Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: wireshark-cli

Found 46 matching suggestions

View:
Compact
Detailed
Published
Permalink CVE-2026-5404
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wireshark

K12 RF5 file parser crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-6534
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark

USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-6535
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Improperly Controlled Sequential Memory Allocation in Wireshark

Dissection engine zlib decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

References

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-6519
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark

MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-6527
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Uncontrolled Recursion in Wireshark

ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-5656
7.0 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Wireshark

Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-6521
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark

OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-6531
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark

SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-6536
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark

DLMS/COSEM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4

Affected products

Wireshark
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-6530
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.ignore
  • @LeSuisse published on GitHub
Heap-based Buffer Overflow in Wireshark

DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)