openSUSE Security Update : whois (openSUSE-SU-2013:1670-1)

Medium Nessus Plugin ID 75198

Synopsis

The remote openSUSE host is missing a security update.

Description

- update to 5.0.26 [bnc#848594]

- Added the .cf TLD server.

- Updated the .bi TLD server.

- Added a new ASN allocation.

- includes changes from 5.0.25

- Added the .ax, .bn, .iq, .pw and .rw TLD servers.

- Updated one or more translations.

- includes updates changes 5.0.24 :

- Merged documentation fixes and the whois.conf(5) man page

- Added a new ASN allocation.

- Updated one or more translations.

- includes changes from 5.0.23

- whois.nic.or.kr switched from EUC-KR to UTF-8.

- includes changes from 5.0.22

- Fixed cross-compiling

- includes changes from 5.0.21

- Fixed parsing of 6to4 addresses

- Added the .xn--j1amh (.укр, Ukraine) TLD server.

- Updated the .bi, .se and .vn TLD servers.

- Removed whois.pandi.or.id from the list of servers which support the RIPE extensions, since it does not anymore and queries are broken.

- Updated some disclaimer suppression strings.

- Respect DEB_HOST_GNU_TYPE when selecting CC for cross-compiling.

- includes changes form 5.0.20

- Updated the .by, .ng, .om, .sm, .tn, .ug and .vn TLD servers.

- Added the .bw, .td, .xn--mgb9awbf (عماÙ&#134 ;., Oman), .xn--mgberp4a5d4ar (.السØ&sup 1;وديØ&cop y;, Saudi Arabia) and .xn--mgbx4cd0ab (ﻢﻠï»&acu te;ﺴﻳïº&#1 41;., Malaysia) TLD servers.

- Removed the .kp, .mc, .rw and .xn--mgba3a4f16a (ایرØ&sec t;Ù†., Iran) TLD servers.

- includes changes from 5.0.19

- Added the .post TLD server.

- Updated the .co.za SLD servers.

- Added the .alt.za, .net.za and .web.za SLD servers.

- whois.ua changed (?) the encoding to utf-8.

- Fixed the parsing of 6to4 addresses like whois 2002:xxxx::.

- includes changes from 5.0.18

- Updated the .ae and .xn--mgbaam7a8h (.اماØ&plu smn;ات, United Arabs Emirates) TLDs.

- Updated the server charset table for .fr and .it.

- includes changes from whois 5.0.17

- Updated the .bi, .fo, .gr and .gt TLD servers.

- Removed support for recursion of .org queries, it has been a thick registry since 2005.

- includes changes from 5.0.16

- Added the .xn--80ao21a (.ҚАЗ, Kazakhstan) TLD server.

- Updated the .ec and .ee TLD servers.

- Removed the .xn--mgbc0a9azcg (.المØ&ord m;رب, Morocco) and .xn--mgberp4a5d4ar (.السØ&sup 1;وديØ&cop y;, Saudi Arabia) TLD servers.

- Added a new ASN allocation.

- Updated one or more translations.

- includes changes from 5.0.15

- Added the .xn--mgba3a4f16a (ایرØ&sec t;Ù†., Iran) TLD server.

- Updated the .pe TLD server, this time for real.

- Updated one or more translations.

- includes changes from 5.0.14

- Added the .sx TLD server.

- Updated the .pe TLD server.

- includes changes from 5.0.13

- Updated the .hr TLD server.

- Improved the package description

- Updated the FSF address in licenses.

- includes changes from 5.0.12

- Recursion disabled when the query string contains spaces, because probably the query format will not be compatible with the referral server (e.g. whois to rwhois or ARIN to RIPE).

- Add the '+' flag by default to queries to whois.arin.net if the argument looks like an IP address. Also add the 'a' and 'n' flags. No thanks to ARIN for breaking every whois client.

- Added the .cv, .lk, .mq, .sy, .so, .biz.ua, .co.ua, .pp.ua, .qa, .xn--3e0b707e (.한국, Korea), .xn--45brj9c (.ভাà& brvbar;°à¦¤, India, Bengali), .xn--90a3ac (.СРБ, Serbia), .xn--clchc0ea0b2g2a9gcd (.சிà®& #153;்கà&reg ;ªà¯à®ªà&m acr;‚ர், Singapore, Tamil), .xn--fpcrj9c3d (.à°­à°¾à°&d eg;త్, India, Telugu), .xn--fzc2c9e2c (.ලංà&par a;šà·, Sri Lanka, Sinhala), .xn--gecrj9c (.ભાà&ordf ;°àª¤, India, Gujarati), .xn--h2brj9c (.भाà& curren;°à¤¤, India, Hindi), .xn--lgbbat1ad8j (.الجØ&sup2 ;ائر, Algeria), .xn--mgbayh7gpa (.الاØ&plu smn;دن, Jordan), .xn--mgbbh1a71e (.بھاØ&pl usmn;ت, India, Urdu), .xn--mgbc0a9azcg (.المØ&ord m;رب, Morocco), .xn--ogbpf8fl (.سورÙ&# 138;Ø©, Syria), .xn--s9brj9c (.ਭਾà¨&d eg;ਤ, India, Punjabi), .xn--xkc2al3hye2a (.இலà®&#1 53;்கà¯
ˆ, Sri Lanka, Tamil), .xn--wgbl6a (.قطر, Qatar), .xn--xkc2dl3a5ee0h (.இநà¯&#1 41;திà&re g;¯à®¾, India, Tamil), .xn--yfro4i67o (.新加å&iex cl;, Singapore, Chinese) and .xxx TLD servers. (Closes:
#642424),

- Added the .priv.at pseudo-SLD server.

- Updated the .co, .gf, .gp, .kr, .li, .rs, .ru, .su, .sv, .ua and .xn--p1ai TLD servers. (Closes: #590425, #634830, #627478)

- Added a new ASN allocation.

- Fixed a typo and -t syntax in whois(1). (Closes:
#614973, #632588)

- Made whois return an error in some cases, code contributed by David Souther.

- Split HAVE_LINUX_CRYPT_GENSALT from HAVE_XCRYPT to support SuSE, which has it builtin in the libc. Added untested support for Solaris' crypt_gensalt(3). This and the following changes have been contributed by Ludwig Nussel of SuSE.

- mkpasswd: stop rejecting non-ASCII characters.

- mkpasswd: added support for the 2y algorithm, which fixes CVE-2011-2483.

- mkpasswd: raised the number of rounds for 2a/2y from 4 to 5, which is the current default.

- mkpasswd: removed support for 2 and (SHA), which actually are not supported by FreeBSD and libxcrypt.

- packaging changes

- removed patches accepted upstream:
whois-5.0.11-mkpasswd-support-Owl-patched-libcrypt.diff whois-5.0.11-mkpasswd-crypt_gensalt-might-change-the-pre fix.diff whois-5.0.11-mkpasswd-support-8bit-characters.diff whois-5.0.11-mkpasswd-add-support-for-the-new-2y-blowfis h-tag-CVE-2011-2483.diff whois-5.0.11-mkpasswd-set-default-blowfish-rounds-to-5.d iff whois-5.0.11-mkpasswd-remove-obsolete-settings.diff

- removed patches no longer required:
whois-5.0.11-mkpasswd-fix-compiler-warnings.diff

- updated patches: whois-4.7.33-nb.patch to whois-5.0.25-nb.patch

- verify source signatures

- crypt_gensalt moved to separate library libowcrypt (fate#314945)

- update to 5.0.26 [bnc#848594]

- Added the .cf TLD server.

- Updated the .bi TLD server.

- Added a new ASN allocation.

- includes changes from 5.0.25

- Added the .ax, .bn, .iq, .pw and .rw TLD servers.

- Updated one or more translations.

- includes updates changes 5.0.24 :

- Merged documentation fixes and the whois.conf(5) man page

- Added a new ASN allocation.

- Updated one or more translations.

- includes changes from 5.0.23

- whois.nic.or.kr switched from EUC-KR to UTF-8.

- includes changes from 5.0.22

- Fixed cross-compiling

- includes changes from 5.0.21

- Fixed parsing of 6to4 addresses

- Added the .xn--j1amh (.укр, Ukraine) TLD server.

- Updated the .bi, .se and .vn TLD servers.

- Removed whois.pandi.or.id from the list of servers which support the RIPE extensions, since it does not anymore and queries are broken.

- Updated some disclaimer suppression strings.

- Respect DEB_HOST_GNU_TYPE when selecting CC for cross-compiling.

- includes changes form 5.0.20

- Updated the .by, .ng, .om, .sm, .tn, .ug and .vn TLD servers.

- Added the .bw, .td, .xn--mgb9awbf (عماÙ&#134 ;., Oman), .xn--mgberp4a5d4ar (.السØ&sup 1;وديØ&cop y;, Saudi Arabia) and .xn--mgbx4cd0ab (ﻢﻠï»&acu te;ﺴﻳïº&#1 41;., Malaysia) TLD servers.

- Removed the .kp, .mc, .rw and .xn--mgba3a4f16a (ایرØ&sec t;Ù†., Iran) TLD servers.

- includes changes from 5.0.19

- Added the .post TLD server.

- Updated the .co.za SLD servers.

- Added the .alt.za, .net.za and .web.za SLD servers.

- whois.ua changed (?) the encoding to utf-8.

- Fixed the parsing of 6to4 addresses like whois 2002:xxxx::.

- includes changes from 5.0.18

- Updated the .ae and .xn--mgbaam7a8h (.اماØ&plu smn;ات, United Arabs Emirates) TLDs.

- Updated the server charset table for .fr and .it.

- includes changes from whois 5.0.17

- Updated the .bi, .fo, .gr and .gt TLD servers.

- Removed support for recursion of .org queries, it has been a thick registry since 2005.

- includes changes from 5.0.16

- Added the .xn--80ao21a (.ҚАЗ, Kazakhstan) TLD server.

- Updated the .ec and .ee TLD servers.

- Removed the .xn--mgbc0a9azcg (.المØ&ord m;رب, Morocco) and .xn--mgberp4a5d4ar (.السØ&sup 1;وديØ&cop y;, Saudi Arabia) TLD servers.

- Added a new ASN allocation.

- Updated one or more translations.

- includes changes from 5.0.15

- Added the .xn--mgba3a4f16a (ایرØ&sec t;Ù†., Iran) TLD server.

- Updated the .pe TLD server, this time for real.

- Updated one or more translations.

- includes changes from 5.0.14

- Added the .sx TLD server.

- Updated the .pe TLD server.

- includes changes from 5.0.13

- Updated the .hr TLD server.

- Improved the package description

- Updated the FSF address in licenses.

- includes changes from 5.0.12

- Recursion disabled when the query string contains spaces, because probably the query format will not be compatible with the referral server (e.g. whois to rwhois or ARIN to RIPE).

- Add the '+' flag by default to queries to whois.arin.net if the argument looks like an IP address. Also add the 'a' and 'n' flags. No thanks to ARIN for breaking every whois client.

- Added the .cv, .lk, .mq, .sy, .so, .biz.ua, .co.ua, .pp.ua, .qa, .xn--3e0b707e (.한국, Korea), .xn--45brj9c (.ভাà& brvbar;°à¦¤, India, Bengali), .xn--90a3ac (.СРБ, Serbia), .xn--clchc0ea0b2g2a9gcd (.சிà®& #153;்கà&reg ;ªà¯à®ªà&m acr;‚ர், Singapore, Tamil), .xn--fpcrj9c3d (.à°­à°¾à°&d eg;త్, India, Telugu), .xn--fzc2c9e2c (.ලංà&par a;šà·, Sri Lanka, Sinhala), .xn--gecrj9c (.ભાà&ordf ;°àª¤, India, Gujarati), .xn--h2brj9c (.भाà& curren;°à¤¤, India, Hindi), .xn--lgbbat1ad8j (.الجØ&sup2 ;ائر, Algeria), .xn--mgbayh7gpa (.الاØ&plu smn;دن, Jordan), .xn--mgbbh1a71e (.بھاØ&pl usmn;ت, India, Urdu), .xn--mgbc0a9azcg (.المØ&ord m;رب, Morocco), .xn--ogbpf8fl (.سورÙ&# 138;Ø©, Syria), .xn--s9brj9c (.ਭਾà¨&d eg;ਤ, India, Punjabi), .xn--xkc2al3hye2a (.இலà®&#1 53;்கà¯
ˆ, Sri Lanka, Tamil), .xn--wgbl6a (.قطر, Qatar), .xn--xkc2dl3a5ee0h (.இநà¯&#1 41;திà&re g;¯à®¾, India, Tamil), .xn--yfro4i67o (.新加å&iex cl;, Singapore, Chinese) and .xxx TLD servers. (Closes:
#642424),

- Added the .priv.at pseudo-SLD server.

- Updated the .co, .gf, .gp, .kr, .li, .rs, .ru, .su, .sv, .ua and .xn--p1ai TLD servers. (Closes: #590425, #634830, #627478)

- Added a new ASN allocation.

- Fixed a typo and -t syntax in whois(1). (Closes:
#614973, #632588)

- Made whois return an error in some cases, code contributed by David Souther.

- Split HAVE_LINUX_CRYPT_GENSALT from HAVE_XCRYPT to support SuSE, which has it builtin in the libc. Added untested support for Solaris' crypt_gensalt(3). This and the following changes have been contributed by Ludwig Nussel of SuSE.

- mkpasswd: stop rejecting non-ASCII characters.

- mkpasswd: added support for the 2y algorithm, which fixes CVE-2011-2483.

- mkpasswd: raised the number of rounds for 2a/2y from 4 to 5, which is the current default.

- mkpasswd: removed support for 2 and (SHA), which actually are not supported by FreeBSD and libxcrypt.

- packaging changes

- removed patches accepted upstream:
whois-5.0.11-mkpasswd-support-Owl-patched-libcrypt.diff whois-5.0.11-mkpasswd-crypt_gensalt-might-change-the-pre fix.diff whois-5.0.11-mkpasswd-support-8bit-characters.diff whois-5.0.11-mkpasswd-add-support-for-the-new-2y-blowfis h-tag-CVE-2011-2483.diff whois-5.0.11-mkpasswd-set-default-blowfish-rounds-to-5.d iff whois-5.0.11-mkpasswd-remove-obsolete-settings.diff

- removed patches no longer required:
whois-5.0.11-mkpasswd-fix-compiler-warnings.diff

- updated patches: whois-4.7.33-nb.patch to whois-5.0.25-nb.patch

- verify source signatures

- crypt_gensalt moved to separate library libowcrypt (fate#314945)

Solution

Update the affected whois packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=848594

https://lists.opensuse.org/opensuse-updates/2013-11/msg00025.html

Plugin Details

Severity: Medium

ID: 75198

File Name: openSUSE-2013-849.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2014/06/13

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:whois, p-cpe:/a:novell:opensuse:whois-debuginfo, p-cpe:/a:novell:opensuse:whois-debugsource, cpe:/o:novell:opensuse:12.2, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2013/11/06

Vulnerability Publication Date: 2011/08/25

Reference Information

CVE: CVE-2011-2483