Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in kdegraphics
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in kdegraphics
ID: RHSA-2006:0206-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Mo, 13. Februar 2006, 16:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301
Applikationen: KDE Software Compilation

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: kdegraphics security update
Advisory ID: RHSA-2006:0206-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0206.html
Issue date: 2006-02-13
Updated on: 2006-02-13
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-0301
- ---------------------------------------------------------------------

1. Summary:

Updated kdegraphics packages that resolve a security issue in kpdf are now
available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The kdegraphics packages contain applications for the K Desktop Environment
including kpdf, a pdf file viewer.

A heap based buffer overflow bug was discovered in kpdf. An attacker could
construct a carefully crafted PDF file that could cause kpdf to crash or
possibly execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project assigned the name CVE-2006-0301 to this issue.

Users of kpdf should upgrade to these updated packages, which contain a
backported patch to resolve this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

179055 - CVE-2006-0301 PDF splash handling heap overflow


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
kdegraphics-3.3.1-3.7.src.rpm
90ac8bd5592b058f6eb37df331008226 kdegraphics-3.3.1-3.7.src.rpm

i386:
aeec5e4c97d1ccabf1e52036bb37ca79 kdegraphics-3.3.1-3.7.i386.rpm
f48caa317d180ee1b40667c62df4acb6 kdegraphics-devel-3.3.1-3.7.i386.rpm

ia64:
3d3b3279d047bfff9cd14271072bd443 kdegraphics-3.3.1-3.7.ia64.rpm
432dea1108d258f6af3964180ab4d179 kdegraphics-devel-3.3.1-3.7.ia64.rpm

ppc:
7ee2305e63d0e6fe38bdec4a0a5f9326 kdegraphics-3.3.1-3.7.ppc.rpm
092a795864d53d21144289a92fc33b01 kdegraphics-devel-3.3.1-3.7.ppc.rpm

s390:
ef808523b180cccfdbcec51f9a020ee8 kdegraphics-3.3.1-3.7.s390.rpm
278dd2949ff7f09eb3b5018fa97cc75f kdegraphics-devel-3.3.1-3.7.s390.rpm

s390x:
71f7124916aeb01b793f54f2d85312b6 kdegraphics-3.3.1-3.7.s390x.rpm
9863edc3e66f3bd825cdd34df93e1b00 kdegraphics-devel-3.3.1-3.7.s390x.rpm

x86_64:
37cf516a06d3f42159ce54c62b901794 kdegraphics-3.3.1-3.7.x86_64.rpm
9b65bf232f163136cf5db28fd82fc661 kdegraphics-devel-3.3.1-3.7.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
kdegraphics-3.3.1-3.7.src.rpm
90ac8bd5592b058f6eb37df331008226 kdegraphics-3.3.1-3.7.src.rpm

i386:
aeec5e4c97d1ccabf1e52036bb37ca79 kdegraphics-3.3.1-3.7.i386.rpm
f48caa317d180ee1b40667c62df4acb6 kdegraphics-devel-3.3.1-3.7.i386.rpm

x86_64:
37cf516a06d3f42159ce54c62b901794 kdegraphics-3.3.1-3.7.x86_64.rpm
9b65bf232f163136cf5db28fd82fc661 kdegraphics-devel-3.3.1-3.7.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
kdegraphics-3.3.1-3.7.src.rpm
90ac8bd5592b058f6eb37df331008226 kdegraphics-3.3.1-3.7.src.rpm

i386:
aeec5e4c97d1ccabf1e52036bb37ca79 kdegraphics-3.3.1-3.7.i386.rpm
f48caa317d180ee1b40667c62df4acb6 kdegraphics-devel-3.3.1-3.7.i386.rpm

ia64:
3d3b3279d047bfff9cd14271072bd443 kdegraphics-3.3.1-3.7.ia64.rpm
432dea1108d258f6af3964180ab4d179 kdegraphics-devel-3.3.1-3.7.ia64.rpm

x86_64:
37cf516a06d3f42159ce54c62b901794 kdegraphics-3.3.1-3.7.x86_64.rpm
9b65bf232f163136cf5db28fd82fc661 kdegraphics-devel-3.3.1-3.7.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
kdegraphics-3.3.1-3.7.src.rpm
90ac8bd5592b058f6eb37df331008226 kdegraphics-3.3.1-3.7.src.rpm

i386:
aeec5e4c97d1ccabf1e52036bb37ca79 kdegraphics-3.3.1-3.7.i386.rpm
f48caa317d180ee1b40667c62df4acb6 kdegraphics-devel-3.3.1-3.7.i386.rpm

ia64:
3d3b3279d047bfff9cd14271072bd443 kdegraphics-3.3.1-3.7.ia64.rpm
432dea1108d258f6af3964180ab4d179 kdegraphics-devel-3.3.1-3.7.ia64.rpm

x86_64:
37cf516a06d3f42159ce54c62b901794 kdegraphics-3.3.1-3.7.x86_64.rpm
9b65bf232f163136cf5db28fd82fc661 kdegraphics-devel-3.3.1-3.7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFD8KkKXlSAg2UNWIIRAndnAKCfRnaunFn10q46l/ZioC0jWG4fXQCggVZW
vbJyfMqn0xHOWzYiN86xP+I=
=Tc9H
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung