lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <42D86A91.50406@videotron.ca>
Date: Fri, 15 Jul 2005 22:01:53 -0400
From: Marc Deslauriers <marcdeslauriers@...eotron.ca>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: [FLSA-2005:154272] Updated gdk-pixbuf packages fix a security issue

---------------------------------------------------------------------
               Fedora Legacy Update Advisory

Synopsis:          Updated gdk-pixbuf packages fix a security issue
Advisory ID:       FLSA:154272
Issue date:        2005-07-15
Product:           Red Hat Linux, Fedora Core
Keywords:          Bugfix
CVE Names:         CAN-2005-0891
---------------------------------------------------------------------


---------------------------------------------------------------------
1. Topic:

Updated gdk-pixbuf packages that fix a double free vulnerability are now
available.

The gdk-pixbuf package contains an image loading library used with the
GNOME GUI desktop environment.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386
Fedora Core 1 - i386

3. Problem description:

A bug was found in the way gdk-pixbuf processes BMP images. It is
possible that a specially crafted BMP image could cause a denial of
service attack on applications linked against gdk-pixbuf. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CAN-2005-0891 to this issue.

Users of gdk-pixbuf are advised to upgrade to these packages, which
contain a backported patch and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=154272

6. RPMs required:

Red Hat Linux 7.3:
SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/gdk-pixbuf-0.22.0-7.73.3.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/gdk-pixbuf-0.22.0-7.73.3.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/gdk-pixbuf-devel-0.22.0-7.73.3.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/gdk-pixbuf-gnome-0.22.0-7.73.3.legacy.i386.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/gdk-pixbuf-0.22.0-7.90.3.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/gdk-pixbuf-0.22.0-7.90.3.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/gdk-pixbuf-devel-0.22.0-7.90.3.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/gdk-pixbuf-gnome-0.22.0-7.90.3.legacy.i386.rpm

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/gdk-pixbuf-0.22.0-11.3.4.1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/gdk-pixbuf-0.22.0-11.3.4.1.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/gdk-pixbuf-devel-0.22.0-11.3.4.1.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/gdk-pixbuf-gnome-0.22.0-11.3.4.1.legacy.i386.rpm


7. Verification:

SHA1 sum                                 Package Name
---------------------------------------------------------------------

603ade3d2671dc2486de4e88e5753c390cfbe25c
redhat/7.3/updates/i386/gdk-pixbuf-0.22.0-7.73.3.legacy.i386.rpm
9af2cd78533f6aa3edf18e418f22972e96dd68b8
redhat/7.3/updates/i386/gdk-pixbuf-devel-0.22.0-7.73.3.legacy.i386.rpm
c23e9bfe47fa3e23d05da3d336f151f15f260467
redhat/7.3/updates/i386/gdk-pixbuf-gnome-0.22.0-7.73.3.legacy.i386.rpm
9b4c5298bcaff267cb7ffa0bbfe90e64f6f2d925
redhat/7.3/updates/SRPMS/gdk-pixbuf-0.22.0-7.73.3.legacy.src.rpm
34c176e0ff80d5cf680edd35aac08541a13cd4e6
redhat/9/updates/i386/gdk-pixbuf-0.22.0-7.90.3.legacy.i386.rpm
8dcb027f064d3a378f44354fbc8fbfdf54402113
redhat/9/updates/i386/gdk-pixbuf-devel-0.22.0-7.90.3.legacy.i386.rpm
53d96ae1336f7d4a442f239db2afc24ac91e27d5
redhat/9/updates/i386/gdk-pixbuf-gnome-0.22.0-7.90.3.legacy.i386.rpm
9fb12eae733ceca5606814fe6d46b9d2c2c63bd5
redhat/9/updates/SRPMS/gdk-pixbuf-0.22.0-7.90.3.legacy.src.rpm
26ad2e60b327e7f5d4d0a5056be6cd42b0bff150
fedora/1/updates/i386/gdk-pixbuf-0.22.0-11.3.4.1.legacy.i386.rpm
66885c30f770531c0dc53cc3715aa56633780613
fedora/1/updates/i386/gdk-pixbuf-devel-0.22.0-11.3.4.1.legacy.i386.rpm
f70ac09e0a5d768da740c37f1d5115589c6515e4
fedora/1/updates/i386/gdk-pixbuf-gnome-0.22.0-11.3.4.1.legacy.i386.rpm
2f70a1f23a819f242d916529e7b531d494ef45eb
fedora/1/updates/SRPMS/gdk-pixbuf-0.22.0-11.3.4.1.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

    sha1sum <filename>

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0891

9. Contact:

The Fedora Legacy security contact is <secnotice@...oralegacy.org>. More
project details at http://www.fedoralegacy.org

---------------------------------------------------------------------

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

--
fedora-legacy-list mailing list
fedora-legacy-list@...hat.com
http://www.redhat.com/mailman/listinfo/fedora-legacy-list

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ