lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1JC7VV-0006gl-DU@artemis.annvix.ca>
Date: Mon, 07 Jan 2008 23:00:13 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2008:001-1 ] - Updated wireshark packages
 fix multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                       MDVSA-2008:001-1
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : wireshark
 Date    : January 8, 2008
 Affected: 2007.0, 2007.1, 2008.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities in the Wireshark program were found that
 could cause crashes, excessive looping, or arbitrary code execution.
 
 This update provides Wireshark 0.99.7 which is not vulnerable to
 these issues.
 
 An updated version of libsmi is also being provided, not because
 of security issues, but because this version of wireshark uses it
 instead of net-snmp for SNMP support.

 Update:

 This update is being reissued without libcap (kernel capabilities)
 support, as that is not required by the original released packages,
 and thus gave trouble for a number of users.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451
 http://www.wireshark.org/security/wnpa-sec-2007-03.html
 http://qa.mandriva.com/show_bug.cgi?id=36470
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 5c91bd119cfc3b1c1ee55b6bc2011e4a  2007.0/i586/libwireshark0-0.99.7-0.2mdv2007.0.i586.rpm
 78c42809009ff071c1df6b755303f15b  2007.0/i586/tshark-0.99.7-0.2mdv2007.0.i586.rpm
 49b10ec48fd94f2f25e017454a72bf19  2007.0/i586/wireshark-0.99.7-0.2mdv2007.0.i586.rpm
 c5c8c034009e625164944bed14446404  2007.0/i586/wireshark-tools-0.99.7-0.2mdv2007.0.i586.rpm 
 77848da4b077e273c2b6d63cd7b7e9eb  2007.0/SRPMS/wireshark-0.99.7-0.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 bd4b1becee027d7670316fc861420a4f  2007.0/x86_64/lib64wireshark0-0.99.7-0.2mdv2007.0.x86_64.rpm
 3843ed5c6de451e48288cebee268a13c  2007.0/x86_64/tshark-0.99.7-0.2mdv2007.0.x86_64.rpm
 2be07bfb8592520cb656e9fdbfb98022  2007.0/x86_64/wireshark-0.99.7-0.2mdv2007.0.x86_64.rpm
 90e146c1da8a29a5a076cc6c9caed066  2007.0/x86_64/wireshark-tools-0.99.7-0.2mdv2007.0.x86_64.rpm 
 77848da4b077e273c2b6d63cd7b7e9eb  2007.0/SRPMS/wireshark-0.99.7-0.2mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 ade45a75aea57acf6530f4f41f825cc9  2007.1/i586/libwireshark0-0.99.7-0.2mdv2007.1.i586.rpm
 b5c8c986615e448c7dacee90c7e29fa2  2007.1/i586/tshark-0.99.7-0.2mdv2007.1.i586.rpm
 abe2a75fdf8e04e4a92a50ce1aa9a1d7  2007.1/i586/wireshark-0.99.7-0.2mdv2007.1.i586.rpm
 a1fb6cf26e8e3925759cd53607b7d171  2007.1/i586/wireshark-tools-0.99.7-0.2mdv2007.1.i586.rpm 
 cabd10166ca29f2f4685b52dfd77b5fe  2007.1/SRPMS/wireshark-0.99.7-0.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 963168de12981d25e5c843682f8e2341  2007.1/x86_64/lib64wireshark0-0.99.7-0.2mdv2007.1.x86_64.rpm
 c979dda5e0306456a1870cab22f7dbd3  2007.1/x86_64/tshark-0.99.7-0.2mdv2007.1.x86_64.rpm
 3b5228291fc25c3e2413ff50b5ae0c35  2007.1/x86_64/wireshark-0.99.7-0.2mdv2007.1.x86_64.rpm
 4457e9620dd65ff45a61b822e8bd6fca  2007.1/x86_64/wireshark-tools-0.99.7-0.2mdv2007.1.x86_64.rpm 
 cabd10166ca29f2f4685b52dfd77b5fe  2007.1/SRPMS/wireshark-0.99.7-0.2mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 30c75799076e9f6cb5b1e52edf3db14a  2008.0/i586/libwireshark-devel-0.99.7-0.2mdv2008.0.i586.rpm
 8f81b43b1023d159c8914e67fefa1002  2008.0/i586/libwireshark0-0.99.7-0.2mdv2008.0.i586.rpm
 adbaf318e0bc5cb332e70a3fd5f04474  2008.0/i586/tshark-0.99.7-0.2mdv2008.0.i586.rpm
 858cabe43af0af8a5677e011afd218c9  2008.0/i586/wireshark-0.99.7-0.2mdv2008.0.i586.rpm
 c62187def12e0ead20310a7efe9505b3  2008.0/i586/wireshark-tools-0.99.7-0.2mdv2008.0.i586.rpm 
 3d06a9a2c6e9785d6fc2238d661a8404  2008.0/SRPMS/wireshark-0.99.7-0.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 ed92644ee0e457b2a3ecee1d2bf4fa60  2008.0/x86_64/lib64wireshark-devel-0.99.7-0.2mdv2008.0.x86_64.rpm
 9635394abf21052f7bcab4897528be76  2008.0/x86_64/lib64wireshark0-0.99.7-0.2mdv2008.0.x86_64.rpm
 d121a1c7a3ef3176a64d1849670e6dee  2008.0/x86_64/tshark-0.99.7-0.2mdv2008.0.x86_64.rpm
 80d1eef6d6d2cedb1afe7f0aeb5adff9  2008.0/x86_64/wireshark-0.99.7-0.2mdv2008.0.x86_64.rpm
 c95a8c9b83616e90eb8a172f1d1f31f6  2008.0/x86_64/wireshark-tools-0.99.7-0.2mdv2008.0.x86_64.rpm 
 3d06a9a2c6e9785d6fc2238d661a8404  2008.0/SRPMS/wireshark-0.99.7-0.2mdv2008.0.src.rpm

 Corporate 4.0:
 f23d3320bf2e426f48dc4c4243c315b6  corporate/4.0/i586/libwireshark0-0.99.7-0.2.20060mlcs4.i586.rpm
 51587e5f3bf827a97b8655b3d7633774  corporate/4.0/i586/tshark-0.99.7-0.2.20060mlcs4.i586.rpm
 a5ad1f60eb99f7f57b9241adb7f6b537  corporate/4.0/i586/wireshark-0.99.7-0.2.20060mlcs4.i586.rpm
 72af45f42b528185526016f498fa5908  corporate/4.0/i586/wireshark-tools-0.99.7-0.2.20060mlcs4.i586.rpm 
 0ebc19bec6bc7e76f644f122e956c416  corporate/4.0/SRPMS/wireshark-0.99.7-0.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 3bd532fbfacf8e910efaf47aae679200  corporate/4.0/x86_64/lib64wireshark0-0.99.7-0.2.20060mlcs4.x86_64.rpm
 7e25238cbc07b651e37e65b826d87dac  corporate/4.0/x86_64/tshark-0.99.7-0.2.20060mlcs4.x86_64.rpm
 b14aaefe6cedbf388fe202722a6e6596  corporate/4.0/x86_64/wireshark-0.99.7-0.2.20060mlcs4.x86_64.rpm
 4959cbe32a8854f858409e2e98144375  corporate/4.0/x86_64/wireshark-tools-0.99.7-0.2.20060mlcs4.x86_64.rpm 
 0ebc19bec6bc7e76f644f122e956c416  corporate/4.0/SRPMS/wireshark-0.99.7-0.2.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iEYEARECAAYFAkeC5lEACgkQmqjQ0CJFipi91gCg20Lkyor7rIrCWeomiBGtEoru
KR4AoIK8urUWsFw/HGCkbe7UBML2QCWG
=hTXh
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ