<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>19778</bug_id>
          
          <creation_ts>2009-04-26 21:14:06 +0400</creation_ts>
          <short_desc>Multiple vulnerabilities: CVE-2009-1210, CVE-2009-1268, CVE-2009-1269</short_desc>
          <delta_ts>2009-04-29 08:41:02 +0400</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>wireshark-base</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://www.wireshark.org/security/wnpa-sec-2009-02.html</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Anton Farygin">rider</assigned_to>
          <cc>ab</cc>
    
    <cc>ldv</cc>
    
    <cc>rider</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>90125</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-04-26 21:14:06 +0400</bug_when>
    <thetext>Обнаружены несколько уязвимостей в wireshark:

CVE-2009-1210 - The PROFINET dissector was vulnerable to a format string overflow. 
CVE-2009-1268 - The Check Point High-Availability Protocol (CPHAP) dissector could crash.
CVE-2009-1269 - Wireshark could crash while loading a Tektronix .rf5 file.

Upstream выпустил исправление в виде новой версии 1.0.7</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>90126</commentid>
    <comment_count>1</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-04-26 21:16:06 +0400</bug_when>
    <thetext>reassign</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>90127</commentid>
    <comment_count>2</comment_count>
    <who name="Alexander Bokovoy">ab</who>
    <bug_when>2009-04-26 21:23:43 +0400</bug_when>
    <thetext>Раорн, соберешь?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>90129</commentid>
    <comment_count>3</comment_count>
    <who name="Sir Raorn">raorn</who>
    <bug_when>2009-04-26 21:53:37 +0400</bug_when>
    <thetext>Мотороллер не мой.

$ git.alt acl sisyphus wireshark show                     
wireshark       ab</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>90134</commentid>
    <comment_count>4</comment_count>
    <who name="Alexander Bokovoy">ab</who>
    <bug_when>2009-04-26 23:35:48 +0400</bug_when>
    <thetext>task #5481</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>90302</commentid>
    <comment_count>5</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-04-28 19:46:08 +0400</bug_when>
    <thetext>прошло в sisyphus</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>90303</commentid>
    <comment_count>6</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-04-28 19:47:04 +0400</bug_when>
    <thetext>closed</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>90329</commentid>
    <comment_count>7</comment_count>
    <who name="Alexander Bokovoy">ab</who>
    <bug_when>2009-04-29 08:41:02 +0400</bug_when>
    <thetext>Прошу помощи с 4.0 и 4.1 -- до пятницы 1 мая не будет свободного времени.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>