-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3505-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff March 04, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wireshark CVE ID : CVE-2015-7830 CVE-2015-8711 CVE-2015-8712 CVE-2015-8713 CVE-2015-8714 CVE-2015-8715 CVE-2015-8716 CVE-2015-8717 CVE-2015-8718 CVE-2015-8719 CVE-2015-8720 CVE-2015-8721 CVE-2015-8722 CVE-2015-8723 CVE-2015-8724 CVE-2015-8725 CVE-2015-8726 CVE-2015-8727 CVE-2015-8728 CVE-2015-8729 CVE-2015-8730 CVE-2015-8732 CVE-2015-8733 Multiple vulnerabilities were discovered in the dissectors/parsers for Pcapng, NBAP, UMTS FP, DCOM, AllJoyn, T.38, SDP, NLM, DNS, BED, SCTP, 802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A, Ascend, NBAP, ZigBee ZCL and Sniffer which could result in denial of service. For the oldstable distribution (wheezy), these problems have been fixed in version 1.8.2-5wheezy17. For the stable distribution (jessie), these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u4. For the testing distribution (stretch), these problems have been fixed in version 2.0.2+ga16e22e-1. For the unstable distribution (sid), these problems have been fixed in version 2.0.2+ga16e22e-1. We recommend that you upgrade your wireshark packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJW2dvxAAoJEBDCk7bDfE42CFcP/2qQJ4iZoJdxBBM3mUIgUUeK xjlaDqB3/kJ9b4eBu3UwBrWQRh3QrhpmLbJd42fijmJxUf9V9N1qyEZpRRrPyAO5 Z10/vAhwdFsMVxJ43B6/KRrtPDo3HE+GKDdUtAZIUN1/Y4xa0hXG2NuO71CHiqMv 6iFElIlFk5SQcXAylYZh/sh2VukgxHF+mUUwWIgGZsFzJveDdl9V4cYr3/0IDtRc mFMXY+r5Os/h+x7LSLkT7lQZe0+nLHTFv+Q71uOC1dmjowBMiZ3bTw2RA/AwihvM hHq8Tr8/7oG/5x2F2G8I1o81HrZ/pCExBE7Hfw/HSeAgQizEG1fI8V5YguQzKMKW txaJVGqR3Ztmy2GKbAYl3Vr4QSHmjSl8WkiSwHMyZdsN0Ssj+0748Cox8APZM5VD ffB5FSrX1r7anq0zeY70izXWXxv92Rs+nXtOnQ8uAjTZ4NPW/K8nPfXKmDnP37p+ aUrEHLgZw450xPKXneebrxpRDMojwSUilk2oaFkfgoEE+eocJpLz3VUdhS6bgAXT hnWxsCEljS8/lLHQlXF4SlAkvzu95uGYBGwfw0tgmUf6+CA+xe3/GQrJ6qJWAgV1 odI1KhUNIvtA12bCNerWHdDL/l7I5Ehe+7+cnvq9Zq+Pk8rMRiV8fnqqYaRfFSl7 0pRef9KzOjZoJWAeF2hG =Ltni -----END PGP SIGNATURE-----