lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <477d67fd.zYMwl8Rf5v9SNdJM%announce-noreply@rpath.com> Date: Thu, 03 Jan 2008 17:55:57 -0500 From: rPath Update Announcements <announce-noreply@...th.com> To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com Cc: full-disclosure@...ts.grok.org.uk, vulnwatch@...nwatch.org, bugtraq@...urityfocus.com, lwn@....net Subject: rPSA-2008-0004-1 tshark wireshark rPath Security Advisory: 2008-0004-1 Published: 2008-01-03 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Indirect User Deterministic Denial of Service Updated Versions: tshark=conary.rpath.com@rpl:1/0.99.7-0.1-1 wireshark=conary.rpath.com@rpl:1/0.99.7-0.1-1 rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-1975 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6440 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6442 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6443 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6444 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6445 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6446 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6448 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6449 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451 Description: Previous versions of the wireshark package are vulnerable to multiple types of Denial of Service attacks, including crashes and excessive memory consumption. It has not been determined that these vulnerabilities can be exploited to execute malicious code. http://wiki.rpath.com/Advisories:rPSA-2008-0004 Copyright 2008 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html