Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=9d9a7a2925b72d8db7c9ae50ea5d17b882b6c88e

commit 9d9a7a2925b72d8db7c9ae50ea5d17b882b6c88e
Author: Miklos Vajna <vmik...@frugalware.org>
Date:   Wed Jul 27 00:58:32 2011 +0200

FSA731-wireshark

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index f034719..df55297 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,19 @@

<fsas>
<fsa>
+               <id>731</id>
+               <date>2011-07-27</date>
+               <author>Miklos Vajna</author>
+               <package>wireshark</package>
+               <vulnerable>1.4.7-1nexon1</vulnerable>
+               <unaffected>1.6.1-1nexon1</unaffected>
+               <bts>http://bugs.frugalware.org/task/4532</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2597</cve>
+               <desc>Two vulnerabilities have been reported in Wireshark, 
which can be exploited by malicious people to cause a DoS (Denial of Service).
+                       1) An error in the Lucent/Ascend file parser can be 
exploited to cause an infinite loop via specially crafted packets.
+                       2) An infinite recursion error in the 
"elem_cell_id_list()" function in epan/dissectors/packet-ansi_a.c can be 
exploited to cause a stack overflow e.g. via a specially crafted MAP 
packet.</desc>
+       </fsa>
+       <fsa>
<id>730</id>
<date>2011-07-27</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to