Back to wireshark PTS page

Accepted wireshark 2.6.20-0+deb9u2 (source) into oldoldstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 26 Dec 2021 15:31:06 +0200
Source: wireshark
Binary: wireshark-common wireshark wireshark-qt wireshark-gtk tshark wireshark-dev wireshark-doc libwireshark11 libwsutil9 libwsutil-dev libwscodecs2 libwireshark-data libwireshark-dev libwiretap8 libwiretap-dev
Architecture: source
Version: 2.6.20-0+deb9u2
Distribution: stretch-security
Urgency: medium
Maintainer: Balint Reczey <rbalint@ubuntu.com>
Changed-By: Adrian Bunk <bunk@debian.org>
Description:
 libwireshark-data - network packet dissection library -- data files
 libwireshark-dev - network packet dissection library -- development files
 libwireshark11 - network packet dissection library -- shared library
 libwiretap-dev - network packet capture library -- development files
 libwiretap8 - network packet capture library -- shared library
 libwscodecs2 - network packet dissection codecs library -- shared library
 libwsutil-dev - network packet dissection utilities library -- development files
 libwsutil9 - network packet dissection utilities library -- shared library
 tshark     - network traffic analyzer - console version
 wireshark  - network traffic analyzer - meta-package
 wireshark-common - network traffic analyzer - common files
 wireshark-dev - network traffic analyzer - development tools
 wireshark-doc - network traffic analyzer - documentation
 wireshark-gtk - network traffic analyzer - GTK+ version
 wireshark-qt - network traffic analyzer - Qt version
Changes:
 wireshark (2.6.20-0+deb9u2) stretch-security; urgency=medium
 .
   * Non-maintainer upload by the LTS team.
   * CVE-2021-22207: Excessive memory consumption in the MS-WSP dissector.
   * CVE-2021-22235: Crash in the DNP dissector.
   * CVE-2021-39921: NULL pointer exception in the Modbus dissector.
   * CVE-2021-39922: Buffer overflow in the C12.22 dissector.
   * CVE-2021-39923: Large loop in the PNRP dissector.
   * CVE-2021-39924: Large loop in the Bluetooth DHT dissector.
   * CVE-2021-39928: NULL pointer exception in the IEEE 802.11 dissector.
   * CVE-2021-39929: Uncontrolled Recursion in the Bluetooth DHT dissector.
 .
   [ Balint Reczey ]
   * Fix buffer overflow in the Bluetooth SDP dissector (CVE-2021-39925)
Checksums-Sha1:
 0548daa0e30a0f5540a9ef4f529f4c4bf4d4baf6 3558 wireshark_2.6.20-0+deb9u2.dsc
 2e4295eeba3f54134c1f37a6e931e0f4a67c0487 28805496 wireshark_2.6.20.orig.tar.xz
 251bea1b3df0752c2aead50d669dda014235592c 80920 wireshark_2.6.20-0+deb9u2.debian.tar.xz
Checksums-Sha256:
 507a5d742ad0e9b16627df6d78fcea9e49f70c29201e3ca8a1070e7253eae5b3 3558 wireshark_2.6.20-0+deb9u2.dsc
 a97a5f3934ef09b93236f7dbc97a162c0348667cbc9dd68291473b8f7b276c60 28805496 wireshark_2.6.20.orig.tar.xz
 e4958f19c16ace9f66d9a5cd2d0882dfcc34cc04bea86ff571c05b144d7a41ec 80920 wireshark_2.6.20-0+deb9u2.debian.tar.xz
Files:
 9e7c2e0b74fdb5acedda51d5c2fcb565 3558 net optional wireshark_2.6.20-0+deb9u2.dsc
 ac4f79c6878703634797e041fd136a98 28805496 net optional wireshark_2.6.20.orig.tar.xz
 8a1540d7554e787bf0ec7471e5a0347a 80920 net optional wireshark_2.6.20-0+deb9u2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=xO8U
-----END PGP SIGNATURE-----