lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HjPVT-0001E5-CT@artemis.annvix.ca>
Date: Wed, 02 May 2007 18:49:15 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:097 ] - Updated xscreensaver
	packages fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:097
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : xscreensaver
 Date    : May 2, 2007
 Affected: 2007.0, 2007.1, Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 A problem with the way xscreensaver verifies user passwords
 was discovered by Alex Yamauchi.  When a system is using remote
 authentication (i.e. LDAP) for logins, a local attacker able to cause
 a network outage on the system could cause xscreensaver to crash,
 which would unlock the screen.
 
 Updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1859
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 e836c3e822bd2023489bc33021559e2d  2007.0/i586/xscreensaver-5.00-5.1mdv2007.0.i586.rpm
 114d59fee6b63fb55795509ce691fd7e  2007.0/i586/xscreensaver-base-5.00-5.1mdv2007.0.i586.rpm
 bf9f6d24f46fb92d5a92c128108247a0  2007.0/i586/xscreensaver-common-5.00-5.1mdv2007.0.i586.rpm
 59cc0c3dce851360e3475a63d1bfedc5  2007.0/i586/xscreensaver-extrusion-5.00-5.1mdv2007.0.i586.rpm
 a67ca45b6c8b471f686509ae6e284af4  2007.0/i586/xscreensaver-gl-5.00-5.1mdv2007.0.i586.rpm 
 e0ae6f662b999018321082dafd0113cf  2007.0/SRPMS/xscreensaver-5.00-5.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 04b19bf52df790976fa5d8f246d487fc  2007.0/x86_64/xscreensaver-5.00-5.1mdv2007.0.x86_64.rpm
 401342c023938d668c56406b7d663751  2007.0/x86_64/xscreensaver-base-5.00-5.1mdv2007.0.x86_64.rpm
 a9e77f44381ea1b148eae13da96bbce9  2007.0/x86_64/xscreensaver-common-5.00-5.1mdv2007.0.x86_64.rpm
 a6c9b67df6fab0c67c87ccbcba23328b  2007.0/x86_64/xscreensaver-extrusion-5.00-5.1mdv2007.0.x86_64.rpm
 7e9b52bb1edefe9ee1156edd71b17114  2007.0/x86_64/xscreensaver-gl-5.00-5.1mdv2007.0.x86_64.rpm 
 e0ae6f662b999018321082dafd0113cf  2007.0/SRPMS/xscreensaver-5.00-5.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 cf74a31de15b8032cac5ff8efe970352  2007.1/i586/xscreensaver-5.01-3.1mdv2007.1.i586.rpm
 50afa981a0c89f4868fe77488cc2ee64  2007.1/i586/xscreensaver-base-5.01-3.1mdv2007.1.i586.rpm
 f84ca2049923f5e7ee0995308378d21f  2007.1/i586/xscreensaver-common-5.01-3.1mdv2007.1.i586.rpm
 e2856e0fc916445a1b5aa5d2071efee9  2007.1/i586/xscreensaver-extrusion-5.01-3.1mdv2007.1.i586.rpm
 8c11d67c56b5d87f70c632980bb11c63  2007.1/i586/xscreensaver-gl-5.01-3.1mdv2007.1.i586.rpm 
 81a0cd78ff26cd58b5b8bd253f31e90f  2007.1/SRPMS/xscreensaver-5.01-3.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 8b02873cf99b5d419748ab6ddadb578a  2007.1/x86_64/xscreensaver-5.01-3.1mdv2007.1.x86_64.rpm
 ec5012296ac600be9564e2398c6f0f26  2007.1/x86_64/xscreensaver-base-5.01-3.1mdv2007.1.x86_64.rpm
 2df43b6ebf7a668373e045b858073d56  2007.1/x86_64/xscreensaver-common-5.01-3.1mdv2007.1.x86_64.rpm
 ff66a6152a0d050b3c80e357e66a0f4e  2007.1/x86_64/xscreensaver-extrusion-5.01-3.1mdv2007.1.x86_64.rpm
 f62427b9d401edb71fcd0cff77af458d  2007.1/x86_64/xscreensaver-gl-5.01-3.1mdv2007.1.x86_64.rpm 
 81a0cd78ff26cd58b5b8bd253f31e90f  2007.1/SRPMS/xscreensaver-5.01-3.1mdv2007.1.src.rpm

 Corporate 3.0:
 7a347edabdaf4abb61ac57263f3d41ab  corporate/3.0/i586/xscreensaver-4.14-4.2.C30mdk.i586.rpm
 6f9ea46c93d75ce54e91a0b04a2485d1  corporate/3.0/i586/xscreensaver-extrusion-4.14-4.2.C30mdk.i586.rpm
 2b15011891719fbce2d442748f194cec  corporate/3.0/i586/xscreensaver-gl-4.14-4.2.C30mdk.i586.rpm 
 1249c7696a3c54ae8eb41369c6c24272  corporate/3.0/SRPMS/xscreensaver-4.14-4.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 705a50c595828a6f24006ff5707c91bd  corporate/3.0/x86_64/xscreensaver-4.14-4.2.C30mdk.x86_64.rpm
 020673cb6dd074c0fb5c166ca4c98d1d  corporate/3.0/x86_64/xscreensaver-extrusion-4.14-4.2.C30mdk.x86_64.rpm
 f87ad1daef3daf35ed3595ecfe9ef8b3  corporate/3.0/x86_64/xscreensaver-gl-4.14-4.2.C30mdk.x86_64.rpm 
 1249c7696a3c54ae8eb41369c6c24272  corporate/3.0/SRPMS/xscreensaver-4.14-4.2.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGOQaPmqjQ0CJFipgRAihaAKDUj4fFhZlPTZs+lEdaEYG8FXLltgCfQfLR
+k5UPK0roLXDuOQNhan+26I=
=iDlx
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ