Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


More on LinuxToday


Advisories: May 25, 2005

May 26, 2005, 04:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 728-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
May 25th, 2005 http://www.debian.org/security/faq


Package : qpopper
Vulnerability : missing privilege release
Problem-Type : local
Debian-specific: no
CVE IDs : CAN-2005-1151 CAN-2005-1152

Two bugs have been discovered in qpopper, an enhanced Post Office Protocol (POP3) server. The Common Vulnerability and Exposures project identifies the following problems:

CAN-2005-1151

Jens Steube discovered that while processing local files owned or provided by a normal user privileges weren't dropped, which could lead to the overwriting or creation of arbitrary files as root.

CAN-2005-1152

The upstream developers noticed that qpopper could be tricked to creating group- or world-writable files.

For the stable distribution (woody) these problems have been fixed in version 4.0.4-2.woody.5.

For the testing distribution (sarge) these problems have been fixed in version 4.0.5-4sarge1.

For the unstable distribution (sid) these problems will be fixed in version 4.0.5-4sarge1.

We recommend that you upgrade your qpopper package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4.dsc
Size/MD5 checksum: 648 8a4a3c4d3a90bd48f34c26db8fa8a184
http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4.diff.gz
Size/MD5 checksum: 17473 ac7cb7a84e82c3f20bbd8663a2be4c0e
http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4.orig.tar.gz
Size/MD5 checksum: 2261992 77f0968cd10b0d5236114838d9f507e5

Alpha architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_alpha.deb
Size/MD5 checksum: 458526 fdc450895431518af490ed70c26690b4
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_alpha.deb
Size/MD5 checksum: 459292 b5669199d6f4372f2b5ee7cbf600a5ee

ARM architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_arm.deb
Size/MD5 checksum: 433370 e40e461e59983b3c4bd72544c9823ddf
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_arm.deb
Size/MD5 checksum: 434144 89f7de875966d5398208664745b0825d

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_i386.deb
Size/MD5 checksum: 422496 275080592bb86fb37f44fe6ddc17a930
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_i386.deb
Size/MD5 checksum: 423426 4837430cf6367f82d6a55e3b238c30c0

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_ia64.deb
Size/MD5 checksum: 484928 a765fbbc4cec479b962b15fcf4506554
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_ia64.deb
Size/MD5 checksum: 485876 aea333e7c81e270dd1594765394d08ca

HP Precision architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_hppa.deb
Size/MD5 checksum: 442848 d4024658e0876e72c93773d21eec2750
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_hppa.deb
Size/MD5 checksum: 443930 b5bddba42ffe723dcea8ecc172401409

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_m68k.deb
Size/MD5 checksum: 416310 5561b088daaf6b0a891715623d2919f5
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_m68k.deb
Size/MD5 checksum: 417256 c4879974d172134e8ec28c2b495012ed

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_mips.deb
Size/MD5 checksum: 439160 85103a9f874de432a57feb0a938349ab
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_mips.deb
Size/MD5 checksum: 439940 e9e5442b85568f63324e85257e931962

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_mipsel.deb
Size/MD5 checksum: 439462 f912738cb0e25b0e215bc968d8b2e250
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_mipsel.deb
Size/MD5 checksum: 440732 208a5f8d25f7bc83cbdc14145dfa9093

PowerPC architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_powerpc.deb
Size/MD5 checksum: 433316 67f331a07b83d8e3bb745c3aa576b186
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_powerpc.deb
Size/MD5 checksum: 433894 b373674498d8f38df3c161d698e28eb5

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_s390.deb
Size/MD5 checksum: 428582 7d2aa35d8172623fae1e782c8bbd39c9
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_s390.deb
Size/MD5 checksum: 429694 71ea0abc8b2ec5dcbea76a1b47ff7e84

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.4-2.woody.4_sparc.deb
Size/MD5 checksum: 434720 67b37565b3633c6111f01a66ea88d17b
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.4-2.woody.4_sparc.deb
Size/MD5 checksum: 435372 413153ac3d8d7be1ea191f2e8e084641

Debian GNU/Linux 3.1 alias sarge


Source archives:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1.dsc
Size/MD5 checksum: 654 965b9d0da82ac7158d5007f53d06687b
http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1.diff.gz
Size/MD5 checksum: 128752 121b2d0f6b6e49c7a42d119f3b913344
http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5.orig.tar.gz
Size/MD5 checksum: 2281284 e00853280c9e899711f0b0239d3d8f86

Alpha architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_alpha.deb
Size/MD5 checksum: 437332 ed094b8544b33af5933cc0b31ddf340c
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_alpha.deb
Size/MD5 checksum: 439258 d446633935a28035154f7b58c78a47b5

ARM architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_arm.deb
Size/MD5 checksum: 412418 63b6d6c474c0b3ed168d26935fdb66ec
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_arm.deb
Size/MD5 checksum: 413758 8d6fd58ea1d21eab06b2ec07f56a9d09

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_i386.deb
Size/MD5 checksum: 412684 aad7bc1cda319942fc35a1c6c77ce217
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_i386.deb
Size/MD5 checksum: 414352 04366a0962d44d97988f441a2d0106b6

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_ia64.deb
Size/MD5 checksum: 460508 5ecd98c52e52dae7394d453f93f28f4c
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_ia64.deb
Size/MD5 checksum: 462502 693915f6d206aacad3f120ee69ba7b02

HP Precision architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_hppa.deb
Size/MD5 checksum: 423094 6c681ccee64b16fe8d74571d0dcb7c7b
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_hppa.deb
Size/MD5 checksum: 424996 7fd56380f01291f3e4d877623a9f3a1f

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_m68k.deb
Size/MD5 checksum: 397408 d9e8d691860cd2de1098d85e9ae3e61e
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_m68k.deb
Size/MD5 checksum: 398678 8bcf97f3819012595b09a16acaae2911

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_mips.deb
Size/MD5 checksum: 420358 fc953a6e7a31000662416f282b15be22
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_mips.deb
Size/MD5 checksum: 421958 ca599fd86bdd366367b6539ffbe53b61

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_mipsel.deb
Size/MD5 checksum: 421588 98701bea5aeadac79827d9e39b0a0483
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_mipsel.deb
Size/MD5 checksum: 423020 34d65b128cd784d9d0ff96d82b31ccb3

PowerPC architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_powerpc.deb
Size/MD5 checksum: 417762 4e0bb2eb1c6a0fc14337f699c72e9385
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_powerpc.deb
Size/MD5 checksum: 419056 6273a2937e0d710b51a5aba1fe6a476f

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_s390.deb
Size/MD5 checksum: 414600 f0b011cb5ac4c28c8586786f0051ba3a
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_s390.deb
Size/MD5 checksum: 416094 56ff4626d4e4b7e6026fd04538415627

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_sparc.deb
Size/MD5 checksum: 411094 5a9d2123b0c0681e0f8789b31fc3ba5d
http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_sparc.deb
Size/MD5 checksum: 412424 5182a75bd98fbc62d047a85a27dfadba

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Red Hat Linux


Red Hat Security Advisory

Synopsis: Important: ImageMagick security update
Advisory ID: RHSA-2005:413-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-413.html
Issue date: 2005-05-25
Updated on: 2005-05-25
Product: Red Hat Enterprise Linux


1. Summary:

Updated ImageMagick packages that fix a buffer overflow issue are now available.

This update has been rated as having important security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

ImageMagick(TM) is an image display and manipulation tool for the X Window System which can read and write multiple image formats.

A heap based buffer overflow bug was found in the way ImageMagick parses PNM files. An attacker could execute arbitrary code on a victim's machine if they were able to trick the victim into opening a specially crafted PNM file. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2005-1275 to this issue.

Users of ImageMagick should upgrade to these updated packages, which contain a backported patch, and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

155953 - ImageMagick PNM heap overflow

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ImageMagick-5.5.6-14.src.rpm
da0b49cdf98cb5e29f5173055160c939 ImageMagick-5.5.6-14.src.rpm

i386:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
8427543707cbdcc9cda8e57ef8bf812e ImageMagick-c++-devel-5.5.6-14.i386.rpm
070a9f37b3763ee49af8f376496143ed ImageMagick-devel-5.5.6-14.i386.rpm
a147f6b274f13330eaf4f1bdf369f004 ImageMagick-perl-5.5.6-14.i386.rpm

ia64:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
04eaac66bf3627d48be55a4da85659b9 ImageMagick-5.5.6-14.ia64.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
13cf4e0824d50af8b8c4ab33b1430fdf ImageMagick-c++-5.5.6-14.ia64.rpm
1b9d3c586a98a4e6a93877401a42dd44 ImageMagick-c++-devel-5.5.6-14.ia64.rpm
bcb5689b37f19468a5f2172bfc50cc31 ImageMagick-devel-5.5.6-14.ia64.rpm
311ffedc040b6c5482b7f6bb6cc63c9e ImageMagick-perl-5.5.6-14.ia64.rpm

ppc:
61a882a1ddc43197c44d8d807cebf87e ImageMagick-5.5.6-14.ppc.rpm
dde736a8747a93350ce8b9b353efc045 ImageMagick-5.5.6-14.ppc64.rpm
2d52336caaee183028cb16b20355e211 ImageMagick-c++-5.5.6-14.ppc.rpm
7338bc1e2d2643643a303d1bc281b2e5 ImageMagick-c++-5.5.6-14.ppc64.rpm
f1706007d999b409a388abe831654304 ImageMagick-c++-devel-5.5.6-14.ppc.rpm
03c49c0f386233a7bd3ca3246183b829 ImageMagick-devel-5.5.6-14.ppc.rpm
6f11c4e4e528afad0a31a520cb0f5c6e ImageMagick-perl-5.5.6-14.ppc.rpm

s390:
8b249cd0988f22bad64ccc71547e4173 ImageMagick-5.5.6-14.s390.rpm
260dd0e80f5754210442a5a922a880dd ImageMagick-c++-5.5.6-14.s390.rpm
e45c1f6c0efcc5f0496f5242b5a3ad7e ImageMagick-c++-devel-5.5.6-14.s390.rpm
31d0312826495ad73bd9c18437460798 ImageMagick-devel-5.5.6-14.s390.rpm
9b1a819b54830642d5d782643119f440 ImageMagick-perl-5.5.6-14.s390.rpm

s390x:
8b249cd0988f22bad64ccc71547e4173 ImageMagick-5.5.6-14.s390.rpm
db045788fbb9b484851461dc669dc1c7 ImageMagick-5.5.6-14.s390x.rpm
260dd0e80f5754210442a5a922a880dd ImageMagick-c++-5.5.6-14.s390.rpm
c4d3572cc9850c59c7628a6c90cf4b4f ImageMagick-c++-5.5.6-14.s390x.rpm
f53ece28b83e8ffec6443e814ea3e60c ImageMagick-c++-devel-5.5.6-14.s390x.rpm
85770ab54225df2d09fb59f09541ff98 ImageMagick-devel-5.5.6-14.s390x.rpm
b87f2ea0d97e4de04f2e6680474cecb8 ImageMagick-perl-5.5.6-14.s390x.rpm

x86_64:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
265bb9d8e2bbe6bfae7ba5283fa09919 ImageMagick-5.5.6-14.x86_64.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
769f3c85dce9f011b4f44d50cc559b46 ImageMagick-c++-5.5.6-14.x86_64.rpm
d967904cba9c7c4a904e56a4bd9c0b61 ImageMagick-c++-devel-5.5.6-14.x86_64.rpm
122c25aa446c3d832ef2bb00eb26987b ImageMagick-devel-5.5.6-14.x86_64.rpm
4fcaf8d863a871b13eaecffb5f21c88a ImageMagick-perl-5.5.6-14.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/ImageMagick-5.5.6-14.src.rpm
da0b49cdf98cb5e29f5173055160c939 ImageMagick-5.5.6-14.src.rpm

i386:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
8427543707cbdcc9cda8e57ef8bf812e ImageMagick-c++-devel-5.5.6-14.i386.rpm
070a9f37b3763ee49af8f376496143ed ImageMagick-devel-5.5.6-14.i386.rpm
a147f6b274f13330eaf4f1bdf369f004 ImageMagick-perl-5.5.6-14.i386.rpm

x86_64:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
265bb9d8e2bbe6bfae7ba5283fa09919 ImageMagick-5.5.6-14.x86_64.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
769f3c85dce9f011b4f44d50cc559b46 ImageMagick-c++-5.5.6-14.x86_64.rpm
d967904cba9c7c4a904e56a4bd9c0b61 ImageMagick-c++-devel-5.5.6-14.x86_64.rpm
122c25aa446c3d832ef2bb00eb26987b ImageMagick-devel-5.5.6-14.x86_64.rpm
4fcaf8d863a871b13eaecffb5f21c88a ImageMagick-perl-5.5.6-14.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ImageMagick-5.5.6-14.src.rpm
da0b49cdf98cb5e29f5173055160c939 ImageMagick-5.5.6-14.src.rpm

i386:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
8427543707cbdcc9cda8e57ef8bf812e ImageMagick-c++-devel-5.5.6-14.i386.rpm
070a9f37b3763ee49af8f376496143ed ImageMagick-devel-5.5.6-14.i386.rpm
a147f6b274f13330eaf4f1bdf369f004 ImageMagick-perl-5.5.6-14.i386.rpm

ia64:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
04eaac66bf3627d48be55a4da85659b9 ImageMagick-5.5.6-14.ia64.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
13cf4e0824d50af8b8c4ab33b1430fdf ImageMagick-c++-5.5.6-14.ia64.rpm
1b9d3c586a98a4e6a93877401a42dd44 ImageMagick-c++-devel-5.5.6-14.ia64.rpm
bcb5689b37f19468a5f2172bfc50cc31 ImageMagick-devel-5.5.6-14.ia64.rpm
311ffedc040b6c5482b7f6bb6cc63c9e ImageMagick-perl-5.5.6-14.ia64.rpm

x86_64:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
265bb9d8e2bbe6bfae7ba5283fa09919 ImageMagick-5.5.6-14.x86_64.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
769f3c85dce9f011b4f44d50cc559b46 ImageMagick-c++-5.5.6-14.x86_64.rpm
d967904cba9c7c4a904e56a4bd9c0b61 ImageMagick-c++-devel-5.5.6-14.x86_64.rpm
122c25aa446c3d832ef2bb00eb26987b ImageMagick-devel-5.5.6-14.x86_64.rpm
4fcaf8d863a871b13eaecffb5f21c88a ImageMagick-perl-5.5.6-14.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ImageMagick-5.5.6-14.src.rpm
da0b49cdf98cb5e29f5173055160c939 ImageMagick-5.5.6-14.src.rpm

i386:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
8427543707cbdcc9cda8e57ef8bf812e ImageMagick-c++-devel-5.5.6-14.i386.rpm
070a9f37b3763ee49af8f376496143ed ImageMagick-devel-5.5.6-14.i386.rpm
a147f6b274f13330eaf4f1bdf369f004 ImageMagick-perl-5.5.6-14.i386.rpm

ia64:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
04eaac66bf3627d48be55a4da85659b9 ImageMagick-5.5.6-14.ia64.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
13cf4e0824d50af8b8c4ab33b1430fdf ImageMagick-c++-5.5.6-14.ia64.rpm
1b9d3c586a98a4e6a93877401a42dd44 ImageMagick-c++-devel-5.5.6-14.ia64.rpm
bcb5689b37f19468a5f2172bfc50cc31 ImageMagick-devel-5.5.6-14.ia64.rpm
311ffedc040b6c5482b7f6bb6cc63c9e ImageMagick-perl-5.5.6-14.ia64.rpm

x86_64:
cec301ae8b013d54d6446caef945fddb ImageMagick-5.5.6-14.i386.rpm
265bb9d8e2bbe6bfae7ba5283fa09919 ImageMagick-5.5.6-14.x86_64.rpm
c8a33dda1f2a235eb933e9f3c1883cc2 ImageMagick-c++-5.5.6-14.i386.rpm
769f3c85dce9f011b4f44d50cc559b46 ImageMagick-c++-5.5.6-14.x86_64.rpm
d967904cba9c7c4a904e56a4bd9c0b61 ImageMagick-c++-devel-5.5.6-14.x86_64.rpm
122c25aa446c3d832ef2bb00eb26987b ImageMagick-devel-5.5.6-14.x86_64.rpm
4fcaf8d863a871b13eaecffb5f21c88a ImageMagick-perl-5.5.6-14.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ImageMagick-6.0.7.1-11.src.rpm
654598df8ce20d97758403a8b1c6f533 ImageMagick-6.0.7.1-11.src.rpm

i386:
e901b7ab437561e7da8a97bae82ec1d3 ImageMagick-6.0.7.1-11.i386.rpm
e6203e5faa28c0b01b2c77fe020af7fa ImageMagick-c++-6.0.7.1-11.i386.rpm
01d202ef44b2437e5068ceedd6ddc57c ImageMagick-c++-devel-6.0.7.1-11.i386.rpm
d06927257fadba8bddcdbe529aa5fd4c ImageMagick-devel-6.0.7.1-11.i386.rpm
b727c595bdf5369f037e5310fbe32d52 ImageMagick-perl-6.0.7.1-11.i386.rpm

ia64:
5101a577cf65831572388147bb300414 ImageMagick-6.0.7.1-11.ia64.rpm
74021628bf35c269163f910011d6179e ImageMagick-c++-6.0.7.1-11.ia64.rpm
9915d9290c163be04823e33ce7657b40 ImageMagick-c++-devel-6.0.7.1-11.ia64.rpm
ea3311125b829a021bdbe1b905e15d56 ImageMagick-devel-6.0.7.1-11.ia64.rpm
ad10bac3b682af14db196c53f68681ec ImageMagick-perl-6.0.7.1-11.ia64.rpm

ppc:
69353fd54da027ea07f25980c3ce0d89 ImageMagick-6.0.7.1-11.ppc.rpm
c0ce1b96e65429e8a8c2d0bc18e096ad ImageMagick-c++-6.0.7.1-11.ppc.rpm
e47a22ced559637dd65ae48d0ea4bd94 ImageMagick-c++-devel-6.0.7.1-11.ppc.rpm
9bb71a4406621cade0cb8170b5a9b671 ImageMagick-devel-6.0.7.1-11.ppc.rpm
c16ba0ddbc52bb5e79a7640e486704b9 ImageMagick-perl-6.0.7.1-11.ppc.rpm

s390:
c66d6d3557835a4f8759bcaaae283b61 ImageMagick-6.0.7.1-11.s390.rpm
fe50719d170010c9d389ce15d0a0e3fe ImageMagick-c++-6.0.7.1-11.s390.rpm
89f4a1a0ad454633b41654a717655b07 ImageMagick-c++-devel-6.0.7.1-11.s390.rpm
088f61ea3fd8733c00844ec4660c3940 ImageMagick-devel-6.0.7.1-11.s390.rpm
fa51ebe0d878e5079fa76e786bddc9c6 ImageMagick-perl-6.0.7.1-11.s390.rpm

s390x:
cc0d06a7e8de3d95b37b000bc9cb15b2 ImageMagick-6.0.7.1-11.s390x.rpm
6f823f887bd8b673630b2519081d31a7 ImageMagick-c++-6.0.7.1-11.s390x.rpm
a20512111f65942066441db7a11597df ImageMagick-c++-devel-6.0.7.1-11.s390x.rpm
1cc6804b0b87aabfc2c01366c015c496 ImageMagick-devel-6.0.7.1-11.s390x.rpm
30fcc8201ae8a66fd6a72ec4f37b2883 ImageMagick-perl-6.0.7.1-11.s390x.rpm

x86_64:
75e1b60756dd17941aaf9a82c3ec85e8 ImageMagick-6.0.7.1-11.x86_64.rpm
918ba19e29a73f71247486e85da5f4a6 ImageMagick-c++-6.0.7.1-11.x86_64.rpm
4e4fadbb45bb05886c6e1c07ae257181 ImageMagick-c++-devel-6.0.7.1-11.x86_64.rpm
6bc4e66b410483242dea505f74019623 ImageMagick-devel-6.0.7.1-11.x86_64.rpm
497384b120f49f464823cf252240674f ImageMagick-perl-6.0.7.1-11.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/ImageMagick-6.0.7.1-11.src.rpm
654598df8ce20d97758403a8b1c6f533 ImageMagick-6.0.7.1-11.src.rpm

i386:
e901b7ab437561e7da8a97bae82ec1d3 ImageMagick-6.0.7.1-11.i386.rpm
e6203e5faa28c0b01b2c77fe020af7fa ImageMagick-c++-6.0.7.1-11.i386.rpm
01d202ef44b2437e5068ceedd6ddc57c ImageMagick-c++-devel-6.0.7.1-11.i386.rpm
d06927257fadba8bddcdbe529aa5fd4c ImageMagick-devel-6.0.7.1-11.i386.rpm
b727c595bdf5369f037e5310fbe32d52 ImageMagick-perl-6.0.7.1-11.i386.rpm

x86_64:
75e1b60756dd17941aaf9a82c3ec85e8 ImageMagick-6.0.7.1-11.x86_64.rpm
918ba19e29a73f71247486e85da5f4a6 ImageMagick-c++-6.0.7.1-11.x86_64.rpm
4e4fadbb45bb05886c6e1c07ae257181 ImageMagick-c++-devel-6.0.7.1-11.x86_64.rpm
6bc4e66b410483242dea505f74019623 ImageMagick-devel-6.0.7.1-11.x86_64.rpm
497384b120f49f464823cf252240674f ImageMagick-perl-6.0.7.1-11.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ImageMagick-6.0.7.1-11.src.rpm
654598df8ce20d97758403a8b1c6f533 ImageMagick-6.0.7.1-11.src.rpm

i386:
e901b7ab437561e7da8a97bae82ec1d3 ImageMagick-6.0.7.1-11.i386.rpm
e6203e5faa28c0b01b2c77fe020af7fa ImageMagick-c++-6.0.7.1-11.i386.rpm
01d202ef44b2437e5068ceedd6ddc57c ImageMagick-c++-devel-6.0.7.1-11.i386.rpm
d06927257fadba8bddcdbe529aa5fd4c ImageMagick-devel-6.0.7.1-11.i386.rpm
b727c595bdf5369f037e5310fbe32d52 ImageMagick-perl-6.0.7.1-11.i386.rpm

ia64:
5101a577cf65831572388147bb300414 ImageMagick-6.0.7.1-11.ia64.rpm
74021628bf35c269163f910011d6179e ImageMagick-c++-6.0.7.1-11.ia64.rpm
9915d9290c163be04823e33ce7657b40 ImageMagick-c++-devel-6.0.7.1-11.ia64.rpm
ea3311125b829a021bdbe1b905e15d56 ImageMagick-devel-6.0.7.1-11.ia64.rpm
ad10bac3b682af14db196c53f68681ec ImageMagick-perl-6.0.7.1-11.ia64.rpm

x86_64:
75e1b60756dd17941aaf9a82c3ec85e8 ImageMagick-6.0.7.1-11.x86_64.rpm
918ba19e29a73f71247486e85da5f4a6 ImageMagick-c++-6.0.7.1-11.x86_64.rpm
4e4fadbb45bb05886c6e1c07ae257181 ImageMagick-c++-devel-6.0.7.1-11.x86_64.rpm
6bc4e66b410483242dea505f74019623 ImageMagick-devel-6.0.7.1-11.x86_64.rpm
497384b120f49f464823cf252240674f ImageMagick-perl-6.0.7.1-11.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/ImageMagick-6.0.7.1-11.src.rpm
654598df8ce20d97758403a8b1c6f533 ImageMagick-6.0.7.1-11.src.rpm

i386:
e901b7ab437561e7da8a97bae82ec1d3 ImageMagick-6.0.7.1-11.i386.rpm
e6203e5faa28c0b01b2c77fe020af7fa ImageMagick-c++-6.0.7.1-11.i386.rpm
01d202ef44b2437e5068ceedd6ddc57c ImageMagick-c++-devel-6.0.7.1-11.i386.rpm
d06927257fadba8bddcdbe529aa5fd4c ImageMagick-devel-6.0.7.1-11.i386.rpm
b727c595bdf5369f037e5310fbe32d52 ImageMagick-perl-6.0.7.1-11.i386.rpm

ia64:
5101a577cf65831572388147bb300414 ImageMagick-6.0.7.1-11.ia64.rpm
74021628bf35c269163f910011d6179e ImageMagick-c++-6.0.7.1-11.ia64.rpm
9915d9290c163be04823e33ce7657b40 ImageMagick-c++-devel-6.0.7.1-11.ia64.rpm
ea3311125b829a021bdbe1b905e15d56 ImageMagick-devel-6.0.7.1-11.ia64.rpm
ad10bac3b682af14db196c53f68681ec ImageMagick-perl-6.0.7.1-11.ia64.rpm

x86_64:
75e1b60756dd17941aaf9a82c3ec85e8 ImageMagick-6.0.7.1-11.x86_64.rpm
918ba19e29a73f71247486e85da5f4a6 ImageMagick-c++-6.0.7.1-11.x86_64.rpm
4e4fadbb45bb05886c6e1c07ae257181 ImageMagick-c++-devel-6.0.7.1-11.x86_64.rpm
6bc4e66b410483242dea505f74019623 ImageMagick-devel-6.0.7.1-11.x86_64.rpm
497384b120f49f464823cf252240674f ImageMagick-perl-6.0.7.1-11.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

7. References:

http://www.overflow.pl/adv/imheapoverflow.txt

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.


Red Hat Security Advisory

Synopsis: Moderate: ethereal security update
Advisory ID: RHSA-2005:427-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-427.html
Issue date: 2005-05-24
Updated on: 2005-05-24
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-1456 CAN-2005-1457 CAN-2005-1458 CAN-2005-1459 CAN-2005-1460 CAN-2005-1461 CAN-2005-1462 CAN-2005-1463 CAN-2005-1464 CAN-2005-1465 CAN-2005-1466 CAN-2005-1467 CAN-2005-1468 CAN-2005-1469 CAN-2005-1470


1. Summary:

Updated Ethereal packages that fix various security vulnerabilities are now available.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The ethereal package is a program for monitoring network traffic.

A number of security flaws have been discovered in Ethereal. On a system where Ethereal is running, a remote attacker could send malicious packets to trigger these flaws and cause Ethereal to crash or potentially execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the names CAN-2005-1456, CAN-2005-1457, CAN-2005-1458, CAN-2005-1459, CAN-2005-1460, CAN-2005-1461, CAN-2005-1462, CAN-2005-1463, CAN-2005-1464, CAN-2005-1465, CAN-2005-1466, CAN-2005-1467, CAN-2005-1468, CAN-2005-1469, and CAN-2005-1470 to these issues.

Users of ethereal should upgrade to these updated packages, which contain version 0.10.11 which is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

156911 - multiple ethereal security issues

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ethereal-0.10.11-1.AS21.1.src.rpm
0b21799c49fc8c2cecf89d1b4cf8344f ethereal-0.10.11-1.AS21.1.src.rpm

i386:
d073461de6033a9b54868983f1e8a57f ethereal-0.10.11-1.AS21.1.i386.rpm
6fbab843d5b9db3dbf20dd51a5326bc5 ethereal-gnome-0.10.11-1.AS21.1.i386.rpm

ia64:
a998856f27fc440f36c4f06f3fba73a6 ethereal-0.10.11-1.AS21.1.ia64.rpm
196cc361800f73d8cd417470b8382784 ethereal-gnome-0.10.11-1.AS21.1.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ethereal-0.10.11-1.AS21.1.src.rpm
0b21799c49fc8c2cecf89d1b4cf8344f ethereal-0.10.11-1.AS21.1.src.rpm

ia64:
a998856f27fc440f36c4f06f3fba73a6 ethereal-0.10.11-1.AS21.1.ia64.rpm
196cc361800f73d8cd417470b8382784 ethereal-gnome-0.10.11-1.AS21.1.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ethereal-0.10.11-1.AS21.1.src.rpm
0b21799c49fc8c2cecf89d1b4cf8344f ethereal-0.10.11-1.AS21.1.src.rpm

i386:
d073461de6033a9b54868983f1e8a57f ethereal-0.10.11-1.AS21.1.i386.rpm
6fbab843d5b9db3dbf20dd51a5326bc5 ethereal-gnome-0.10.11-1.AS21.1.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ethereal-0.10.11-1.AS21.1.src.rpm
0b21799c49fc8c2cecf89d1b4cf8344f ethereal-0.10.11-1.AS21.1.src.rpm

i386:
d073461de6033a9b54868983f1e8a57f ethereal-0.10.11-1.AS21.1.i386.rpm
6fbab843d5b9db3dbf20dd51a5326bc5 ethereal-gnome-0.10.11-1.AS21.1.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ethereal-0.10.11-1.EL3.1.src.rpm
2bc945fb2b41cd50103a5a6d5d06b8a9 ethereal-0.10.11-1.EL3.1.src.rpm

i386:
7ae09e2aa199a2a9481c06b92d231e1d ethereal-0.10.11-1.EL3.1.i386.rpm
a715b1bfbb2e5eb8b9404c732b560383 ethereal-gnome-0.10.11-1.EL3.1.i386.rpm

ia64:
8c838c44496eac706a84564e3214d86c ethereal-0.10.11-1.EL3.1.ia64.rpm
7018e509f29c7932ff54360d6636556c ethereal-gnome-0.10.11-1.EL3.1.ia64.rpm

ppc:
6108eb261f27496e93e114da49155136 ethereal-0.10.11-1.EL3.1.ppc.rpm
d7ae48638b139142c9c99cb3d2848636 ethereal-gnome-0.10.11-1.EL3.1.ppc.rpm

s390:
ba40ab1703aa6279fb8805a8ba9c9440 ethereal-0.10.11-1.EL3.1.s390.rpm
2df76ee89a7a835fab203736a8dcd132 ethereal-gnome-0.10.11-1.EL3.1.s390.rpm

s390x:
7f1a798128a574d46874cf7c4d6fd252 ethereal-0.10.11-1.EL3.1.s390x.rpm
7f3243e9939635e20fed82fe47806605 ethereal-gnome-0.10.11-1.EL3.1.s390x.rpm

x86_64:
305b213ec8ce371cbb63659cfeeeacc8 ethereal-0.10.11-1.EL3.1.x86_64.rpm
d94093e389d30ee9647e16d0f419b3f6 ethereal-gnome-0.10.11-1.EL3.1.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/ethereal-0.10.11-1.EL3.1.src.rpm
2bc945fb2b41cd50103a5a6d5d06b8a9 ethereal-0.10.11-1.EL3.1.src.rpm

i386:
7ae09e2aa199a2a9481c06b92d231e1d ethereal-0.10.11-1.EL3.1.i386.rpm
a715b1bfbb2e5eb8b9404c732b560383 ethereal-gnome-0.10.11-1.EL3.1.i386.rpm

x86_64:
305b213ec8ce371cbb63659cfeeeacc8 ethereal-0.10.11-1.EL3.1.x86_64.rpm
d94093e389d30ee9647e16d0f419b3f6 ethereal-gnome-0.10.11-1.EL3.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ethereal-0.10.11-1.EL3.1.src.rpm
2bc945fb2b41cd50103a5a6d5d06b8a9 ethereal-0.10.11-1.EL3.1.src.rpm

i386:
7ae09e2aa199a2a9481c06b92d231e1d ethereal-0.10.11-1.EL3.1.i386.rpm
a715b1bfbb2e5eb8b9404c732b560383 ethereal-gnome-0.10.11-1.EL3.1.i386.rpm

ia64:
8c838c44496eac706a84564e3214d86c ethereal-0.10.11-1.EL3.1.ia64.rpm
7018e509f29c7932ff54360d6636556c ethereal-gnome-0.10.11-1.EL3.1.ia64.rpm

x86_64:
305b213ec8ce371cbb63659cfeeeacc8 ethereal-0.10.11-1.EL3.1.x86_64.rpm
d94093e389d30ee9647e16d0f419b3f6 ethereal-gnome-0.10.11-1.EL3.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ethereal-0.10.11-1.EL3.1.src.rpm
2bc945fb2b41cd50103a5a6d5d06b8a9 ethereal-0.10.11-1.EL3.1.src.rpm

i386:
7ae09e2aa199a2a9481c06b92d231e1d ethereal-0.10.11-1.EL3.1.i386.rpm
a715b1bfbb2e5eb8b9404c732b560383 ethereal-gnome-0.10.11-1.EL3.1.i386.rpm

ia64:
8c838c44496eac706a84564e3214d86c ethereal-0.10.11-1.EL3.1.ia64.rpm
7018e509f29c7932ff54360d6636556c ethereal-gnome-0.10.11-1.EL3.1.ia64.rpm

x86_64:
305b213ec8ce371cbb63659cfeeeacc8 ethereal-0.10.11-1.EL3.1.x86_64.rpm
d94093e389d30ee9647e16d0f419b3f6 ethereal-gnome-0.10.11-1.EL3.1.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ethereal-0.10.11-1.EL4.1.src.rpm
31827231cfd39c1f58c507b5f6b18f0a ethereal-0.10.11-1.EL4.1.src.rpm

i386:
242ac3e7bf5c4ce383846f0da2c75bb3 ethereal-0.10.11-1.EL4.1.i386.rpm
fd29b49e9fd1fed6fea304f5bce3c635 ethereal-gnome-0.10.11-1.EL4.1.i386.rpm

ia64:
a681b93f9a5fdf707fbeb45f5388ab60 ethereal-0.10.11-1.EL4.1.ia64.rpm
865a6db98828885c06f2830647d717c8 ethereal-gnome-0.10.11-1.EL4.1.ia64.rpm

ppc:
871b6520758e58526df3cd6dc0089002 ethereal-0.10.11-1.EL4.1.ppc.rpm
8ff35168d4a835a3170df2dd30ee9385 ethereal-gnome-0.10.11-1.EL4.1.ppc.rpm

s390:
c88c44f2d1c04d4287b69ae59671f364 ethereal-0.10.11-1.EL4.1.s390.rpm
ddd61e3d6dee74355a57cee01181b4a8 ethereal-gnome-0.10.11-1.EL4.1.s390.rpm

s390x:
6dab852b08c392fffe26cb57372910ec ethereal-0.10.11-1.EL4.1.s390x.rpm
1fb0433a4c4be9d7fd16f05236a65396 ethereal-gnome-0.10.11-1.EL4.1.s390x.rpm

x86_64:
29c7d4f991b56f5ce0f11c4a7967049b ethereal-0.10.11-1.EL4.1.x86_64.rpm
4ae4f5ccd3fc44ff5fe29563702178fb ethereal-gnome-0.10.11-1.EL4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/ethereal-0.10.11-1.EL4.1.src.rpm
31827231cfd39c1f58c507b5f6b18f0a ethereal-0.10.11-1.EL4.1.src.rpm

i386:
242ac3e7bf5c4ce383846f0da2c75bb3 ethereal-0.10.11-1.EL4.1.i386.rpm
fd29b49e9fd1fed6fea304f5bce3c635 ethereal-gnome-0.10.11-1.EL4.1.i386.rpm

x86_64:
29c7d4f991b56f5ce0f11c4a7967049b ethereal-0.10.11-1.EL4.1.x86_64.rpm
4ae4f5ccd3fc44ff5fe29563702178fb ethereal-gnome-0.10.11-1.EL4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ethereal-0.10.11-1.EL4.1.src.rpm
31827231cfd39c1f58c507b5f6b18f0a ethereal-0.10.11-1.EL4.1.src.rpm

i386:
242ac3e7bf5c4ce383846f0da2c75bb3 ethereal-0.10.11-1.EL4.1.i386.rpm
fd29b49e9fd1fed6fea304f5bce3c635 ethereal-gnome-0.10.11-1.EL4.1.i386.rpm

ia64:
a681b93f9a5fdf707fbeb45f5388ab60 ethereal-0.10.11-1.EL4.1.ia64.rpm
865a6db98828885c06f2830647d717c8 ethereal-gnome-0.10.11-1.EL4.1.ia64.rpm

x86_64:
29c7d4f991b56f5ce0f11c4a7967049b ethereal-0.10.11-1.EL4.1.x86_64.rpm
4ae4f5ccd3fc44ff5fe29563702178fb ethereal-gnome-0.10.11-1.EL4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/ethereal-0.10.11-1.EL4.1.src.rpm
31827231cfd39c1f58c507b5f6b18f0a ethereal-0.10.11-1.EL4.1.src.rpm

i386:
242ac3e7bf5c4ce383846f0da2c75bb3 ethereal-0.10.11-1.EL4.1.i386.rpm
fd29b49e9fd1fed6fea304f5bce3c635 ethereal-gnome-0.10.11-1.EL4.1.i386.rpm

ia64:
a681b93f9a5fdf707fbeb45f5388ab60 ethereal-0.10.11-1.EL4.1.ia64.rpm
865a6db98828885c06f2830647d717c8 ethereal-gnome-0.10.11-1.EL4.1.ia64.rpm

x86_64:
29c7d4f991b56f5ce0f11c4a7967049b ethereal-0.10.11-1.EL4.1.x86_64.rpm
4ae4f5ccd3fc44ff5fe29563702178fb ethereal-gnome-0.10.11-1.EL4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

7. References:

http://www.ethereal.com/appnotes/enpa-sa-00019.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1456
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1457
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1458
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1459
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1460
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1461
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1462
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1463
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1464
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1465
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1466
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1470

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.


Red Hat Security Advisory

Synopsis: Important: kernel security update
Advisory ID: RHSA-2005:472-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-472.html
Issue date: 2005-05-25
Updated on: 2005-05-25
Product: Red Hat Enterprise Linux
Obsoletes: RHSA-2005:294
CVE Names: CAN-2004-0491 CAN-2005-0176 CAN-2005-1263


1. Summary:

Updated kernel packages that fix several security issues in the Red Hat Enterprise L