Moritz Muehlenhoff wrote: > Martin Schulze wrote: > > Moritz Muehlenhoff wrote: > > > Package: ethereal > > > Version: 0.10.13-1 > > > Severity: important > > > Tags: security > > > Justification: user security hole > > > > > > Another security problem has been discovered in Ethereal. This time it's > > > a buffer overflow in the OSPF dissector. Please see > > > http://www.idefense.com/application/poi/display?id=349&type=vulnerabilities > > > for details. This has been assigned CVE-2005-3651. > > > > Frederic, attached is the patch we're using for the update in sarge, > > basically the function body is exchanged (variable names adjusted and > > struct adjusted). > > Frederic wrote in another bug log that he's currently w/o sufficient internet > access. I've NMUed the sid version with the attached patch.
Frederic wrote in another bug log that he's currently w/o sufficient internet access. I've NMUed the sid version with the attached patch. Great! Thanks a lot. Regards, Joey -- This is GNU/Linux Country. On a quiet night, you can hear Windows reboot. Please always Cc to me when replying to me on the lists. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]