File _patchinfo of Package patchinfo.import5742
<patchinfo incident="wireshark" version="5742"> <issue tracker="bnc" id="741187" /> <issue tracker="bnc" id="741188" /> <issue tracker="bnc" id="741190" /> <issue tracker="CVE" id="CVE-2012-0041" /> <issue tracker="CVE" id="CVE-2012-0043" /> <issue tracker="CVE" id="CVE-2012-0042" /> <issue tracker="CVE" id="CVE-2012-0066" /> <issue tracker="CVE" id="CVE-2012-0067" /> <issue tracker="CVE" id="CVE-2012-0068" /> <category>security</category> <rating>low</rating> <summary>wireshark: security update to 1.4.11</summary> <description>This update fixes the following security issues: - 741187: multiple file parser vulnerabilities (CVE-2012-0041) - 741188: RLC dissector buffer overflow (CVE-2012-0043) - 741190: NULL pointer vulnerabilities (CVE-2012-0042) - CVE-2012-0066: DoS due to too large buffer alloc request - CVE-2012-0067: DoS due to integer underflow and too large buffer alloc. request - CVE-2012-0068: memory corruption due to buffer underflow </description> <packager>adrianSuSE</packager> </patchinfo>