lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1I8RYD-0001Vi-JC@artemis.annvix.ca>
Date: Tue, 10 Jul 2007 20:03:33 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:145 ] - Updated wireshark packages
 fix multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:145
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : wireshark
 Date    : July 10, 2007
 Affected: 2007.0, 2007.1, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities in the Wireshark program were found that
 could cause crashes, excessive looping, or exhaustion of system memory.
 
 This updated provides wireshark 0.99.6 which is not vulnerable to
 these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393
 http://www.wireshark.org/security/wnpa-sec-2007-02.html
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 b033f6eadc258c248d9fba4469b838e1  2007.0/i586/libwireshark0-0.99.6-0.1mdv2007.0.i586.rpm
 5aad6a1e489f750ddf174649a6319ca2  2007.0/i586/tshark-0.99.6-0.1mdv2007.0.i586.rpm
 c394ef661021c5e62bed70c21c315ffd  2007.0/i586/wireshark-0.99.6-0.1mdv2007.0.i586.rpm
 e851b58c639407a7c9ae25fcfd336774  2007.0/i586/wireshark-tools-0.99.6-0.1mdv2007.0.i586.rpm 
 72beadc31f718f860324544019d3adc3  2007.0/SRPMS/wireshark-0.99.6-0.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 dd9d7af8d82a2eacc871e6a919cad3af  2007.0/x86_64/lib64wireshark0-0.99.6-0.1mdv2007.0.x86_64.rpm
 452de6307f10772c68ebae473ae3c537  2007.0/x86_64/tshark-0.99.6-0.1mdv2007.0.x86_64.rpm
 fa4cc3d56186068a13549dc754529198  2007.0/x86_64/wireshark-0.99.6-0.1mdv2007.0.x86_64.rpm
 74dab97371727e367e997a1a90f7263b  2007.0/x86_64/wireshark-tools-0.99.6-0.1mdv2007.0.x86_64.rpm 
 72beadc31f718f860324544019d3adc3  2007.0/SRPMS/wireshark-0.99.6-0.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 a5b8f29cdc32543659a8e0c23f146e33  2007.1/i586/libwireshark0-0.99.6-0mdv2007.1.i586.rpm
 ceb71b951f1185741c9b9be50fda7acc  2007.1/i586/tshark-0.99.6-0mdv2007.1.i586.rpm
 188ee566b140d3a5a270106fdba86516  2007.1/i586/wireshark-0.99.6-0mdv2007.1.i586.rpm
 4a4e07651e01dd9177548b37b7888971  2007.1/i586/wireshark-tools-0.99.6-0mdv2007.1.i586.rpm 
 9ab979db8a493c6d35ee621667af6806  2007.1/SRPMS/wireshark-0.99.6-0mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 83ca8b3c25af33fd0f53ac2bff0adc21  2007.1/x86_64/lib64wireshark0-0.99.6-0mdv2007.1.x86_64.rpm
 4f8159feba8f9cd498d9d6e810a0e555  2007.1/x86_64/tshark-0.99.6-0mdv2007.1.x86_64.rpm
 6cf73daa791ecbcacb505016e0050823  2007.1/x86_64/wireshark-0.99.6-0mdv2007.1.x86_64.rpm
 fa1e1783c619d908a5d0b260adbb5c9f  2007.1/x86_64/wireshark-tools-0.99.6-0mdv2007.1.x86_64.rpm 
 9ab979db8a493c6d35ee621667af6806  2007.1/SRPMS/wireshark-0.99.6-0mdv2007.1.src.rpm

 Corporate 4.0:
 e0bd9a03651d4f29034088368b81aab8  corporate/4.0/i586/libwireshark0-0.99.6-0.1.20060mlcs4.i586.rpm
 1bbb1205a0f0a2d0107f1a6992ceae83  corporate/4.0/i586/tshark-0.99.6-0.1.20060mlcs4.i586.rpm
 88828ce0dc609d86ff1987464813fa02  corporate/4.0/i586/wireshark-0.99.6-0.1.20060mlcs4.i586.rpm
 b1180bb4471aabf35620e391475f81ff  corporate/4.0/i586/wireshark-tools-0.99.6-0.1.20060mlcs4.i586.rpm 
 b72cf2010d3c7afd8f00e99ed6d28430  corporate/4.0/SRPMS/wireshark-0.99.6-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 794ca2e7faf95f0c6f6527523bbd56cb  corporate/4.0/x86_64/lib64wireshark0-0.99.6-0.1.20060mlcs4.x86_64.rpm
 4673373f4d25fafb8da9b306c7afc0c6  corporate/4.0/x86_64/tshark-0.99.6-0.1.20060mlcs4.x86_64.rpm
 8a1d126e0524d69fb719c9374f45d64d  corporate/4.0/x86_64/wireshark-0.99.6-0.1.20060mlcs4.x86_64.rpm
 5d86ebcdf606a1c8406ddb6a086c09e6  corporate/4.0/x86_64/wireshark-tools-0.99.6-0.1.20060mlcs4.x86_64.rpm 
 b72cf2010d3c7afd8f00e99ed6d28430  corporate/4.0/SRPMS/wireshark-0.99.6-0.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGlA+GmqjQ0CJFipgRAoh1AKDfqo49g725VpoWO6jaS2MgJa9KxwCgyOnB
51NfDtlriicG49CdtVDXHDc=
=c4gk
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ