drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in kdegraphics
Name: |
Pufferüberlauf in kdegraphics |
|
ID: |
RHSA-2006:0206-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Mo, 13. Februar 2006, 16:47 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301 |
|
Applikationen: |
KDE Software Compilation |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Important: kdegraphics security update Advisory ID: RHSA-2006:0206-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0206.html Issue date: 2006-02-13 Updated on: 2006-02-13 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-0301 - ---------------------------------------------------------------------
1. Summary:
Updated kdegraphics packages that resolve a security issue in kpdf are now available.
This update has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
The kdegraphics packages contain applications for the K Desktop Environment including kpdf, a pdf file viewer.
A heap based buffer overflow bug was discovered in kpdf. An attacker could construct a carefully crafted PDF file that could cause kpdf to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0301 to this issue.
Users of kpdf should upgrade to these updated packages, which contain a backported patch to resolve this issue.
4. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
179055 - CVE-2006-0301 PDF splash handling heap overflow
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: kdegraphics-3.3.1-3.7.src.rpm 90ac8bd5592b058f6eb37df331008226 kdegraphics-3.3.1-3.7.src.rpm
i386: aeec5e4c97d1ccabf1e52036bb37ca79 kdegraphics-3.3.1-3.7.i386.rpm f48caa317d180ee1b40667c62df4acb6 kdegraphics-devel-3.3.1-3.7.i386.rpm
ia64: 3d3b3279d047bfff9cd14271072bd443 kdegraphics-3.3.1-3.7.ia64.rpm 432dea1108d258f6af3964180ab4d179 kdegraphics-devel-3.3.1-3.7.ia64.rpm
ppc: 7ee2305e63d0e6fe38bdec4a0a5f9326 kdegraphics-3.3.1-3.7.ppc.rpm 092a795864d53d21144289a92fc33b01 kdegraphics-devel-3.3.1-3.7.ppc.rpm
s390: ef808523b180cccfdbcec51f9a020ee8 kdegraphics-3.3.1-3.7.s390.rpm 278dd2949ff7f09eb3b5018fa97cc75f kdegraphics-devel-3.3.1-3.7.s390.rpm
s390x: 71f7124916aeb01b793f54f2d85312b6 kdegraphics-3.3.1-3.7.s390x.rpm 9863edc3e66f3bd825cdd34df93e1b00 kdegraphics-devel-3.3.1-3.7.s390x.rpm
x86_64: 37cf516a06d3f42159ce54c62b901794 kdegraphics-3.3.1-3.7.x86_64.rpm 9b65bf232f163136cf5db28fd82fc661 kdegraphics-devel-3.3.1-3.7.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: kdegraphics-3.3.1-3.7.src.rpm 90ac8bd5592b058f6eb37df331008226 kdegraphics-3.3.1-3.7.src.rpm
i386: aeec5e4c97d1ccabf1e52036bb37ca79 kdegraphics-3.3.1-3.7.i386.rpm f48caa317d180ee1b40667c62df4acb6 kdegraphics-devel-3.3.1-3.7.i386.rpm
x86_64: 37cf516a06d3f42159ce54c62b901794 kdegraphics-3.3.1-3.7.x86_64.rpm 9b65bf232f163136cf5db28fd82fc661 kdegraphics-devel-3.3.1-3.7.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: kdegraphics-3.3.1-3.7.src.rpm 90ac8bd5592b058f6eb37df331008226 kdegraphics-3.3.1-3.7.src.rpm
i386: aeec5e4c97d1ccabf1e52036bb37ca79 kdegraphics-3.3.1-3.7.i386.rpm f48caa317d180ee1b40667c62df4acb6 kdegraphics-devel-3.3.1-3.7.i386.rpm
ia64: 3d3b3279d047bfff9cd14271072bd443 kdegraphics-3.3.1-3.7.ia64.rpm 432dea1108d258f6af3964180ab4d179 kdegraphics-devel-3.3.1-3.7.ia64.rpm
x86_64: 37cf516a06d3f42159ce54c62b901794 kdegraphics-3.3.1-3.7.x86_64.rpm 9b65bf232f163136cf5db28fd82fc661 kdegraphics-devel-3.3.1-3.7.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: kdegraphics-3.3.1-3.7.src.rpm 90ac8bd5592b058f6eb37df331008226 kdegraphics-3.3.1-3.7.src.rpm
i386: aeec5e4c97d1ccabf1e52036bb37ca79 kdegraphics-3.3.1-3.7.i386.rpm f48caa317d180ee1b40667c62df4acb6 kdegraphics-devel-3.3.1-3.7.i386.rpm
ia64: 3d3b3279d047bfff9cd14271072bd443 kdegraphics-3.3.1-3.7.ia64.rpm 432dea1108d258f6af3964180ab4d179 kdegraphics-devel-3.3.1-3.7.ia64.rpm
x86_64: 37cf516a06d3f42159ce54c62b901794 kdegraphics-3.3.1-3.7.x86_64.rpm 9b65bf232f163136cf5db28fd82fc661 kdegraphics-devel-3.3.1-3.7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFD8KkKXlSAg2UNWIIRAndnAKCfRnaunFn10q46l/ZioC0jWG4fXQCggVZW vbJyfMqn0xHOWzYiN86xP+I= =Tc9H -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|