-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : wireshark Version : 1.12.1+g01b65bf-4+deb8u18 CVE ID : CVE-2017-9344 CVE-2017-9349 CVE-2019-9209
Several vulnerabilities have been found in wireshark, a network traffic analyzer.
CVE-2019-9209: Preventing the crash of the ASN.1 BER and related dissectors by avoiding a buffer overflow associated with excessive digits in time values. CVE-2017-9349: Fixing an infinite loop in the DICOM dissector by validating a length value. CVE-2017-9344: Avoid a divide by zero, by validating an interval value in the Bluetooth L2CAP dissector. For Debian 8 "Jessie", these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u18. We recommend that you upgrade your wireshark packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAlyZSpJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7 WEfVvBAApPbktkjqYaJsnVMKsEPlM//rjypYTw2+dXAlE9v4IcFmxYzQPrl0ncZF yDaWyhMdve9BtmIWyEAkOqiNxuePmvq2pkXDVC/Q5Mj3VF9cGymnXpF35Z3e8UDL 1zqHwmGv8h0Q6xz/1XLSu15dgbu431XykbCFSB2l5KvdoC28PyMgmtpC1pBM3tzM J4VKUP89B7njmUYbrY926X0Jr7aTtRdDSCB/PYboJpIHddxdKhWp8LG+WyHVgxVM /INZu62DmD9IMt7ds7XFWxmy/AUY/o4cQxaSJNTXxUCYeEGfrZobbl0bNrnmRkNF h6bu4LDkk1pxKldOjlY1iOqaAbNeg6uZHcgUzoyf92qDy0CxXgpBEfJUphwI3Obw LZ7NKi4eEtH1UB5Fm2v6tegg7NiOSWAWYTxRerBF/gHqDKm57Yv3d8OTzmJUGNUX jl40TsK2G4JXGlu/BmSJ2J4HAnT4ZqGF4pLJ4Va44ec3ML544nsyNcXmYs1jbK9u RTbz+ejVk+pOq3w/6Hwt9orXbetMjYeGxpW64uicLDnYEtQP0H7w+np0eTxOJgz6 8osV8+KFpMFOv52rc+mLZZT5WgXrFV6qRlabcFwtzYtPwAaZGJ0QlnR1gYfsAimn EXuKekxQkUYWsrM+5QhaZ6n7cZbW4rLxNr3UowaBl+woRXjGaLI= =7WiD -----END PGP SIGNATURE-----