-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:210-1 http://www.mandriva.com/security/ _______________________________________________________________________ Package : mono Date : October 11, 2008 Affected: 2009.0 _______________________________________________________________________ Problem Description: CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the query string. The updated packages have been patched to fix the issue. Update: This update was too late for inclusion in Mandriva Linux 2009, so it is being released now for that version. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3906 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: b5ba7bb1b0f7588c50591caa1e4ab3ea 2009.0/i586/jay-1.9.1-5.1mdv2009.0.i586.rpm eb00edeb6619fa7772949af5a77950e4 2009.0/i586/libmono0-1.9.1-5.1mdv2009.0.i586.rpm 93b1136112759fe92dfced587c6c696f 2009.0/i586/libmono-devel-1.9.1-5.1mdv2009.0.i586.rpm 88f6d3376a58a22562a7039397ec71b2 2009.0/i586/mono-1.9.1-5.1mdv2009.0.i586.rpm f95a80d20ff55acc3789965861a78692 2009.0/i586/mono-bytefx-data-mysql-1.9.1-5.1mdv2009.0.i586.rpm 479d33f14fbf2d7ba980f2b6cdc289c4 2009.0/i586/mono-data-1.9.1-5.1mdv2009.0.i586.rpm 9bb8900a3a0e8f08de71634f24782f49 2009.0/i586/mono-data-firebird-1.9.1-5.1mdv2009.0.i586.rpm 0d78802fcc92a3710bba04f12c505875 2009.0/i586/mono-data-oracle-1.9.1-5.1mdv2009.0.i586.rpm 2a2c1d3e67282e3557bab2b7e9ecbda4 2009.0/i586/mono-data-postgresql-1.9.1-5.1mdv2009.0.i586.rpm 03704c857eec82cdc774037a4d9127ff 2009.0/i586/mono-data-sqlite-1.9.1-5.1mdv2009.0.i586.rpm 33bbef5906d86b8d49103890abc9ed28 2009.0/i586/mono-data-sybase-1.9.1-5.1mdv2009.0.i586.rpm cec02782ae6674b884be8337b7c360b8 2009.0/i586/mono-doc-1.9.1-5.1mdv2009.0.i586.rpm 2ce320c94c83f8197bc3388f0bb8d2d0 2009.0/i586/mono-extras-1.9.1-5.1mdv2009.0.i586.rpm be2c17c2ea4d9ecca33d9c88c02ebb24 2009.0/i586/mono-ibm-data-db2-1.9.1-5.1mdv2009.0.i586.rpm 68113f85c87f2fc3d753501615d75c78 2009.0/i586/mono-jscript-1.9.1-5.1mdv2009.0.i586.rpm 9e10cb48c758f1f2626033d906896c26 2009.0/i586/mono-locale-extras-1.9.1-5.1mdv2009.0.i586.rpm c5e30b0b2a72935643283d378e163a46 2009.0/i586/mono-nunit-1.9.1-5.1mdv2009.0.i586.rpm 62304419db88985dc938e73d02748afd 2009.0/i586/mono-web-1.9.1-5.1mdv2009.0.i586.rpm 2114c4c61beb53cec128742b3eb962cd 2009.0/i586/mono-winforms-1.9.1-5.1mdv2009.0.i586.rpm f7f47b023e448b4edebf943209a32f42 2009.0/SRPMS/mono-1.9.1-5.1mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: 1b2ca9840e07c47758dcf3aa66ad4367 2009.0/x86_64/jay-1.9.1-5.1mdv2009.0.x86_64.rpm 16f5db14e7949dff516cfdaa2004f5d7 2009.0/x86_64/lib64mono0-1.9.1-5.1mdv2009.0.x86_64.rpm e6ff401524139a6c4a3fe097bc274970 2009.0/x86_64/lib64mono-devel-1.9.1-5.1mdv2009.0.x86_64.rpm 157f138f5be18ecf545de96a1929e4b0 2009.0/x86_64/mono-1.9.1-5.1mdv2009.0.x86_64.rpm 1ab5a961ca38695a270dd6075a1583d1 2009.0/x86_64/mono-bytefx-data-mysql-1.9.1-5.1mdv2009.0.x86_64.rpm c01fc743fdffa3732456a4475614f383 2009.0/x86_64/mono-data-1.9.1-5.1mdv2009.0.x86_64.rpm e7d4830269f7faeb49613ebbb67f3dae 2009.0/x86_64/mono-data-firebird-1.9.1-5.1mdv2009.0.x86_64.rpm b0d605fbaac97eddb4aa3bce5d1e1b57 2009.0/x86_64/mono-data-oracle-1.9.1-5.1mdv2009.0.x86_64.rpm a8729be18c8c108b37a7083c13d8033a 2009.0/x86_64/mono-data-postgresql-1.9.1-5.1mdv2009.0.x86_64.rpm 8c194ba44afcbddcb90858b8855b3805 2009.0/x86_64/mono-data-sqlite-1.9.1-5.1mdv2009.0.x86_64.rpm 4eea17feb8b1893cb00bbcfe183cbb39 2009.0/x86_64/mono-data-sybase-1.9.1-5.1mdv2009.0.x86_64.rpm 9f277dc3d630ad9261a2c1a40a635e2b 2009.0/x86_64/mono-doc-1.9.1-5.1mdv2009.0.x86_64.rpm bbb9c069ab919155ee1ec8eeb2671de1 2009.0/x86_64/mono-extras-1.9.1-5.1mdv2009.0.x86_64.rpm 46f1f4f03ae3c4252f42bf8f1b616e7a 2009.0/x86_64/mono-ibm-data-db2-1.9.1-5.1mdv2009.0.x86_64.rpm 9edd0f3f9754d5b732c1ce0737fa2899 2009.0/x86_64/mono-jscript-1.9.1-5.1mdv2009.0.x86_64.rpm 5abebe6e93d2f070a4f3551e82e9b0f4 2009.0/x86_64/mono-locale-extras-1.9.1-5.1mdv2009.0.x86_64.rpm 4a352a358ceff9d07d6558efe1efebaa 2009.0/x86_64/mono-nunit-1.9.1-5.1mdv2009.0.x86_64.rpm 610526970facf1ce4541c390ef6a2b3e 2009.0/x86_64/mono-web-1.9.1-5.1mdv2009.0.x86_64.rpm 75d98e18a5fc2b14877125ecd0375197 2009.0/x86_64/mono-winforms-1.9.1-5.1mdv2009.0.x86_64.rpm f7f47b023e448b4edebf943209a32f42 2009.0/SRPMS/mono-1.9.1-5.1mdv2009.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFI8L0lmqjQ0CJFipgRApwyAJ4vLjYUZyjYUW0JoUk0A8zJfB4R3gCgulFi fJ00hjtK0gKPiw9KBQdLIhs= =M6oK -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/