Moritz Muehlenhoff wrote:
> Martin Schulze wrote:
> > Moritz Muehlenhoff wrote:
> > > Package: ethereal
> > > Version: 0.10.13-1
> > > Severity: important
> > > Tags: security
> > > Justification: user security hole
> > >
> > > Another security problem has been discovered in Ethereal. This time it's
> > > a buffer overflow in the OSPF dissector. Please see
> > > http://www.idefense.com/application/poi/display?id=349&type=vulnerabilities
> > > for details. This has been assigned CVE-2005-3651.
> >
> > Frederic, attached is the patch we're using for the update in sarge,
> > basically the function body is exchanged (variable names adjusted and
> > struct adjusted).
>
> Frederic wrote in another bug log that he's currently w/o sufficient internet
> access. I've NMUed the sid version with the attached patch.
Frederic wrote in another bug log that he's currently w/o sufficient internet
access. I've NMUed the sid version with the attached patch.
Great! Thanks a lot.
Regards,
Joey
--
This is GNU/Linux Country. On a quiet night, you can hear Windows reboot.
Please always Cc to me when replying to me on the lists.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]