Bug 7056 - etherape missing update for security issue CVE-2011-3369
Summary: etherape missing update for security issue CVE-2011-3369
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 1
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL: http://lwn.net/Vulnerabilities/464269/
Whiteboard: MGA1-32-OK MGA1-64-OK
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2012-08-14 18:51 CEST by David Walser
Modified: 2012-08-18 12:20 CEST (History)
3 users (show)

See Also:
Source RPM: etherape-0.9.10-1.mga1.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2012-08-14 18:51:23 CEST
OpenSuSE has issued an advisory on October 24:
http://lists.opensuse.org/opensuse-updates/2011-10/msg00029.html

Updated package uploaded for Mageia 1.

Advisory:
========================

Updated etherape package fixes security vulnerability:

The add_conversation function in conversations.c in EtherApe before
0.9.12 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via an RPC packet, related to the
get_rpc function in decode_proto.c (CVE-2011-3369).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3369
http://lists.opensuse.org/opensuse-updates/2011-10/msg00029.html
========================

Updated packages in core/updates_testing:
========================
etherape-0.9.12-1.mga1

from etherape-0.9.12-1.mga1.src.rpm
Comment 1 Dave Hodgins 2012-08-16 20:27:27 CEST
Testing complete on Mageia 1 i586 and x86-64.

No poc that I could find, so just confirming the program works.

Could someone from the sysadmin team push the srpm
etherape-0.9.12-1.mga1.src.rpm
from Mageia 1 Core Updates Testing to Core Updates.

Advisory: Updated etherape package fixes security vulnerability:

The add_conversation function in conversations.c in EtherApe before
0.9.12 allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via an RPC packet, related to the
get_rpc function in decode_proto.c (CVE-2011-3369).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3369
http://lists.opensuse.org/opensuse-updates/2011-10/msg00029.html

https://bugs.mageia.org/show_bug.cgi?id=7056

Keywords: (none) => validated_update
CC: (none) => davidwhodgins, sysadmin-bugs
Whiteboard: (none) => MGA1-32-OK MGA1-64-OK

Comment 2 Thomas Backlund 2012-08-18 12:20:08 CEST
Update pushed:
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0224

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.