Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=9d9a7a2925b72d8db7c9ae50ea5d17b882b6c88e
commit 9d9a7a2925b72d8db7c9ae50ea5d17b882b6c88e Author: Miklos Vajna <vmik...@frugalware.org> Date: Wed Jul 27 00:58:32 2011 +0200 FSA731-wireshark diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index f034719..df55297 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,19 @@ <fsas> <fsa> + <id>731</id> + <date>2011-07-27</date> + <author>Miklos Vajna</author> + <package>wireshark</package> + <vulnerable>1.4.7-1nexon1</vulnerable> + <unaffected>1.6.1-1nexon1</unaffected> + <bts>http://bugs.frugalware.org/task/4532</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2597</cve> + <desc>Two vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). + 1) An error in the Lucent/Ascend file parser can be exploited to cause an infinite loop via specially crafted packets. + 2) An infinite recursion error in the "elem_cell_id_list()" function in epan/dissectors/packet-ansi_a.c can be exploited to cause a stack overflow e.g. via a specially crafted MAP packet.</desc> + </fsa> + <fsa> <id>730</id> <date>2011-07-27</date> <author>Miklos Vajna</author> _______________________________________________ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git