lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <E1DBLQA-0001SW-KI@updates.mandrakesoft.com> Date: Tue, 15 Mar 2005 16:25:54 -0700 From: Mandrakelinux Security Team <security@...ux-mandrake.com> To: bugtraq@...urityfocus.com Subject: MDKSA-2005:056 - Updated koffice packages fix vulnerabilities on 64 bit platforms -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandrakelinux Security Update Advisory _______________________________________________________________________ Package name: koffice Advisory ID: MDKSA-2005:056 Date: March 15th, 2005 Affected versions: 10.0, 10.1, Corporate 3.0 ______________________________________________________________________ Problem Description: Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications like koffice, that use embedded versions of xpdf. The updated packages are patched to deal with these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0206 ______________________________________________________________________ Updated Packages: Mandrakelinux 10.0/AMD64: 7f931ad069dd1f947466ccb397dadd41 amd64/10.0/RPMS/koffice-1.3-12.3.100mdk.amd64.rpm f5d5adf2c4c2feaae71c57f4466d6475 amd64/10.0/RPMS/lib64koffice2-1.3-12.3.100mdk.amd64.rpm 673043066ddd03b6e9ddc956bb59e8d8 amd64/10.0/RPMS/lib64koffice2-devel-1.3-12.3.100mdk.amd64.rpm 935c218d6e9fed438f670d1cb82e237d amd64/10.0/SRPMS/koffice-1.3-12.3.100mdk.src.rpm Mandrakelinux 10.1/X86_64: 45f6ab8c80d669cc2c9845aea1723a2d x86_64/10.1/RPMS/koffice-1.3.3-2.3.101mdk.x86_64.rpm 584447ad2706422c5d251a56909dac59 x86_64/10.1/RPMS/koffice-karbon-1.3.3-2.3.101mdk.x86_64.rpm eb0f00cea98c99fa08d98aa1a5c5de1e x86_64/10.1/RPMS/koffice-kformula-1.3.3-2.3.101mdk.x86_64.rpm 7202b35def74d5b4cc6eaba808327b97 x86_64/10.1/RPMS/koffice-kivio-1.3.3-2.3.101mdk.x86_64.rpm 151d9c3e30e13e80805b860e75eeb296 x86_64/10.1/RPMS/koffice-koshell-1.3.3-2.3.101mdk.x86_64.rpm 5c886857f9126039391ae73bb514fbbf x86_64/10.1/RPMS/koffice-kpresenter-1.3.3-2.3.101mdk.x86_64.rpm 632609260d0870b52f43a35d70699265 x86_64/10.1/RPMS/koffice-kspread-1.3.3-2.3.101mdk.x86_64.rpm 9ea73ee7c46a205bb623b0fb5e4d11ff x86_64/10.1/RPMS/koffice-kugar-1.3.3-2.3.101mdk.x86_64.rpm a62734d93e4ea4d8558bb37535677d36 x86_64/10.1/RPMS/koffice-kword-1.3.3-2.3.101mdk.x86_64.rpm df09390460a5872984d848a0e3c29f5c x86_64/10.1/RPMS/koffice-progs-1.3.3-2.3.101mdk.x86_64.rpm a4472f6a89a554d68cf7f7d5d8100554 x86_64/10.1/RPMS/lib64koffice2-karbon-1.3.3-2.3.101mdk.x86_64.rpm ffd16d8148b112471011497a66a33b5e x86_64/10.1/RPMS/lib64koffice2-kformula-1.3.3-2.3.101mdk.x86_64.rpm 1dc40357f65b835bfc7ab199879f272c x86_64/10.1/RPMS/lib64koffice2-kivio-1.3.3-2.3.101mdk.x86_64.rpm aa9709b879dce5eaa0a000ef88f4141a x86_64/10.1/RPMS/lib64koffice2-koshell-1.3.3-2.3.101mdk.x86_64.rpm 9311b78399dbc2868f1a2bcb1ad72dfd x86_64/10.1/RPMS/lib64koffice2-kpresenter-1.3.3-2.3.101mdk.x86_64.rpm 9f74928ded87095345415ce21501c417 x86_64/10.1/RPMS/lib64koffice2-kspread-1.3.3-2.3.101mdk.x86_64.rpm e139c1a102bbc811f383a857da5e41a6 x86_64/10.1/RPMS/lib64koffice2-kspread-devel-1.3.3-2.3.101mdk.x86_64.rpm e376812548fe87aebf95142d0fcae147 x86_64/10.1/RPMS/lib64koffice2-kugar-1.3.3-2.3.101mdk.x86_64.rpm 0fe92ec05d8b74a30ba7c5c13b808786 x86_64/10.1/RPMS/lib64koffice2-kugar-devel-1.3.3-2.3.101mdk.x86_64.rpm 5927a01c6d28440a8d655e5ae5eac369 x86_64/10.1/RPMS/lib64koffice2-kword-1.3.3-2.3.101mdk.x86_64.rpm 769cdff5737561ad6d4837a0a8d01518 x86_64/10.1/RPMS/lib64koffice2-kword-devel-1.3.3-2.3.101mdk.x86_64.rpm b1fb12d63d3f4aac48a1573e52a3fbf9 x86_64/10.1/RPMS/lib64koffice2-progs-1.3.3-2.3.101mdk.x86_64.rpm 0f634d3e816eb0a6e354aed2adb82f70 x86_64/10.1/RPMS/lib64koffice2-progs-devel-1.3.3-2.3.101mdk.x86_64.rpm 81c6b124e48ac3434a187bf38e94ca86 x86_64/10.1/SRPMS/koffice-1.3.3-2.3.101mdk.src.rpm Corporate 3.0/X86_64: 73d7a4f1fd171db14e6ecbb493d7a421 x86_64/corporate/3.0/RPMS/koffice-1.3-12.3.C30mdk.x86_64.rpm b10e7c90da4be536624c494e73d521f0 x86_64/corporate/3.0/RPMS/lib64koffice2-1.3-12.3.C30mdk.x86_64.rpm 86f685f7c7ee6799928eb15b19427a7c x86_64/corporate/3.0/RPMS/lib64koffice2-devel-1.3-12.3.C30mdk.x86_64.rpm 968cbae5b960de8c596b6b2e34fd57cb x86_64/corporate/3.0/SRPMS/koffice-1.3-12.3.C30mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandrakelinux at: http://www.mandrakesoft.com/security/advisories If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFCN28CmqjQ0CJFipgRArBqAKDTe1QEp/jaW9o0MeGxUifcWbaK9ACgv0P1 c2VhZg8T379s6dX4xpzHklI= =5I3l -----END PGP SIGNATURE-----
Powered by blists - more mailing lists