[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040304044346.19709.qmail@updates.mandrakesoft.com>
Date: 4 Mar 2004 04:43:46 -0000
From: Mandrake Linux Security Team <security@...ux-mandrake.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2004:017 - Updated pwlib packages fix vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: pwlib
Advisory ID: MDKSA-2004:017
Date: March 3rd, 2004
Affected versions: 9.1, 9.2
______________________________________________________________________
Problem Description:
The NISCC uncovered bugs in pwlib prior to version 1.6.0 via a test
suite for the H.225 protocol. An attacker could trigger these bugs
by sending carefully crafted messages to an application that uses
pwlib, and the severity would vary based on the application, but
likely would result in a Denial of Service (DoS).
The updated packages provide backported fixes from Craig Southeren
of the OpenH323 project to protect against this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097
______________________________________________________________________
Updated Packages:
Mandrakelinux 9.1:
fed08cb03468a960cef54c5cbe2c17e8 9.1/RPMS/pwlib1-1.4.7-3.1.91mdk.i586.rpm
2803e4377897b4e46ad9baaa0bc410c2 9.1/RPMS/pwlib1-devel-1.4.7-3.1.91mdk.i586.rpm
01b596fc6d5dec07662c86f00bfac18b 9.1/SRPMS/pwlib-1.4.7-3.1.91mdk.src.rpm
Mandrakelinux 9.1/PPC:
504f276f33540a60d7165157f50c2da4 ppc/9.1/RPMS/pwlib1-1.4.7-3.1.91mdk.ppc.rpm
1bc08b3f94b5efabe4fc3ec951538b0e ppc/9.1/RPMS/pwlib1-devel-1.4.7-3.1.91mdk.ppc.rpm
01b596fc6d5dec07662c86f00bfac18b ppc/9.1/SRPMS/pwlib-1.4.7-3.1.91mdk.src.rpm
Mandrakelinux 9.2:
4e095dc6d64f5941f55f58424d3d5599 9.2/RPMS/libpwlib1-1.5.0-15.1.92mdk.i586.rpm
060c174399292849ca8346ef45578dd2 9.2/RPMS/libpwlib1-devel-1.5.0-15.1.92mdk.i586.rpm
0ddef52a47329dbc74e429e2dd5f7a33 9.2/SRPMS/pwlib-1.5.0-15.1.92mdk.src.rpm
Mandrakelinux 9.2/AMD64:
e632e434f78b1ea872eb90e2080b837f amd64/9.2/RPMS/lib64pwlib1-1.5.0-15.1.92mdk.amd64.rpm
583c64d12696cbdc0a618849fa424745 amd64/9.2/RPMS/lib64pwlib1-devel-1.5.0-15.1.92mdk.amd64.rpm
0ddef52a47329dbc74e429e2dd5f7a33 amd64/9.2/SRPMS/pwlib-1.5.0-15.1.92mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
A list of FTP mirrors can be obtained from:
http://www.mandrakesecure.net/en/ftp.php
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98
Please be aware that sometimes it takes the mirrors a few hours to
update.
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesecure.net/en/advisories/
Mandrakesoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
visiting:
http://www.mandrakesecure.net/en/mlist.php
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFARrQCmqjQ0CJFipgRAiEMAKDc+toV0K/gJMG2a/tIVNIqxOhtowCfRhNr
2hAEZEqDxPq0TQAztLs21Ic=
=xUOn
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists