Hi security team,

I would like to coordinate the security updates for wireshark in trixie and bookworm. Would you be ok if I upload the proposed patches?

Thanks

Jochen

* Bálint Réczey <[email protected]> [2026-01-29 16:08]:
Hi Jochen,

On 2026. Jan 29., Thu at 15:33, Jochen Sprickerhof <[email protected]>
wrote:

Hi Balint,

as part of my work on E/LTS for Freexian I have prepared and tested
security updates for trixie and bookworm (attached). Do you want to
handle them or should I coordinate with the security team?



Thanks, please coordinate with the security team and then go ahead the
upload.

Cheers,
Balint



Cheers Jochen

* Debian Bug Tracking System <[email protected]> [2026-01-16 16:15]:
>This is an automatic notification regarding your Bug report
>which was filed against the src:wireshark package:
>
>#1125690: wireshark: CVE-2026-0959 CVE-2026-0960 CVE-2026-0961
CVE-2026-0962
>
>It has been closed by Debian FTP Masters <[email protected]>
(reply to Balint Reczey <[email protected]>).
>
>Their explanation is attached below along with your original report.
>If this explanation is unsatisfactory and you have not received a
>better one in a separate message then please contact Debian FTP Masters <
[email protected]> (reply to Balint Reczey <
[email protected]>) by
>replying to this email.
>
>
>--
>1125690: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
>Debian Bug Tracking System
>Contact [email protected] with problems

>Date: Fri, 16 Jan 2026 16:12:37 +0000
>To: [email protected]
>Reply-To: Balint Reczey <[email protected]>
>From: Debian FTP Masters <[email protected]>
>Subject: Bug#1125690: fixed in wireshark 4.6.3-1
>



>Date: Fri, 16 Jan 2026 08:10:38 +0100
>To: Debian Bug Tracking System <[email protected]>
>X-Mailer: reportbug 13.2.0
>From: Salvatore Bonaccorso <[email protected]>
>Subject: wireshark: CVE-2026-0959 CVE-2026-0960 CVE-2026-0961
CVE-2026-0962
>
>Source: wireshark
>Version: 4.6.2-1
>Severity: important
>Tags: security upstream
>X-Debbugs-Cc: [email protected], Debian Security Team <
[email protected]>
>
>Hi,
>
>The following vulnerabilities were published for wireshark.
>
>CVE-2026-0959[0]:
>| IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and
>| 4.4.0 to 4.4.12 allows denial of service
>
>
>CVE-2026-0960[1]:
>| HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2
>| allows denial of service
>
>
>CVE-2026-0961[2]:
>| BLF file parser crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to
>| 4.4.12 allows denial of service
>
>
>CVE-2026-0962[3]:
>| SOME/IP-SD protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and
>| 4.4.0 to 4.4.12 allows denial of service
>
>
>If you fix the vulnerabilities please also make sure to include the
>CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
>
>For further information see:
>
>[0] https://security-tracker.debian.org/tracker/CVE-2026-0959
>    https://www.cve.org/CVERecord?id=CVE-2026-0959
>[1] https://security-tracker.debian.org/tracker/CVE-2026-0960
>    https://www.cve.org/CVERecord?id=CVE-2026-0960
>[2] https://security-tracker.debian.org/tracker/CVE-2026-0961
>    https://www.cve.org/CVERecord?id=CVE-2026-0961
>[3] https://security-tracker.debian.org/tracker/CVE-2026-0962
>    https://www.cve.org/CVERecord?id=CVE-2026-0962
>
>Regards,
>Salvatore


Attachment: signature.asc
Description: PGP signature

Reply via email to