Mandriva Linux
Mandriva Linux Security Update Advisory
Package name: tcpdump
Advisory ID: MDKSA-2005:101
Date: June 15th, 2005
Affected versions: 10.1, 10.2
Problem Description:
A Denial of Service vulnerability was found in tcpdump during
the processing of certain network packages. Because of this flaw,
it was possible for an attacker to inject a carefully crafted
packet onto the network which would crash a running tcpdump
session.
The updated packages have been patched to correct this problem.
This problem does not affect at least tcpdump 3.8.1 and
earlier.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1267
Updated Packages:
Mandrakelinux 10.1:
19f997352f3fef16e9809c33a9fd9e6f
10.1/RPMS/tcpdump-3.8.3-2.2.101mdk.i586.rpm
91566ff6914608573f685a750a23e4a2
10.1/SRPMS/tcpdump-3.8.3-2.2.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
23da8b573535902af955c3bc52b8da45
x86_64/10.1/RPMS/tcpdump-3.8.3-2.2.101mdk.x86_64.rpm
91566ff6914608573f685a750a23e4a2
x86_64/10.1/SRPMS/tcpdump-3.8.3-2.2.101mdk.src.rpm
Mandrakelinux 10.2:
317345c2da874d9c8b1333fcf7b0f81a
10.2/RPMS/tcpdump-3.8.3-2.2.102mdk.i586.rpm
c7e1bb066e89aaa17188a9548262aee3
10.2/SRPMS/tcpdump-3.8.3-2.2.102mdk.src.rpm
Mandrakelinux 10.2/X86_64:
49053eec4a4b00732cef1da5405a2ea5
x86_64/10.2/RPMS/tcpdump-3.8.3-2.2.102mdk.x86_64.rpm
c7e1bb066e89aaa17188a9548262aee3
x86_64/10.2/SRPMS/tcpdump-3.8.3-2.2.102mdk.src.rpm
To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:
gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
Ubuntu Linux
Ubuntu Security Notice USN-140-1 June 15, 2005
gaim vulnerability
CAN-2005-1934
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected:
gaim
The problem can be corrected by upgrading the affected package
to version 1:1.0.0-1ubuntu1.6 (for Ubuntu 4.10), or
1:1.1.4-1ubuntu4.3 (for Ubuntu 5.04). After doing a standard system
upgrade you need to restart Gaim to effect the necessary
changes.
Details follow:
A remote Denial of Service vulnerability was discovered in Gaim.
A remote attacker could crash the Gaim client of an MSN user by
sending a specially crafted MSN package which states an invalid
body length in the header.
Updated packages for Ubuntu 4.10 (Warty Warthog):
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6.diff.gz
Size/MD5: 48444 468f68e015435db9a0f7113808c57e58
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6.dsc
Size/MD5: 853 622bcdbdc5066a6596a42ea4ab8f7e22
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0.orig.tar.gz
Size/MD5: 6985979 7dde686aace751a49dce734fd0cb7ace
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6_amd64.deb
Size/MD5: 3444948 cae0518c1f2fa14f4e838dd46376fde4
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6_i386.deb
Size/MD5: 3355296 bf14bf90ac7a3bebae7891d8142c3a0e
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6_powerpc.deb
Size/MD5: 3418564 5becbf0f173331db116136a19522698f
Updated packages for Ubuntu 5.04 (Hoary Hedgehog):
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3.diff.gz
Size/MD5: 108334 e8ae93ed55c364fdef75d6afa2888bf1
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3.dsc
Size/MD5: 991 4ca52b48cfccb93b4a8c3f3e712a5859
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4.orig.tar.gz
Size/MD5: 5188552 b55bf3217b271918384f3f015a6e5b62
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim-data_1.1.4-1ubuntu4.3_all.deb
Size/MD5: 603678 37e36ea56bfd32754f540ae04a929903
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim-dev_1.1.4-1ubuntu4.3_amd64.deb
Size/MD5: 101624 dd693d77a9fb58eed430e18d38bdb5e7
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3_amd64.deb
Size/MD5: 934222 c3a8d7c1fcb1789363ad277acf0cb4c2
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim-dev_1.1.4-1ubuntu4.3_i386.deb
Size/MD5: 101612 22e78fb3580dc128eeb6e3d2b7491436
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3_i386.deb
Size/MD5: 845570 2baab76439b0274b26416cfa3eba3cac
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim-dev_1.1.4-1ubuntu4.3_powerpc.deb
Size/MD5: 101642 722cbc574f4d128f9806430957828695
http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3_powerpc.deb
Size/MD5: 910476 ef04e16bf2d2dd7aac67bb58173199e0