File _patchinfo of Package patchinfo.import5742
<patchinfo incident="wireshark" version="5742">
<issue tracker="bnc" id="741187" />
<issue tracker="bnc" id="741188" />
<issue tracker="bnc" id="741190" />
<issue tracker="CVE" id="CVE-2012-0041" />
<issue tracker="CVE" id="CVE-2012-0043" />
<issue tracker="CVE" id="CVE-2012-0042" />
<issue tracker="CVE" id="CVE-2012-0066" />
<issue tracker="CVE" id="CVE-2012-0067" />
<issue tracker="CVE" id="CVE-2012-0068" />
<category>security</category>
<rating>low</rating>
<summary>wireshark: security update to 1.4.11</summary>
<description>This update fixes the following security issues:
- 741187: multiple file parser vulnerabilities
(CVE-2012-0041)
- 741188: RLC dissector buffer overflow (CVE-2012-0043)
- 741190: NULL pointer vulnerabilities (CVE-2012-0042)
- CVE-2012-0066: DoS due to too large buffer alloc request
- CVE-2012-0067: DoS due to integer underflow and too large
buffer alloc. request
- CVE-2012-0068: memory corruption due to buffer underflow
</description>
<packager>adrianSuSE</packager>
</patchinfo>