|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:210-1
http://www.mandriva.com/security/
_______________________________________________________________________
Package : mono
Date : October 11, 2008
Affected: 2009.0
_______________________________________________________________________
Problem Description:
CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows
remote attackers to inject arbitrary HTTP headers and conduct HTTP
response splitting attacks via CRLF sequences in the query string.
The updated packages have been patched to fix the issue.
Update:
This update was too late for inclusion in Mandriva Linux 2009, so it
is being released now for that version.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3906
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2009.0:
b5ba7bb1b0f7588c50591caa1e4ab3ea 2009.0/i586/jay-1.9.1-5.1mdv2009.0.i586.rpm
eb00edeb6619fa7772949af5a77950e4 2009.0/i586/libmono0-1.9.1-5.1mdv2009.0.i586.rpm
93b1136112759fe92dfced587c6c696f 2009.0/i586/libmono-devel-1.9.1-5.1mdv2009.0.i586.rpm
88f6d3376a58a22562a7039397ec71b2 2009.0/i586/mono-1.9.1-5.1mdv2009.0.i586.rpm
f95a80d20ff55acc3789965861a78692 2009.0/i586/mono-bytefx-data-mysql-1.9.1-5.1mdv2009.0.i586.rpm
479d33f14fbf2d7ba980f2b6cdc289c4 2009.0/i586/mono-data-1.9.1-5.1mdv2009.0.i586.rpm
9bb8900a3a0e8f08de71634f24782f49 2009.0/i586/mono-data-firebird-1.9.1-5.1mdv2009.0.i586.rpm
0d78802fcc92a3710bba04f12c505875 2009.0/i586/mono-data-oracle-1.9.1-5.1mdv2009.0.i586.rpm
2a2c1d3e67282e3557bab2b7e9ecbda4 2009.0/i586/mono-data-postgresql-1.9.1-5.1mdv2009.0.i586.rpm
03704c857eec82cdc774037a4d9127ff 2009.0/i586/mono-data-sqlite-1.9.1-5.1mdv2009.0.i586.rpm
33bbef5906d86b8d49103890abc9ed28 2009.0/i586/mono-data-sybase-1.9.1-5.1mdv2009.0.i586.rpm
cec02782ae6674b884be8337b7c360b8 2009.0/i586/mono-doc-1.9.1-5.1mdv2009.0.i586.rpm
2ce320c94c83f8197bc3388f0bb8d2d0 2009.0/i586/mono-extras-1.9.1-5.1mdv2009.0.i586.rpm
be2c17c2ea4d9ecca33d9c88c02ebb24 2009.0/i586/mono-ibm-data-db2-1.9.1-5.1mdv2009.0.i586.rpm
68113f85c87f2fc3d753501615d75c78 2009.0/i586/mono-jscript-1.9.1-5.1mdv2009.0.i586.rpm
9e10cb48c758f1f2626033d906896c26 2009.0/i586/mono-locale-extras-1.9.1-5.1mdv2009.0.i586.rpm
c5e30b0b2a72935643283d378e163a46 2009.0/i586/mono-nunit-1.9.1-5.1mdv2009.0.i586.rpm
62304419db88985dc938e73d02748afd 2009.0/i586/mono-web-1.9.1-5.1mdv2009.0.i586.rpm
2114c4c61beb53cec128742b3eb962cd 2009.0/i586/mono-winforms-1.9.1-5.1mdv2009.0.i586.rpm
f7f47b023e448b4edebf943209a32f42 2009.0/SRPMS/mono-1.9.1-5.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64:
1b2ca9840e07c47758dcf3aa66ad4367 2009.0/x86_64/jay-1.9.1-5.1mdv2009.0.x86_64.rpm
16f5db14e7949dff516cfdaa2004f5d7 2009.0/x86_64/lib64mono0-1.9.1-5.1mdv2009.0.x86_64.rpm
e6ff401524139a6c4a3fe097bc274970 2009.0/x86_64/lib64mono-devel-1.9.1-5.1mdv2009.0.x86_64.rpm
157f138f5be18ecf545de96a1929e4b0 2009.0/x86_64/mono-1.9.1-5.1mdv2009.0.x86_64.rpm
1ab5a961ca38695a270dd6075a1583d1 2009.0/x86_64/mono-bytefx-data-mysql-1.9.1-5.1mdv2009.0.x86_64.rpm
c01fc743fdffa3732456a4475614f383 2009.0/x86_64/mono-data-1.9.1-5.1mdv2009.0.x86_64.rpm
e7d4830269f7faeb49613ebbb67f3dae 2009.0/x86_64/mono-data-firebird-1.9.1-5.1mdv2009.0.x86_64.rpm
b0d605fbaac97eddb4aa3bce5d1e1b57 2009.0/x86_64/mono-data-oracle-1.9.1-5.1mdv2009.0.x86_64.rpm
a8729be18c8c108b37a7083c13d8033a 2009.0/x86_64/mono-data-postgresql-1.9.1-5.1mdv2009.0.x86_64.rpm
8c194ba44afcbddcb90858b8855b3805 2009.0/x86_64/mono-data-sqlite-1.9.1-5.1mdv2009.0.x86_64.rpm
4eea17feb8b1893cb00bbcfe183cbb39 2009.0/x86_64/mono-data-sybase-1.9.1-5.1mdv2009.0.x86_64.rpm
9f277dc3d630ad9261a2c1a40a635e2b 2009.0/x86_64/mono-doc-1.9.1-5.1mdv2009.0.x86_64.rpm
bbb9c069ab919155ee1ec8eeb2671de1 2009.0/x86_64/mono-extras-1.9.1-5.1mdv2009.0.x86_64.rpm
46f1f4f03ae3c4252f42bf8f1b616e7a 2009.0/x86_64/mono-ibm-data-db2-1.9.1-5.1mdv2009.0.x86_64.rpm
9edd0f3f9754d5b732c1ce0737fa2899 2009.0/x86_64/mono-jscript-1.9.1-5.1mdv2009.0.x86_64.rpm
5abebe6e93d2f070a4f3551e82e9b0f4 2009.0/x86_64/mono-locale-extras-1.9.1-5.1mdv2009.0.x86_64.rpm
4a352a358ceff9d07d6558efe1efebaa 2009.0/x86_64/mono-nunit-1.9.1-5.1mdv2009.0.x86_64.rpm
610526970facf1ce4541c390ef6a2b3e 2009.0/x86_64/mono-web-1.9.1-5.1mdv2009.0.x86_64.rpm
75d98e18a5fc2b14877125ecd0375197 2009.0/x86_64/mono-winforms-1.9.1-5.1mdv2009.0.x86_64.rpm
f7f47b023e448b4edebf943209a32f42 2009.0/SRPMS/mono-1.9.1-5.1mdv2009.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team