Summary: | net-analyzer/ethereal OSPF Protocol Vulnerability (CVE-2005-3651) | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Chris White (RETIRED) <chriswhite> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | major | CC: | netmon | ||||
Priority: | High | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | B1? [glsa] jaervosz | ||||||
Package list: | Runtime testing required: | --- | |||||
Attachments: |
|
Description
Chris White (RETIRED)
![]() Netmon please advise and bump as necessary. Created attachment 74428 [details, diff]
ethereal-0.10.13-packet-ospf.diff
Anyone care to review this patch?
Patch comes from upstream, I guess it's OK... Okies, ethereal-0.10.13-r2 has the patch. Arches please test and mark stable. Patch fails to apply as it had a CVS tag in it that got munged when committed Back to ebuild. weeve: commit it with "cvs add -ko" (I guess you found out already yourself...) No I haven't. You'll want to direct that comment at vanquirius as he was the commit culprit. Ok, new version of the patch is in cvs. Sorry for the trouble. Builds here on sparc. Are there any sample packet captures to test this issue? stable on x86 stable on ppc64 Jason: no test capture, sorry. Stable on ppc. amd64 done. sparc stable. Stable on alpha + ia64. GLSA 200512-06 |