Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: wireshark-qt

Found 46 matching suggestions

View:
Compact
Detailed
Published
Permalink CVE-2026-5654
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @bjornfor
    • @fpletz
    maintainer.ignore
  • @LeSuisse published on GitHub
Stack-based Buffer Overflow in Wireshark

AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-6520
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @bjornfor
    • @fpletz
    maintainer.ignore
  • @LeSuisse published on GitHub
Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark

OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-5405
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 days, 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse ignored
    2 maintainers
    • @bjornfor
    • @fpletz
    maintainer.ignore
  • @LeSuisse published on GitHub
Heap-based Buffer Overflow in Wireshark

RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution

Affected products

Wireshark
  • <4.4.15
  • <4.6.5

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Published
Permalink CVE-2026-3203
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse deleted
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Buffer Over-read in Wireshark

RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service

Affected products

Wireshark
  • <4.4.14
  • <4.6.4

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Upstream advisory: https://www.wireshark.org/security/wnpa-sec-2026-07.html
Published
Permalink CVE-2026-3201
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse deleted
    2 maintainers
    • @fpletz
    • @bjornfor
    maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Improperly Controlled Sequential Memory Allocation in Wireshark

USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service

Affected products

Wireshark
  • <4.4.14
  • <4.6.4

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Upstream advisory: https://www.wireshark.org/security/wnpa-sec-2026-05.html
Published
Permalink CVE-2026-3202
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse deleted
    2 maintainers
    • @bjornfor
    • @fpletz
    maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
NULL Pointer Dereference in Wireshark

NTS-KE protocol dissector crash in Wireshark 4.6.0 to 4.6.3 allows denial of service

Affected products

Wireshark
  • <4.6.4

Matching in nixpkgs

pkgs.tshark

Powerful network protocol analyzer

Package maintainers

Ignored maintainers (2)
Upstream advisory: https://www.wireshark.org/security/wnpa-sec-2026-06.html