Wireshark allows you to examine protocol data stored in files or as it is captured from wired or wireless (WiFi or Bluetooth) networks, USB devices, and many other sources. It supports dozens of protocol capture file formats and understands more than a thousand protocols.
Security Fix(es):
A vulnerability, which was classified as problematic, has been found in Wireshark up to 4.2.8/4.4.1 (Packet Analyzer Software).Using CWE to declare the problem leads to CWE-126. The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.Impacted is availability.Upgrading to version 4.2.9 or 4.4.2 eliminates this vulnerability.(CVE-2024-11596)
Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file(CVE-2025-5601)
{ "severity": "High" }
{ "aarch64": [ "wireshark-4.4.7-1.oe2203sp3.aarch64.rpm", "wireshark-debuginfo-4.4.7-1.oe2203sp3.aarch64.rpm", "wireshark-debugsource-4.4.7-1.oe2203sp3.aarch64.rpm", "wireshark-devel-4.4.7-1.oe2203sp3.aarch64.rpm" ], "noarch": [ "wireshark-help-4.4.7-1.oe2203sp3.noarch.rpm" ], "x86_64": [ "wireshark-4.4.7-1.oe2203sp3.x86_64.rpm", "wireshark-debuginfo-4.4.7-1.oe2203sp3.x86_64.rpm", "wireshark-debugsource-4.4.7-1.oe2203sp3.x86_64.rpm", "wireshark-devel-4.4.7-1.oe2203sp3.x86_64.rpm" ], "src": [ "wireshark-4.4.7-1.oe2203sp3.src.rpm" ] }