Hello community,
here is the log from the commit of package patchinfo.1689 for
openSUSE:12.1:Update checked in at 2013-05-31 15:26:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.1:Update/patchinfo.1689 (Old)
and /work/SRC/openSUSE:12.1:Update/.patchinfo.1689.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.1689"
Changes:
--------
New Changes file:
NO CHANGES FILE!!!
New:
----
_patchinfo
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo>
<issue id="820566" tracker="bnc">wireshark security updates to 1.8.7 and
1.6.15</issue>
<issue id="CVE-2013-2487" tracker="cve" />
<issue id="CVE-2013-2486" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>AndreasStieger</packager>
<description>This update of wireshark includes several security and bug
fixes. [bnc#820566]
+ vulnerabilities fixed:
* The RELOAD dissector could go into an infinite loop.
wnpa-sec-2013-23 CVE-2013-2486 CVE-2013-2487
* The GTPv2 dissector could crash.
wnpa-sec-2013-24
* The ASN.1 BER dissector could crash.
wnpa-sec-2013-25
* The PPP CCP dissector could crash.
wnpa-sec-2013-26
* The DCP ETSI dissector could crash.
wnpa-sec-2013-27
* The MPEG DSM-CC dissector could crash.
wnpa-sec-2013-28
* The Websocket dissector could crash.
wnpa-sec-2013-29
* The MySQL dissector could go into an infinite loop.
wnpa-sec-2013-30
* The ETCH dissector could go into a large loop.
wnpa-sec-2013-31
+ Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.8.7.html
</description>
<summary>update for wireshark</summary>
</patchinfo>
--
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]