Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A number of Denial of Service vulnerabilities were discovered in the
way that tcpdump processes certain network packets. If abused, these
flaws can allow a remote attacker to inject a carefully crafted packet
onto the network, crashing tcpdump.
The provided packages have been patched to correct these issues.
Updated Packages |
Mandrakelinux 10.0
e73bd8a6947c3685f0a1dcd370103a2d 10.0/RPMS/tcpdump-3.8.1-1.2.100mdk.i586.rpm 1e36745b1695e0272989183d00489401 10.0/SRPMS/tcpdump-3.8.1-1.2.100mdk.src.rpm
Mandrakelinux 10.0/AMD64
49a077ec66ad00b73e7448328ef86b44 amd64/10.0/RPMS/tcpdump-3.8.1-1.2.100mdk.amd64.rpm 1e36745b1695e0272989183d00489401 amd64/10.0/SRPMS/tcpdump-3.8.1-1.2.100mdk.src.rpm
Mandrakelinux 10.1
67d319eed39f1bafb30a25e57f7add2a 10.1/RPMS/tcpdump-3.8.3-2.1.101mdk.i586.rpm 9367b2c7064311b7552a516c71da2335 10.1/SRPMS/tcpdump-3.8.3-2.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64
797c8b13a984821bf42b3a1ff1f0606f x86_64/10.1/RPMS/tcpdump-3.8.3-2.1.101mdk.x86_64.rpm 9367b2c7064311b7552a516c71da2335 x86_64/10.1/SRPMS/tcpdump-3.8.3-2.1.101mdk.src.rpm
Corporate Server 2.1
aa300032c33e2bbe3f4a164a0202c410 corporate/2.1/RPMS/tcpdump-3.7.2-2.3.C21mdk.i586.rpm d56843af254ecdebf9c047f6fb903149 corporate/2.1/SRPMS/tcpdump-3.7.2-2.3.C21mdk.src.rpm
Corporate Server 2.1/X86_64
d539efda2769654b6a7368b74565d613 x86_64/corporate/2.1/RPMS/tcpdump-3.7.2-2.3.C21mdk.x86_64.rpm d56843af254ecdebf9c047f6fb903149 x86_64/corporate/2.1/SRPMS/tcpdump-3.7.2-2.3.C21mdk.src.rpm
Corporate Server 3.0
df9e3b52c36c3a68aa3c5a12464dfa33 corporate/3.0/RPMS/tcpdump-3.8.1-1.2.C30mdk.i586.rpm 13100cead5f5b078e0b3249d1f522339 corporate/3.0/SRPMS/tcpdump-3.8.1-1.2.C30mdk.src.rpm
Corporate Server 3.0/X86_64
69a3d5fc2be9891eaeea2d1a0ebbfc09 x86_64/corporate/3.0/RPMS/tcpdump-3.8.1-1.2.C30mdk.x86_64.rpm 13100cead5f5b078e0b3249d1f522339 x86_64/corporate/3.0/SRPMS/tcpdump-3.8.1-1.2.C30mdk.src.rpm
Mandriva Linux LE2005
5e3b9eaf014d072536aee3d4153149fd 10.2/RPMS/tcpdump-3.8.3-2.1.102mdk.i586.rpm a84d58a6c8e197106db7550b89cd7bc9 10.2/SRPMS/tcpdump-3.8.3-2.1.102mdk.src.rpm
Mandriva Linux LE2005/X86_64
46175965cf9fe968060f04212469403d x86_64/10.2/RPMS/tcpdump-3.8.3-2.1.102mdk.x86_64.rpm a84d58a6c8e197106db7550b89cd7bc9 x86_64/10.2/SRPMS/tcpdump-3.8.3-2.1.102mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1278
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1279
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1280
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.