Hi Jochen,

On 2026. Jan 29., Thu at 15:33, Jochen Sprickerhof <[email protected]>
wrote:

> Hi Balint,
>
> as part of my work on E/LTS for Freexian I have prepared and tested
> security updates for trixie and bookworm (attached). Do you want to
> handle them or should I coordinate with the security team?



Thanks, please coordinate with the security team and then go ahead the
upload.

Cheers,
Balint


>
> Cheers Jochen
>
> * Debian Bug Tracking System <[email protected]> [2026-01-16 16:15]:
> >This is an automatic notification regarding your Bug report
> >which was filed against the src:wireshark package:
> >
> >#1125690: wireshark: CVE-2026-0959 CVE-2026-0960 CVE-2026-0961
> CVE-2026-0962
> >
> >It has been closed by Debian FTP Masters <[email protected]>
> (reply to Balint Reczey <[email protected]>).
> >
> >Their explanation is attached below along with your original report.
> >If this explanation is unsatisfactory and you have not received a
> >better one in a separate message then please contact Debian FTP Masters <
> [email protected]> (reply to Balint Reczey <
> [email protected]>) by
> >replying to this email.
> >
> >
> >--
> >1125690: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
> >Debian Bug Tracking System
> >Contact [email protected] with problems
>
> >Date: Fri, 16 Jan 2026 16:12:37 +0000
> >To: [email protected]
> >Reply-To: Balint Reczey <[email protected]>
> >From: Debian FTP Masters <[email protected]>
> >Subject: Bug#1125690: fixed in wireshark 4.6.3-1
> >
>
>
>
> >Date: Fri, 16 Jan 2026 08:10:38 +0100
> >To: Debian Bug Tracking System <[email protected]>
> >X-Mailer: reportbug 13.2.0
> >From: Salvatore Bonaccorso <[email protected]>
> >Subject: wireshark: CVE-2026-0959 CVE-2026-0960 CVE-2026-0961
> CVE-2026-0962
> >
> >Source: wireshark
> >Version: 4.6.2-1
> >Severity: important
> >Tags: security upstream
> >X-Debbugs-Cc: [email protected], Debian Security Team <
> [email protected]>
> >
> >Hi,
> >
> >The following vulnerabilities were published for wireshark.
> >
> >CVE-2026-0959[0]:
> >| IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and
> >| 4.4.0 to 4.4.12 allows denial of service
> >
> >
> >CVE-2026-0960[1]:
> >| HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2
> >| allows denial of service
> >
> >
> >CVE-2026-0961[2]:
> >| BLF file parser crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to
> >| 4.4.12 allows denial of service
> >
> >
> >CVE-2026-0962[3]:
> >| SOME/IP-SD protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and
> >| 4.4.0 to 4.4.12 allows denial of service
> >
> >
> >If you fix the vulnerabilities please also make sure to include the
> >CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
> >
> >For further information see:
> >
> >[0] https://security-tracker.debian.org/tracker/CVE-2026-0959
> >    https://www.cve.org/CVERecord?id=CVE-2026-0959
> >[1] https://security-tracker.debian.org/tracker/CVE-2026-0960
> >    https://www.cve.org/CVERecord?id=CVE-2026-0960
> >[2] https://security-tracker.debian.org/tracker/CVE-2026-0961
> >    https://www.cve.org/CVERecord?id=CVE-2026-0961
> >[3] https://security-tracker.debian.org/tracker/CVE-2026-0962
> >    https://www.cve.org/CVERecord?id=CVE-2026-0962
> >
> >Regards,
> >Salvatore
>
>

Reply via email to