-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : wireshark Version : 1.12.1+g01b65bf-4+deb8u6~deb7u11 CVE ID : CVE-2018-9258 CVE-2018-9260 CVE-2018-9261 CVE-2018-9263 CVE-2018-9268 CVE-2018-9269 CVE-2018-9270 CVE-2018-11358 CVE-2018-11362
Several issues that could result in a crash within different dissectors have been fixed. Other issues are related to memory leaks or heap-based buffer overflows.
All issue could be caused by special crafted and malformed packets. For Debian 7 "Wheezy", these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6~deb7u11. We recommend that you upgrade your wireshark packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQJ8BAEBCgBmBQJbDGfAXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5 NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHoXUQALqaYawJ46RF6yrmfYLRNuYd M+fTuDV5zIgfbfixWEmYt2R6obTzOYjMATrtsf5+/DycdDpT6WTqR+EZlmpX5xXU +aPvnnB611JH0MRoOp0hDlb4dfjbkg1bNBOOy+ahoK3qm0bbM16Jp8VFEdGT2HgL QPfrpayKlqbBHRVHzqaJagrOMZhmbjcESQhCauceM4y58TZuz44KW71bkgvtt0Zt TQe206THDvs3ItA+8YMqlvH02Z9Fg0Ffm7XipGDS4cMUseN6VnqoF0J7MKVvElPa lQeSQ4R1zoQZz0ubywIry49ZkcbzoQt+aa+H/wbdux7YbWirPBI7ycMGGKhJqmK1 nqG4IhZdTqbWv9Ogwcj+GTFOHQ0MTKFEpxo9MbW2Kmg2Axv4V3f+MnVAWoTb2AAH M8D0IU21179mzTFZzPGXq5sBbrVCa0lWvWfLB7t4hK1yUExEA6feEyzc6q7x5SJ1 nsuOP6vamwNzMVZpZ25dlN75ShlwSZqRwn+R2LgmamKWZItbc4m95cB3dMqPYrRh BDZft699yLi6fg1XXxHL1sPAuKi2QADCDgUinx3MFBNDB6dckkPXqENgS6SLX5VE 1vWCaem6iri/P0ezM18F7KeOym2ADfLPLRDF9Kr/qlogxP7FTYVXiPRmTE8iTaK9 OUCXv29QfJOvnJbU/xXX =QXVq -----END PGP SIGNATURE-----