02] Accepted wireshark 4.6.5-1 (source) into unstable (Balint Reczey)
  • [2026-03-03] Accepted wireshark 4.4.14-0+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Adrian Bunk)
  • [2026-03-02] wireshark 4.6.4-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-28] Accepted wireshark 4.6.4-1 (source) into unstable (Balint Reczey)
  • [2026-02-19] Accepted wireshark 4.4.13-0+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Carlos Henrique Lima Melara)
  • [2026-02-16] Accepted wireshark 3.4.16-0+deb11u2 (source) into oldoldstable-security (Jochen Sprickerhof)
  • [2026-02-08] Accepted wireshark 4.4.13-0+deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Carlos Henrique Lima Melara)
  • [2026-01-20] wireshark 4.6.3-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-16] Accepted wireshark 4.6.3-1 (source) into unstable (Balint Reczey)
  • [2025-12-08] wireshark 4.6.2-3 MIGRATED to testing (Debian testing watch)
  • [2025-12-05] Accepted wireshark 4.6.2-3 (source) into unstable (Balint Reczey)
  • [2025-12-05] Accepted wireshark 4.6.2-1 (source) into unstable (Balint Reczey)
  • [2025-11-24] wireshark 4.6.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-11-22] Accepted wireshark 4.6.1-2 (source) into unstable (Balint Reczey)
  • [2025-11-21] Accepted wireshark 4.6.1-1 (source) into unstable (Balint Reczey)
  • [2025-10-28] wireshark 4.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-13] Accepted wireshark 4.6.0-1 (source) into unstable (Balint Reczey)
  • [2025-10-10] Accepted wireshark 4.6.0-0exp1 (source) into experimental (Balint Reczey)
  • [2025-09-27] Accepted wireshark 4.6.0~rc1-0exp2 (source all amd64) into experimental (Debian FTP Masters) (signed by: Balint Reczey)
  • [2025-09-21] Accepted wireshark 4.6.0~rc1-0exp1 (source all amd64) into experimental (Debian FTP Masters) (signed by: Balint Reczey)
  • [2025-09-03] wireshark 4.4.9-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-31] Accepted wireshark 4.4.9-1 (source) into unstable (Balint Reczey)
  • [2025-07-17] Accepted wireshark 4.4.8-0exp1 (source) into experimental (Balint Reczey)
  • [2025-06-16] wireshark 4.4.7-1 MIGRATED to testing (Debian testing watch)
  • [2025-06-10] Accepted wireshark 4.4.7-1 (source) into unstable (Balint Reczey)
  • [2025-06-05] Accepted wireshark 4.4.7-0exp1 (source) into experimental (Balint Reczey)
  • [2025-04-29] wireshark 4.4.6-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-17] Accepted wireshark 4.4.6-2 (source) into unstable (Balint Reczey)
  • [2025-04-17] Accepted wireshark 4.4.6-1 (source) into unstable (Balint Reczey)
  • 1
  • 2
bugs [bug history graph]
  • all: 44
  • RC: 0
  • I&N: 16
  • M&W: 28
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • screenshots
  • l10n (68, -)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.6.4-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing