lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <42D86A91.50406@videotron.ca> Date: Sat Jul 16 03:01:37 2005 From: marcdeslauriers at videotron.ca (Marc Deslauriers) Subject: [FLSA-2005:154272] Updated gdk-pixbuf packages fix a security issue --------------------------------------------------------------------- Fedora Legacy Update Advisory Synopsis: Updated gdk-pixbuf packages fix a security issue Advisory ID: FLSA:154272 Issue date: 2005-07-15 Product: Red Hat Linux, Fedora Core Keywords: Bugfix CVE Names: CAN-2005-0891 --------------------------------------------------------------------- --------------------------------------------------------------------- 1. Topic: Updated gdk-pixbuf packages that fix a double free vulnerability are now available. The gdk-pixbuf package contains an image loading library used with the GNOME GUI desktop environment. 2. Relevant releases/architectures: Red Hat Linux 7.3 - i386 Red Hat Linux 9 - i386 Fedora Core 1 - i386 3. Problem description: A bug was found in the way gdk-pixbuf processes BMP images. It is possible that a specially crafted BMP image could cause a denial of service attack on applications linked against gdk-pixbuf. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0891 to this issue. Users of gdk-pixbuf are advised to upgrade to these packages, which contain a backported patch and are not vulnerable to this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue: yum update or to use apt: apt-get update; apt-get upgrade This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www.fedoralegacy.org/docs for directions on how to configure yum and apt-get. 5. Bug IDs fixed: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=154272 6. RPMs required: Red Hat Linux 7.3: SRPM: http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/gdk-pixbuf-0.22.0-7.73.3.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/7.3/updates/i386/gdk-pixbuf-0.22.0-7.73.3.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/gdk-pixbuf-devel-0.22.0-7.73.3.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/gdk-pixbuf-gnome-0.22.0-7.73.3.legacy.i386.rpm Red Hat Linux 9: SRPM: http://download.fedoralegacy.org/redhat/9/updates/SRPMS/gdk-pixbuf-0.22.0-7.90.3.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/9/updates/i386/gdk-pixbuf-0.22.0-7.90.3.legacy.i386.rpm http://download.fedoralegacy.org/redhat/9/updates/i386/gdk-pixbuf-devel-0.22.0-7.90.3.legacy.i386.rpm http://download.fedoralegacy.org/redhat/9/updates/i386/gdk-pixbuf-gnome-0.22.0-7.90.3.legacy.i386.rpm Fedora Core 1: SRPM: http://download.fedoralegacy.org/fedora/1/updates/SRPMS/gdk-pixbuf-0.22.0-11.3.4.1.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/1/updates/i386/gdk-pixbuf-0.22.0-11.3.4.1.legacy.i386.rpm http://download.fedoralegacy.org/fedora/1/updates/i386/gdk-pixbuf-devel-0.22.0-11.3.4.1.legacy.i386.rpm http://download.fedoralegacy.org/fedora/1/updates/i386/gdk-pixbuf-gnome-0.22.0-11.3.4.1.legacy.i386.rpm 7. Verification: SHA1 sum Package Name --------------------------------------------------------------------- 603ade3d2671dc2486de4e88e5753c390cfbe25c redhat/7.3/updates/i386/gdk-pixbuf-0.22.0-7.73.3.legacy.i386.rpm 9af2cd78533f6aa3edf18e418f22972e96dd68b8 redhat/7.3/updates/i386/gdk-pixbuf-devel-0.22.0-7.73.3.legacy.i386.rpm c23e9bfe47fa3e23d05da3d336f151f15f260467 redhat/7.3/updates/i386/gdk-pixbuf-gnome-0.22.0-7.73.3.legacy.i386.rpm 9b4c5298bcaff267cb7ffa0bbfe90e64f6f2d925 redhat/7.3/updates/SRPMS/gdk-pixbuf-0.22.0-7.73.3.legacy.src.rpm 34c176e0ff80d5cf680edd35aac08541a13cd4e6 redhat/9/updates/i386/gdk-pixbuf-0.22.0-7.90.3.legacy.i386.rpm 8dcb027f064d3a378f44354fbc8fbfdf54402113 redhat/9/updates/i386/gdk-pixbuf-devel-0.22.0-7.90.3.legacy.i386.rpm 53d96ae1336f7d4a442f239db2afc24ac91e27d5 redhat/9/updates/i386/gdk-pixbuf-gnome-0.22.0-7.90.3.legacy.i386.rpm 9fb12eae733ceca5606814fe6d46b9d2c2c63bd5 redhat/9/updates/SRPMS/gdk-pixbuf-0.22.0-7.90.3.legacy.src.rpm 26ad2e60b327e7f5d4d0a5056be6cd42b0bff150 fedora/1/updates/i386/gdk-pixbuf-0.22.0-11.3.4.1.legacy.i386.rpm 66885c30f770531c0dc53cc3715aa56633780613 fedora/1/updates/i386/gdk-pixbuf-devel-0.22.0-11.3.4.1.legacy.i386.rpm f70ac09e0a5d768da740c37f1d5115589c6515e4 fedora/1/updates/i386/gdk-pixbuf-gnome-0.22.0-11.3.4.1.legacy.i386.rpm 2f70a1f23a819f242d916529e7b531d494ef45eb fedora/1/updates/SRPMS/gdk-pixbuf-0.22.0-11.3.4.1.legacy.src.rpm These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy.org/about/security.php You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command: sha1sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0891 9. Contact: The Fedora Legacy security contact is <secnotice@...oralegacy.org>. More project details at http://www.fedoralegacy.org --------------------------------------------------------------------- -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 189 bytes Desc: OpenPGP digital signature Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050715/666db19b/signature.bin
Powered by blists - more mailing lists