Moritz Muehlenhoff wrote:
> Martin Schulze wrote:
> > Moritz Muehlenhoff wrote:
> > > Package: ethereal
> > > Version: 0.10.13-1
> > > Severity: important
> > > Tags: security
> > > Justification: user security hole
> > > 
> > > Another security problem has been discovered in Ethereal. This time it's
> > > a buffer overflow in the OSPF dissector. Please see 
> > > http://www.idefense.com/application/poi/display?id=349&type=vulnerabilities
> > > for details. This has been assigned CVE-2005-3651.
> > 
> > Frederic, attached is the patch we're using for the update in sarge,
> > basically the function body is exchanged (variable names adjusted and
> > struct adjusted).
> 
> Frederic wrote in another bug log that he's currently w/o sufficient internet
> access. I've NMUed the sid version with the attached patch.

Frederic wrote in another bug log that he's currently w/o sufficient internet
access. I've NMUed the sid version with the attached patch.

Great!  Thanks a lot.

Regards,

        Joey

-- 
This is GNU/Linux Country.  On a quiet night, you can hear Windows reboot.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to