Hello community,

here is the log from the commit of package patchinfo.1689 for 
openSUSE:12.1:Update checked in at 2013-05-31 15:26:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.1:Update/patchinfo.1689 (Old)
 and      /work/SRC/openSUSE:12.1:Update/.patchinfo.1689.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.1689"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo>
  <issue id="820566" tracker="bnc">wireshark security updates to 1.8.7 and 
1.6.15</issue>
  <issue id="CVE-2013-2487" tracker="cve" />
  <issue id="CVE-2013-2486" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>AndreasStieger</packager>
  <description>This update of wireshark includes several security and bug 
fixes. [bnc#820566]
  + vulnerabilities fixed:
    * The RELOAD dissector could go into an infinite loop.
      wnpa-sec-2013-23 CVE-2013-2486 CVE-2013-2487
    * The GTPv2 dissector could crash.
      wnpa-sec-2013-24
    * The ASN.1 BER dissector could crash.
      wnpa-sec-2013-25
    * The PPP CCP dissector could crash.
      wnpa-sec-2013-26
    * The DCP ETSI dissector could crash.
      wnpa-sec-2013-27
    * The MPEG DSM-CC dissector could crash.
      wnpa-sec-2013-28
    * The Websocket dissector could crash.
      wnpa-sec-2013-29
    * The MySQL dissector could go into an infinite loop.
      wnpa-sec-2013-30
    * The ETCH dissector could go into a large loop.
      wnpa-sec-2013-31
  + Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.8.7.html
</description>
  <summary>update for wireshark</summary>
</patchinfo>
-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to