Debian Package Tracker
Register | Log in
Subscribe

wireshark

network traffic analyzer - graphical interface

Choose email to subscribe with

general
  • source: wireshark (main)
  • version: 4.6.4-1
  • maintainer: Debian Security Tools (DMD)
  • uploaders: Balint Reczey [DMD]
  • arch: all any
  • std-ver: 4.6.0.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.4.10-0+deb11u1
  • o-o-sec: 3.4.16-0+deb11u2
  • oldstable: 4.0.17-0+deb12u1
  • old-sec: 4.0.11-1~deb12u1
  • stable: 4.4.14-0+deb13u1
  • stable-sec: 4.4.13-0+deb13u1
  • testing: 4.6.4-1
  • unstable: 4.6.4-1
versioned links
  • 3.4.10-0+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.4.16-0+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.6-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.11-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.0.17-0+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.4.13-0+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.4.14-0+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.6.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libwireshark-data (1 bugs: 0, 0, 1, 0)
  • libwireshark-dev
  • libwireshark19
  • libwiretap-dev
  • libwiretap16
  • libwsutil-dev
  • libwsutil17
  • stratoshark (1 bugs: 0, 1, 0, 0)
  • tshark (8 bugs: 0, 3, 5, 0)
  • wireshark (32 bugs: 0, 11, 21, 0)
  • wireshark-common (1 bugs: 0, 1, 0, 0)
  • wireshark-dev
  • wireshark-doc
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:01:01
    Last run: 2026-04-21T23:20:45.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:01:14
    Last run: 2026-01-31T13:34:40.000Z
    Previous status: unknown

  • stable: pass (log)
    The tests ran in 0:01:08
    Last run: 2025-11-09T13:41:34.000Z
    Previous status: unknown

Created: 2026-04-22 Last update: 2026-05-01 17:06
37 security issues in trixie high

There are 37 open security issues in trixie.

4 important issues:
  • CVE-2026-5405: RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5653: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6529: iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6530: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
33 issues left for the package maintainer to handle:
  • CVE-2026-5299: (needs triaging) ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5401: (needs triaging) AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5403: (needs triaging) SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5404: (needs triaging) K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5406: (needs triaging) FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5407: (needs triaging) SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5408: (needs triaging) BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5409: (needs triaging) Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5654: (needs triaging) AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5656: (needs triaging) Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5657: (needs triaging) iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6519: (needs triaging) MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6520: (needs triaging) OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6521: (needs triaging) OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6522: (needs triaging) RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6523: (needs triaging) GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6524: (needs triaging) MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6527: (needs triaging) ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6531: (needs triaging) SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6532: (needs triaging) Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6533: (needs triaging) Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6534: (needs triaging) USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6535: (needs triaging) Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6537: (needs triaging) ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6538: (needs triaging) BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6867: (needs triaging) SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6868: (needs triaging) HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6869: (needs triaging) WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6870: (needs triaging) GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7375: (needs triaging) UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7376: (needs triaging) Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7378: (needs triaging) Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7379: (needs triaging) Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-04-30 Last update: 2026-05-01 13:30
42 security issues in sid high

There are 42 open security issues in sid.

42 important issues:
  • CVE-2026-5299: ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5401: AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5402: TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution
  • CVE-2026-5403: SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5404: K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5405: RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5406: FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5407: SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5408: BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5409: Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5653: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5654: AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5655: SDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-5656: Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5657: iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6519: MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6520: OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6521: OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6522: RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6523: GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6524: MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6526: RTSP protocol dissector crash in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6527: ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6528: TLS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-6529: iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6530: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6531: SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6532: Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6533: Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6534: USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6535: Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6536: DLMS/COSEM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6537: ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6538: BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6867: SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6868: HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6869: WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6870: GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7375: UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7376: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7378: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7379: Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Created: 2026-04-30 Last update: 2026-05-01 13:30
42 security issues in forky high

There are 42 open security issues in forky.

42 important issues:
  • CVE-2026-5299: ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5401: AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5402: TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution
  • CVE-2026-5403: SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5404: K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5405: RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5406: FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5407: SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5408: BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5409: Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5653: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5654: AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5655: SDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-5656: Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5657: iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6519: MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6520: OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6521: OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6522: RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6523: GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6524: MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6526: RTSP protocol dissector crash in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6527: ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6528: TLS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-6529: iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6530: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6531: SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6532: Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6533: Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6534: USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6535: Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6536: DLMS/COSEM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6537: ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6538: BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6867: SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6868: HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6869: WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6870: GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7375: UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7376: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7378: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7379: Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Created: 2026-04-30 Last update: 2026-05-01 13:30
43 security issues in bullseye high

There are 43 open security issues in bullseye.

42 important issues:
  • CVE-2026-5299: ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5401: AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5402: TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution
  • CVE-2026-5403: SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5404: K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5405: RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5406: FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5407: SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5408: BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5409: Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5653: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5654: AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5655: SDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-5656: Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5657: iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6519: MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6520: OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6521: OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6522: RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6523: GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6524: MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6526: RTSP protocol dissector crash in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6527: ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6528: TLS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 allows denial of service
  • CVE-2026-6529: iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6530: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6531: SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6532: Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6533: Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6534: USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6535: Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6536: DLMS/COSEM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4
  • CVE-2026-6537: ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6538: BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6867: SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6868: HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6869: WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6870: GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7375: UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7376: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7378: Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7379: Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
1 issue postponed or untriaged:
  • CVE-2026-3203: (postponed; to be fixed through a stable update) RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service
Created: 2026-04-30 Last update: 2026-05-01 13:30
39 security issues in bookworm high

There are 39 open security issues in bookworm.

4 important issues:
  • CVE-2026-5405: RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5653: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6529: iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6530: DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
35 issues left for the package maintainer to handle:
  • CVE-2026-3201: (needs triaging) USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service
  • CVE-2026-3203: (needs triaging) RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service
  • CVE-2026-5299: (needs triaging) ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5401: (needs triaging) AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5403: (needs triaging) SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5404: (needs triaging) K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5406: (needs triaging) FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5407: (needs triaging) SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5408: (needs triaging) BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5409: (needs triaging) Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5654: (needs triaging) AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-5656: (needs triaging) Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
  • CVE-2026-5657: (needs triaging) iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6519: (needs triaging) MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6520: (needs triaging) OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6521: (needs triaging) OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6522: (needs triaging) RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6523: (needs triaging) GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6524: (needs triaging) MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6527: (needs triaging) ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6531: (needs triaging) SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6532: (needs triaging) Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6533: (needs triaging) Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6534: (needs triaging) USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6535: (needs triaging) Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6537: (needs triaging) ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6538: (needs triaging) BEEP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6867: (needs triaging) SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6868: (needs triaging) HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6869: (needs triaging) WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-6870: (needs triaging) GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7375: (needs triaging) UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7376: (needs triaging) Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7378: (needs triaging) Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
  • CVE-2026-7379: (needs triaging) Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

You can find information about how to handle these issues in the security team's documentation.

10 issues that should be fixed with the next stable update:
  • CVE-2024-9781: AppleTalk and RELOAD Framing dissector crash in Wireshark 4.4.0 and 4.2.0 to 4.2.7 allows denial of service via packet injection or crafted capture file
  • CVE-2025-1492: Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file
  • CVE-2025-5601: Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file
  • CVE-2025-9817: SSH dissector crash in Wireshark 4.4.0 to 4.4.8 allows denial of service
  • CVE-2026-0960: HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2 allows denial of service
  • CVE-2024-11596: ECMP dissector crash in Wireshark 4.4.0 to 4.4.1 and 4.2.0 to 4.2.8 allows denial of service via packet injection or crafted capture file
  • CVE-2025-11626: MONGO dissector infinite loop in Wireshark 4.4.0 to 4.4.9 and 4.2.0 to 4.2.13 allows denial of service
  • CVE-2025-13499: Kafka dissector crash in Wireshark 4.6.0 and 4.4.0 to 4.4.10 allows denial of service
  • CVE-2025-13945: HTTP3 dissector crash in Wireshark 4.6.0 and 4.6.1 allows denial of service
  • CVE-2025-13946: MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service
Created: 2026-02-26 Last update: 2026-05-01 13:30
Multiarch hinter reports 2 issue(s) normal
There are issues with the multiarch metadata for this package.
  • libwiretap-dev could be marked Multi-Arch: same
  • libwsutil-dev could be marked Multi-Arch: same
Created: 2026-03-01 Last update: 2026-05-01 17:06
Depends on packages which need a new maintainer normal
The packages that wireshark depends on which need a new maintainer are:
  • esnacc (#1004270)
    • Depends: esnacc
  • speexdsp (#1093634)
    • Depends: libspeexdsp1 libspeexdsp1
    • Build-Depends: libspeexdsp-dev
  • docbook-xml (#802368)
    • Build-Depends: docbook-xml
  • docbook-xsl (#802370)
    • Build-Depends: docbook-xsl
Created: 2022-01-20 Last update: 2026-05-01 17:06
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2026-04-06 Last update: 2026-05-01 17:00
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 4.6.5-1, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit b175200329eaa73128c216b8ec24faf8d61bb020
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Apr 30 22:05:41 2026 +0200

    Update changelog

commit 2a69a12a9341169fb4ec7850eb5cef3b93bff83c
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Apr 30 22:05:17 2026 +0200

    Update symbols

commit e43e081801b95ce3f3bad709a74759566268008c
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Apr 30 16:30:15 2026 +0200

    Update changelog

commit ac0d0c5186a63c305219a26d8c818628a6617800
Merge: 90f02448 4aecfe5f
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Apr 30 16:21:31 2026 +0200

    Update upstream source from tag 'upstream/4.6.5'
    
    Update to upstream version '4.6.5'
    with Debian dir d795c23cc115d048cea5790ffcc0a2978997e5f0

commit 90f0244823d12fbd0e2142e563653ebedf65bf60
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Sat Feb 28 10:18:53 2026 +0100

    Update changelog

commit ce0c7bd44aea3682393dcb5cedeb9fa5ed786440
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Sat Feb 28 00:50:25 2026 +0100

    wireshark-common: Ship the sshdig manpage

commit 8ca0c61325b8263a06fb3356073abf8eab01f17e
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Feb 27 19:22:20 2026 +0100

    Update changelog

commit 33783f4528e48d13cd8e2250eb5bc33eacd745ea
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Feb 27 19:15:40 2026 +0100

    debian/rules: Sync Stratoshark's versioning with upstream

commit 20f7fc5f2cabb6226dd4a83c824034961dca0e70
Merge: 31e7b696 a88fa8d6
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Feb 27 19:02:19 2026 +0100

    Update upstream source from tag 'upstream/4.6.4'
    
    Update to upstream version '4.6.4'
    with Debian dir e373517d8eda36498b036a2c4dcf032629ae1503

commit 31e7b69649cf45b77c651de7d64c49d97cf03ade
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Wed Jan 21 08:28:01 2026 +0100

    stratoshark: Don't recommend libqt6multimedia6
    
    Wireshark needs it for the RTP player which is not present in Stratoshark.

commit 229e0f112cea2e2946b58953c429cfa4ecb2f824
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Jan 16 12:30:15 2026 +0100

    debian/rules: Set appended .0.unofficial version only once
    
    Gbp-Dch: Ignore

commit d9ee1e00d982a13f6d760d78c788fc8d651f339e
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Jan 16 12:27:02 2026 +0100

    Update changelog

commit c06c443b28206dea2b648e907fcde3d8eb171462
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 20:49:14 2026 +0100

    Update changelog

commit 46132a7f1a2e102331cdf1c342ccfb9ac8547bb0
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 20:47:45 2026 +0100

    Delete accidentally kept debian/po/zh_*.po.po files
    
    Follow up for commit fdfc302a113b69f9fd3408f66da002d545d42d4a.
    
    Gbp-Dch: Ignore

commit 8ff618df08202f19593761bfd8d4ff4b0e595a9c
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 20:46:08 2026 +0100

    Stop overriding obsolete library-not-linked-against-libc Lintian error

commit 194c8e4c7f7c54b0d4df70b7ac9ea6ac572a139d
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 17:53:33 2026 +0100

    stratoshark: Append .0.unofficial to the package upstream version, too
    
    Gbp-Dch: Ignore

commit a49c1f8838513723d062bbf58f193b7b77d0ded6
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 16:22:42 2026 +0100

    Fix appending .0.unofficial to Stratoshark's version
    
    Gbp-Dch: Ignore

commit afcad87f06128f397b80956604fe9821054c3ecb
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 15:34:47 2026 +0100

    Update changelog

commit fdfc302a113b69f9fd3408f66da002d545d42d4a
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 15:34:01 2026 +0100

    Fix Chinese translation file names
    
    Gbp-Dch: Ignore

commit 7d8d0dbe9319204f0d810a3f1fdc25e15483236c
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 15:28:04 2026 +0100

    Drop ABI fixing patch integrated upstream

commit 38aacdb781467211309e913c04878df194840666
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 15:26:31 2026 +0100

    Update changelog

commit 6b43d0ad285d4972704c27f6f38bdd4a4b39f8d1
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 14:56:02 2026 +0100

    stratoshark: Append .0.unofficial to upstream version, because upstream did not bump it

commit 4eca29a605215f8833d46034ab6e8616eedce4bd
Merge: f00a1586 e873e032
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Jan 15 14:29:26 2026 +0100

    Update upstream source from tag 'upstream/4.6.3'
    
    Update to upstream version '4.6.3'
    with Debian dir 495be8334161ae0b3551cc2a14ad2d9fb80e059a

commit f00a15868a6d41d3a8b94da9e77b9e7b1f8a0669
Author: Yangfl <mmyangfl@gmail.com>
Date:   Sun Jan 4 09:16:24 2026 +0100

    Chinese debconf templates translations
    
    Closes: #1124413

commit 858abff8e0e9c80131955868940c6e850c2262d9
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Mon Dec 15 13:14:54 2025 +0100

    Update changelog

commit a8176c02f427e5be06f92742851eba6df09e6eb3
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Mon Dec 15 13:12:56 2025 +0100

    Move maintenance under the Debian Security Tools Team

commit bac322ddc805e0ea31f6684003b9c1364af27569
Author: Jenny <jennysgig@proton.me>
Date:   Sat Dec 13 12:36:10 2025 +0100

    Update Italian debconf template translation
    
    Closes: #1108500

commit 4ebe9e48f4413a1fc369bd7749408a5570d7aaad
Author: Jonathan Bustillos <jathan@debian.org>
Date:   Sat Dec 13 12:32:50 2025 +0100

    Update Spanish translation of the debconf template
    
    Closes: #1092296

commit db4e8f8af9831babd7eede91adc9d0dac640491a
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Dec 5 20:02:53 2025 +0100

    Update changelog

commit 949701f176c8e595591d7fe6daf889aabb9557a0
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Dec 5 18:15:25 2025 +0100

    Update changelog

commit 92f10dc6579771750e8573fba30c271fed8a7ccc
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Dec 5 16:20:05 2025 +0100

    Update changelog

commit b408207b9fdcaa68bef6f2fa4fa8e144cd63b559
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Fri Dec 5 12:56:57 2025 +0100

    Cheery-pick upstream commit to revert ABI breakage
    
    ws_base32_decode() is turned to a stub always returning error (-1).

commit 381d119988dd261188fa2a7327ce6b5b80ee599c
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Dec 4 13:26:52 2025 +0100

    reopen the changelog

commit 9ff52bff316a380adb534326e0d8d6ec628b3eaf
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Dec 4 09:24:21 2025 +0100

    Update changelog

commit ce2efd6ed39819c2ffba473781e3213d6422700c
Merge: 7fbbcf8c ee6e604c
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Dec 4 09:37:15 2025 +0100

    Update upstream source from tag 'upstream/4.6.2'
    
    Update to upstream version '4.6.2'
    with Debian dir d53dd6a58e147fff075b8e85b696f38231e107ee

commit 7fbbcf8c8e25e386087f01c5ade2db9a77a9564a
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Sat Nov 22 13:22:21 2025 +0100

    Update changelog

commit e4d58ef395e65052ae0f5f9fa3898f51c8592b47
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Nov 20 15:13:15 2025 +0100

    Update changelog

commit 517a5b43b654b517f00d848049538777d8bb15fb
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Nov 20 13:30:02 2025 +0100

    Update changelog

commit 26deb91bd1455469c82cae62ac88bae4f537daf2
Merge: 05c417c4 a8007f9b
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Nov 20 13:25:20 2025 +0100

    Update upstream source from tag 'upstream/4.6.1'
    
    Update to upstream version '4.6.1'
    with Debian dir 59ad3c4a5a1185988a3cb03cc3cb35700b1e2939

commit 05c417c423272cac96d60a08d73e66b460078491
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Tue Oct 14 21:01:20 2025 +0200

    stratoshark: Suggest falcosecurity-scap-dkms
    
    falcosecurity-scap-dkms provides /dev/scap0 for capturing local system calls.
    
    Closes: #1118073

commit b5dbccf945cb780bd4113b2a55142beecf4efa63
Author: Gunnar Wolf <gwolf@gwolf.org>
Date:   Tue Oct 14 20:49:00 2025 +0200

    Ship man page of stratoshark
    
    Closes: #1118071

commit d809466d3b35bf1ecb3f4c168adfa6434e5c31af
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Mon Oct 13 16:47:47 2025 +0200

    debian/rules: Stop supporting focal as a backport target

commit a0a108e8fa2c8d8466c086c8810e89049bccedc1
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Mon Oct 13 16:15:41 2025 +0200

    debian/rules: Fix backporting to relases without stratoshark build dependencies

commit c7471a91e21a1de6fa9d33fd46b33b788404971f
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Sun Oct 12 18:36:37 2025 +0200

    Update changelog

commit 97054299db55d3f6ff64a5708e35840dafa83d4c
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Oct 9 16:34:37 2025 +0200

    Update changelog

commit 8ec23c9e8d47faa56268aef9afb8beae86ca50f2
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Oct 9 16:10:46 2025 +0200

    Update symbols files

commit a65e90b8856e5dc43d2aac2eb3e8120894425d83
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Oct 9 13:57:08 2025 +0200

    Drop patches integrated upstream

commit 7e2476edd117978e01c5528ba690f4bbbb0acf51
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Oct 9 13:56:18 2025 +0200

    Update changelog

commit 7cb4cf8072cf9555161370fd070c8cc9816444cc
Merge: 7a84e184 a881edec
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Oct 9 13:55:18 2025 +0200

    Update upstream source from tag 'upstream/4.6.0'
    
    Update to upstream version '4.6.0'
    with Debian dir 1d3f0cda2f667d89d01a2be4f941a31881212a09

commit 7a84e184c9d6e81894845e61ae4773d8f7dfbba4
Author: Balint Reczey <balint@balintreczey.hu>
Date:   Thu Sep 25 15:23:24 2025 +0200

    Update changelog
Created: 2026-01-21 Last update: 2026-04-30 22:30
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-01 Last update: 2026-03-01 00:00
1 open merge request in Salsa normal
There is 1 open merge request for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2026-02-07 05:32
AppStream hints: 3 warnings for stratoshark,wireshark normal
AppStream found metadata issues for packages:
  • stratoshark: 3 warnings
You should get rid of them to provide more metadata about this software.
Created: 2025-10-14 Last update: 2025-10-14 09:01
debian/patches: 2 patches to forward upstream low

Among the 2 debian patches available in version 4.6.4-1 of the package, we noticed the following issues:

  • 2 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-02-28 21:31
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2020-02-26 Last update: 2026-01-17 11:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.6.0.1).
Created: 2022-05-11 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2026-03-03] Accepted wireshark 4.4.14-0+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Adrian Bunk)
  • [2026-03-02] wireshark 4.6.4-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-28] Accepted wireshark 4.6.4-1 (source) into unstable (Balint Reczey)
  • [2026-02-19] Accepted wireshark 4.4.13-0+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Carlos Henrique Lima Melara)
  • [2026-02-16] Accepted wireshark 3.4.16-0+deb11u2 (source) into oldoldstable-security (Jochen Sprickerhof)
  • [2026-02-08] Accepted wireshark 4.4.13-0+deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Carlos Henrique Lima Melara)
  • [2026-01-20] wireshark 4.6.3-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-16] Accepted wireshark 4.6.3-1 (source) into unstable (Balint Reczey)
  • [2025-12-08] wireshark 4.6.2-3 MIGRATED to testing (Debian testing watch)
  • [2025-12-05] Accepted wireshark 4.6.2-3 (source) into unstable (Balint Reczey)
  • [2025-12-05] Accepted wireshark 4.6.2-1 (source) into unstable (Balint Reczey)
  • [2025-11-24] wireshark 4.6.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-11-22] Accepted wireshark 4.6.1-2 (source) into unstable (Balint Reczey)
  • [2025-11-21] Accepted wireshark 4.6.1-1 (source) into unstable (Balint Reczey)
  • [2025-10-28] wireshark 4.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-13] Accepted wireshark 4.6.0-1 (source) into unstable (Balint Reczey)
  • [2025-10-10] Accepted wireshark 4.6.0-0exp1 (source) into experimental (Balint Reczey)
  • [2025-09-27] Accepted wireshark 4.6.0~rc1-0exp2 (source all amd64) into experimental (Debian FTP Masters) (signed by: Balint Reczey)
  • [2025-09-21] Accepted wireshark 4.6.0~rc1-0exp1 (source all amd64) into experimental (Debian FTP Masters) (signed by: Balint Reczey)
  • [2025-09-03] wireshark 4.4.9-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-31] Accepted wireshark 4.4.9-1 (source) into unstable (Balint Reczey)
  • [2025-07-17] Accepted wireshark 4.4.8-0exp1 (source) into experimental (Balint Reczey)
  • [2025-06-16] wireshark 4.4.7-1 MIGRATED to testing (Debian testing watch)
  • [2025-06-10] Accepted wireshark 4.4.7-1 (source) into unstable (Balint Reczey)
  • [2025-06-05] Accepted wireshark 4.4.7-0exp1 (source) into experimental (Balint Reczey)
  • [2025-04-29] wireshark 4.4.6-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-17] Accepted wireshark 4.4.6-2 (source) into unstable (Balint Reczey)
  • [2025-04-17] Accepted wireshark 4.4.6-1 (source) into unstable (Balint Reczey)
  • [2025-02-28] wireshark 4.4.5-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-25] Accepted wireshark 4.4.5-1 (source) into unstable (Balint Reczey)
  • 1
  • 2
bugs [bug history graph]
  • all: 45
  • RC: 1
  • I&N: 16
  • M&W: 28
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • screenshots
  • l10n (68, -)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.6.4-1
  • 14 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing