SCIENTIFIC-LINUX-ERRATA Archives

June 2009

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Tue, 16 Jun 2009 13:47:04 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (53 lines)
Synopsis:	Moderate: wireshark security update
Issue date:	2009-06-15
CVE Names:	CVE-2009-1210 CVE-2009-1268 CVE-2009-1269
                 CVE-2009-1829

A format string flaw was found in Wireshark. If Wireshark read a 
malformed packet off a network or opened a malicious dump file, it could 
crash or, possibly, execute arbitrary code as the user running 
Wireshark. (CVE-2009-1210)

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2009-1268, CVE-2009-1269, CVE-2009-1829)

All running instances of Wireshark must be restarted for the update to 
take effect.

SL 3.0.x

       SRPMS:
wireshark-1.0.8-EL3.1.src.rpm
       i386:
wireshark-1.0.8-EL3.1.i386.rpm
wireshark-gnome-1.0.8-EL3.1.i386.rpm
       x86_64:
wireshark-1.0.8-EL3.1.x86_64.rpm
wireshark-gnome-1.0.8-EL3.1.x86_64.rpm

SL 4.x

       SRPMS:
wireshark-1.0.8-1.el4_8.1.src.rpm
       i386:
wireshark-1.0.8-1.el4_8.1.i386.rpm
wireshark-gnome-1.0.8-1.el4_8.1.i386.rpm
       x86_64:
wireshark-1.0.8-1.el4_8.1.x86_64.rpm
wireshark-gnome-1.0.8-1.el4_8.1.x86_64.rpm

SL 5.x

       SRPMS:
wireshark-1.0.8-1.el5_3.1.src.rpm
       i386:
wireshark-1.0.8-1.el5_3.1.i386.rpm
wireshark-gnome-1.0.8-1.el5_3.1.i386.rpm
       x86_64:
wireshark-1.0.8-1.el5_3.1.x86_64.rpm
wireshark-gnome-1.0.8-1.el5_3.1.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2