Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Advisories, October 19, 2006

Oct 20, 2006, 03:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 1196-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
October 19th, 2006 http://www.debian.org/security/faq


Package : clamav
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-4182 CVE-2006-5295

Several remote vulnerabilities have been discovered in the ClamAV malware scan engine, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2006-4182

      Damian Put discovered a heap overflow error in the script to rebuild
      PE files, which could lead to the execution of arbitrary code.

CVE-2006-5295

      Damian Put discovered that missing input sanitising in the CHM
      handling code might lead to denial of service.

For the stable distribution (sarge) these problems have been fixed in version 0.84-2.sarge.11. Due to technical problems with the build host this update lacks a build for the Sparc architecture. It will be provided soon.

For the unstable distribution (sid) these problems have been fixed in version 0.88.5-1.

We recommend that you upgrade your clamav packages.

Upgrade Instructions


wget url

       will fetch the file for you
dpkg -i file.deb

       will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

       will update the internal database apt-get upgrade

       will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11.dsc
      Size/MD5 checksum: 874 28ac6ad45d008a1a40f1043ce208f7e9
      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11.diff.gz
      Size/MD5 checksum: 176562 4b0c191cf10e3184baee4004c7992b09
      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84.orig.tar.gz
      Size/MD5 checksum: 4006624 c43213da01d510faf117daa9a4d5326c

Architecture independent components:

      http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.84-2.sarge.11_all.deb
      Size/MD5 checksum: 154890 32b1629d649ed6168dd411e0458cca08
      http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.84-2.sarge.11_all.deb
      Size/MD5 checksum: 694414 e8160f6502023138511d613240ff8a7a
      http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.84-2.sarge.11_all.deb
      Size/MD5 checksum: 123884 82b26302a2c4697b7d58825dd64149c3

Alpha architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_alpha.deb
      Size/MD5 checksum: 74768 39a1eb656cb857019708e6a9f13e6670
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_alpha.deb
      Size/MD5 checksum: 48830 de988902ce6b7a56b0f72daa6e113614
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_alpha.deb
      Size/MD5 checksum: 2176452 e16e6c071d0233820855fb4777b90a7d
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_alpha.deb
      Size/MD5 checksum: 42120 fa4bd16b77814caf48f9c32e5ebf10f4
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_alpha.deb
      Size/MD5 checksum: 255774 19ff1809f543ca8aadb819be4b879f44
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_alpha.deb
      Size/MD5 checksum: 285586 e33630652b74d4a2ddb1c936daf4a7ec

AMD64 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_amd64.deb
      Size/MD5 checksum: 68850 03fd7d2e437ef1d337236884289f9cfd
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_amd64.deb
      Size/MD5 checksum: 44186 3b44c71024838a3d9e367807fe8664dd
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_amd64.deb
      Size/MD5 checksum: 2173268 f41d15ff5a51f3aa601d8bc1f5ddad6a
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_amd64.deb
      Size/MD5 checksum: 39988 3ae59e939bb67cb743c655089d7c66a7
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_amd64.deb
      Size/MD5 checksum: 176496 bb458a66c0422f2c567e0f5bc0db6fc0
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_amd64.deb
      Size/MD5 checksum: 259796 ace9bd92aec68b79785d812112df3b8c

ARM architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_arm.deb
      Size/MD5 checksum: 63924 13852fbd45ab407a4d12529d3c9af7d1
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_arm.deb
      Size/MD5 checksum: 39600 c11f5ed1c7d9867e2d3c8feebffeafc7
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_arm.deb
      Size/MD5 checksum: 2171292 a28d43cf47bbf88d6eb750eb32b318ee
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_arm.deb
      Size/MD5 checksum: 37314 c12fda2e2e2d6d35ca7b7907e8276cd6
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_arm.deb
      Size/MD5 checksum: 174878 4685182160e39404d8f15fe249b64a5e
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_arm.deb
      Size/MD5 checksum: 249784 0f7eeccd53136dcd6bb78ea6020e73b0

HP Precision architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_hppa.deb
      Size/MD5 checksum: 68278 35e8f30df61e0c77fd22b8c02e2f6ebb
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_hppa.deb
      Size/MD5 checksum: 43282 c0d8fe7883d6d4aff3824549bb221e89
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_hppa.deb
      Size/MD5 checksum: 2173730 4b003090224b6fedf73abd38a1a32eb2
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_hppa.deb
      Size/MD5 checksum: 39456 33b5e0dbc1dc6aff76b0b5f4164b8256
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_hppa.deb
      Size/MD5 checksum: 202698 75ddd21a939d57b35a0f2256bf0d99f7
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_hppa.deb
      Size/MD5 checksum: 283454 82057fdf8dca950c4dd3a72b5b6f811a

Intel IA-32 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_i386.deb
      Size/MD5 checksum: 65200 a945220bc5697dece23aafc00fed3d5f
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_i386.deb
      Size/MD5 checksum: 40308 60923ec7ee8c7b86881f4e5389cf43cb
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_i386.deb
      Size/MD5 checksum: 2171624 59374c11897bcaf9f3dc7c71bcb6fa56
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_i386.deb
      Size/MD5 checksum: 38038 05b67aee86f2c60105806ad74d77e32d
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_i386.deb
      Size/MD5 checksum: 159720 074ef1d4d28391d2eb394ea24c702e78
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_i386.deb
      Size/MD5 checksum: 254468 a80e82dfeb22354d3623a40e85fbbcc6

Intel IA-64 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_ia64.deb
      Size/MD5 checksum: 81828 c46f0b2c499e816a3cb440d0651a2b55
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_ia64.deb
      Size/MD5 checksum: 55246 7a442d4f53746822fe60cb1628730d00
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_ia64.deb
      Size/MD5 checksum: 2180272 33333853b7919432646bcfdae6abd54c
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_ia64.deb
      Size/MD5 checksum: 49190 53a172cf4d463f4e1650d33b4851e832
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_ia64.deb
      Size/MD5 checksum: 252174 8e184d5dba13b625ae0e44e89485c6a7
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_ia64.deb
      Size/MD5 checksum: 317870 2222c0d7e5cf059381ebd9a151b8a5af

Motorola 680x0 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_m68k.deb
      Size/MD5 checksum: 62518 7f0f240a3ecc077fc140e88bac5b1fe8
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_m68k.deb
      Size/MD5 checksum: 38194 06f87cf4f5bcccf1f8d8b1099bef70d3
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_m68k.deb
      Size/MD5 checksum: 2170504 809d90d8aedaa980866431ffa90a28aa
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_m68k.deb
      Size/MD5 checksum: 35070 02f5faec5ab1070cb09e5488d24d910b
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_m68k.deb
      Size/MD5 checksum: 146328 99c2e58e91dbbf20c126b29f0af6bc2c
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_m68k.deb
      Size/MD5 checksum: 250494 87ad44430613edb59b8b8d300786a8b7

Big endian MIPS architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_mips.deb
      Size/MD5 checksum: 67956 2e78155905e710e6b0ff27b53e45f269
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_mips.deb
      Size/MD5 checksum: 43800 fb236f7c6cf785d6a55aae1a4515338a
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_mips.deb
      Size/MD5 checksum: 2173046 ac2d5755af45a3d4a0c20c29508066c8
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_mips.deb
      Size/MD5 checksum: 37668 48b4aa4c897d00929da982ef07c8a15a
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_mips.deb
      Size/MD5 checksum: 195568 bb600d223c0b65faa1b646df27dc7e74
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_mips.deb
      Size/MD5 checksum: 257606 679b4cce53bcc33e8ac10650aff4c5a0

Little endian MIPS architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_mipsel.deb
      Size/MD5 checksum: 67556 4520d58dd04533e2777f3cca4975a4d3
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_mipsel.deb
      Size/MD5 checksum: 43598 92da7fbb103c7a1c37b05522ae1e19a2
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_mipsel.deb
      Size/MD5 checksum: 2173008 e6745c1d5156d5cfca2dac85be5f1423
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_mipsel.deb
      Size/MD5 checksum: 37954 95d22e916f84828d555c5d13674e5d4c
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_mipsel.deb
      Size/MD5 checksum: 191974 604b00ff88ac5373c196248e906beb0d
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_mipsel.deb
      Size/MD5 checksum: 255282 e904a9e0a41a5256e36fc71781135f05

PowerPC architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_powerpc.deb
      Size/MD5 checksum: 69294 07c0764302ddd5a9140581c6ede04487
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_powerpc.deb
      Size/MD5 checksum: 44674 8c9d17ca61c993632aa25da98c8b6cef
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_powerpc.deb
      Size/MD5 checksum: 2173668 5a591aa69f1d101cfce0597398c25ae6
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_powerpc.deb
      Size/MD5 checksum: 38870 8ea03838330fa3c56482e2f343c5431a
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_powerpc.deb
      Size/MD5 checksum: 187714 10bc94cec5fa66dcff4c76f49ba2e3c1
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_powerpc.deb
      Size/MD5 checksum: 264980 c5452abaf240f6f8d927ef69ea29d0b5

IBM S/390 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_s390.deb
      Size/MD5 checksum: 67898 68e72a9d5ac378fc62e1cd6bb076da18
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_s390.deb
      Size/MD5 checksum: 43554 207dcf7c5897971f44c5afbed4b660e5
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_s390.deb
      Size/MD5 checksum: 2172956 7408bb7618f0b0d4b984e009b15e3a34
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_s390.deb
      Size/MD5 checksum: 38932 dc9a5cc5dfcbd829dc65811713d84ba8
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_s390.deb
      Size/MD5 checksum: 182686 a743f6f9a8dd3aa06e51c168e6a78cf2
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_s390.deb
      Size/MD5 checksum: 269600 382c4a08915ddc6d50208aeb9468bdab

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Gentoo Linux


Gentoo Linux Security Advisory [ERRATA UPDATE] GLSA 200610-07:02

http://security.gentoo.org/


Severity: Normal

       Title: Python: Buffer Overflow
       Date: October 17, 2006
Updated: October 17, 2006
       Bugs: #149065
       ID: 200610-07:02


Errata

The Resolution proposed in the original version of this Security Advisory did not properly mention the package name.

The corrected sections appear below.

Resolution

All Python users should update to the latest version:

      # emerge --syn
      # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.3-r4"

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200610-07.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Mandriva Linux


Mandriva Linux Security Advisory MDKSA-2006:186
http://www.mandriva.com/security/


Package : kdelibs
Date : October 19, 2006
Affected: 2007.0, Corporate 3.0, Corporate 4.0


Problem Description:

A vulnerability was discovered in the way that Qt handled pixmap images and the KDE khtml library used Qt in such a way that untrusted parameters could be passed to Qt, resulting in an integer overflow. This flaw could be exploited by a remote attacker in a malicious website that, when viewed by an individual using Konqueror, would cause Konqueror to crash or possibly execute arbitrary code with the privileges of the user.

Updated packages have been patched to correct this issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811


Updated Packages:

Mandriva Linux 2007.0:
0468fedc69128d4967771b9132b756f4 2007.0/i586/kdelibs-common-3.5.4-19.1mdv2007.0.i586.rpm
2dc30948c1fdce7e25d9b7a8a9379e51 2007.0/i586/kdelibs-devel-doc-3.5.4-19.1mdv2007.0.i586.rpm
7c637c18db5254991e86662b4d0a3dbd 2007.0/i586/libkdecore4-3.5.4-19.1mdv2007.0.i586.rpm
2990a2078b4971d5b3fff5a8282834aa 2007.0/i586/libkdecore4-devel-3.5.4-19.1mdv2007.0.i586.rpm
de92b184fd62a8aa54278c0a7aeb5f43 2007.0/SRPMS/kdelibs-3.5.4-19.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
e067573bb458b0606e19c8950fedb860 2007.0/x86_64/kdelibs-common-3.5.4-19.1mdv2007.0.x86_64.rpm
5143af28520ea05d50bc07a92523bf5a 2007.0/x86_64/kdelibs-devel-doc-3.5.4-19.1mdv2007.0.x86_64.rpm
452cd5fe9b000d31911cc8b19dbed9ca 2007.0/x86_64/lib64kdecore4-3.5.4-19.1mdv2007.0.x86_64.rpm
22e66d820ad6e94c332df514e756b06c 2007.0/x86_64/lib64kdecore4-devel-3.5.4-19.1mdv2007.0.x86_64.rpm
de92b184fd62a8aa54278c0a7aeb5f43 2007.0/SRPMS/kdelibs-3.5.4-19.1mdv2007.0.src.rpm

Corporate 3.0:
692f918e3e7acbe933684d973261ca0c corporate/3.0/i586/kdelibs-common-3.2-36.16.C30mdk.i586.rpm
8537e316e30762eb2420e0c2412ffaf8 corporate/3.0/i586/libkdecore4-3.2-36.16.C30mdk.i586.rpm
37d09cd7b937ac25e98b87fe4161bfe1 corporate/3.0/i586/libkdecore4-devel-3.2-36.16.C30mdk.i586.rpm
815b64f8f6d1309414fa128ff049fa8a corporate/3.0/SRPMS/kdelibs-3.2-36.16.C30mdk.src.rpm

Corporate 3.0/X86_64:
80f41ba7cab5c29812574b255487ff75 corporate/3.0/x86_64/kdelibs-common-3.2-36.16.C30mdk.x86_64.rpm
690b32020e45a8f1e1d7cff8dc3d342b corporate/3.0/x86_64/lib64kdecore4-3.2-36.16.C30mdk.x86_64.rpm
39f37ea645b542dfd872b015d7b2db53 corporate/3.0/x86_64/lib64kdecore4-devel-3.2-36.16.C30mdk.x86_64.rpm
8537e316e30762eb2420e0c2412ffaf8 corporate/3.0/x86_64/libkdecore4-3.2-36.16.C30mdk.i586.rpm
815b64f8f6d1309414fa128ff049fa8a corporate/3.0/SRPMS/kdelibs-3.2-36.16.C30mdk.src.rpm

Corporate 4.0:
3561f4ec95d79ede9284cb1ff897681b corporate/4.0/i586/kdelibs-arts-3.5.4-1.2.20060mlcs4.i586.rpm
3e19560491f720fd9034a95dfb4f529d corporate/4.0/i586/kdelibs-common-3.5.4-1.2.20060mlcs4.i586.rpm
633e83e144a3a0daa1057ecae48a0991 corporate/4.0/i586/kdelibs-devel-doc-3.5.4-1.2.20060mlcs4.i586.rpm
853c0d7af1b8515c9226eb3ff1ae0e52 corporate/4.0/i586/libkdecore4-3.5.4-1.2.20060mlcs4.i586.rpm
ffe121c5ed1528769d981a5b5d526b81 corporate/4.0/i586/libkdecore4-devel-3.5.4-1.2.20060mlcs4.i586.rpm
52f9f74e64bf4da50df95c02d350fa11 corporate/4.0/SRPMS/kdelibs-3.5.4-1.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
6ad107993dc8ba3726eb47bb087393e4 corporate/4.0/x86_64/kdelibs-arts-3.5.4-1.2.20060mlcs4.x86_64.rpm
4be667bf1d745fedc81314d697e3320a corporate/4.0/x86_64/kdelibs-common-3.5.4-1.2.20060mlcs4.x86_64.rpm
a1480b53dcf74c2af2c044c0da4b45d7 corporate/4.0/x86_64/kdelibs-devel-doc-3.5.4-1.2.20060mlcs4.x86_64.rpm
e40a8bb434849c3976ba57f1e52ba78e corporate/4.0/x86_64/lib64kdecore4-3.5.4-1.2.20060mlcs4.x86_64.rpm
4e488a23bad70524ef7d731b834cbe50 corporate/4.0/x86_64/lib64kdecore4-devel-3.5.4-1.2.20060mlcs4.x86_64.rpm
52f9f74e64bf4da50df95c02d350fa11 corporate/4.0/SRPMS/kdelibs-3.5.4-1.2.20060mlcs4.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com>

Red Hat Linux


Red Hat Security Advisory

Synopsis: Important: kernel security update
Advisory ID: RHSA-2006:0710-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0710.html
Issue date: 2006-10-19
Updated on: 2006-10-19
Product: Red Hat Enterprise Linux
Keywords: taroon kernel security errata
Obsoletes: RHSA-2006:0437
CVE Names: CVE-2006-1864 CVE-2006-2071 CVE-2006-2935 CVE-2006-4342 CVE-2006-4997 CVE-2006-5174


1. Summary:

Updated kernel packages that fix several security issues in the Red Hat Enterprise Linux 3 kernel are now available.

This security advisory has been rated as having important security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described below:

  • a flaw in the IPC shared-memory implementation that allowed a local user to cause a denial of service (deadlock) that resulted in freezing the system (CVE-2006-4342, Important)
  • an information leak in the copy_from_user() implementation on s390 and s390x platforms that allowed a local user to read arbitrary kernel memory (CVE-2006-5174, Important)
  • a flaw in the ATM subsystem affecting systems with installed ATM hardware and configured ATM support that allowed a remote user to cause a denial of service (panic) by accessing socket buffer memory after it has been freed (CVE-2006-4997, Moderate)
  • a directory traversal vulnerability in smbfs that allowed a local user to escape chroot restrictions for an SMB-mounted filesystem via "..\" sequences (CVE-2006-1864, Moderate)
  • a flaw in the mprotect system call that allowed enabling write permission for a read-only attachment of shared memory (CVE-2006-2071, Moderate)
  • a flaw in the DVD handling of the CDROM driver that could be used together with a custom built USB device to gain root privileges (CVE-2006-2935, Moderate)

In addition to the security issues described above, a bug fix for a clock skew problem (which could lead to unintended keyboard repeat under X11) was also included. The problem only occurred when running the 32-bit x86 kernel on 64-bit dual-core x86_64 hardware.

Note: The kernel-unsupported package contains various drivers and modules that are unsupported and therefore might contain security problems that have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architecture and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

169428 - repetitive keystroke issue on both RH3 U5 32bit and RH4 U1 32bit.
189436 - CVE-2006-1864 smbfs chroot issue
190074 - CVE-2006-2071 mprotect gives write permission to a readonly attachment
197672 - CVE-2006-2935 Possible buffer overflow in DVD handling
205618 - CVE-2006-4342 shmat hangs by simultaneous shmctl(IPC_RMID)
206270 - CVE-2006-4997 IP over ATM clip_mkip dereference freed pointer
209436 - CVE-2006-5174 copy_from_user information leak on s390

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm
fe57bb5ba14c1f2410b158ed5900f8af kernel-2.4.21-47.0.1.EL.src.rpm

i386:
0f313988a3b5ee1c13eef6ac33f90366 kernel-2.4.21-47.0.1.EL.athlon.rpm
69feb474be6b1bee161180ccc07891b6
kernel-2.4.21-47.0.1.EL.i686.rpm
cfeeab04ef806f0f067975b6d652053f kernel-BOOT-2.4.21-47.0.1.EL.i386.rpm
0b580ecfd116199f4dd8c92111e7af2d
kernel-debuginfo-2.4.21-47.0.1.EL.athlon.rpm
584ac1201581a453f48da2d6bcb78e7c kernel-debuginfo-2.4.21-47.0.1.EL.i386.rpm
d72dca6f97c717b4ce0e7698016fcad4
kernel-debuginfo-2.4.21-47.0.1.EL.i686.rpm
6792b74295d0ece09cd1c108c9d8f23e kernel-doc-2.4.21-47.0.1.EL.i386.rpm
4ec2c0fa1fbf3017bdaf36c6ae8f75a3
kernel-hugemem-2.4.21-47.0.1.EL.i686.rpm
3617b38352971c71c64d5560db52b3ad kernel-hugemem-unsupported-2.4.21-47.0.1.EL.i686.rpm
51ae45ba954b3ff40f4f162c369fefbe
kernel-smp-2.4.21-47.0.1.EL.athlon.rpm
e4cf369455f6ae40d67e29711bee6519 kernel-smp-2.4.21-47.0.1.EL.i686.rpm
91abcffc492b21a8953a2745ddbed3e2
kernel-smp-unsupported-2.4.21-47.0.1.EL.athlon.rpm
40510c2d3066d9b789ec669be6d70dfb kernel-smp-unsupported-2.4.21-47.0.1.EL.i686.rpm
cef35a37a7bc657f5e6989fa5e1b5d47
kernel-source-2.4.21-47.0.1.EL.i386.rpm
b0c04546c3d59e4d6646123d41ecdc35 kernel-unsupported-2.4.21-47.0.1.EL.athlon.rpm
49b1c869f5e57f0e4996d65f2af6abba
kernel-unsupported-2.4.21-47.0.1.EL.i686.rpm

ia64:
47f0a4f327831bc6410334a6a4455e21 kernel-2.4.21-47.0.1.EL.ia64.rpm
0d06dd40f1920fc487a9f85e57de6234
kernel-debuginfo-2.4.21-47.0.1.EL.ia64.rpm
5c292c4491643ee45a1b97dcdbdd2847 kernel-doc-2.4.21-47.0.1.EL.ia64.rpm
bec034502e425f71d4283caffbce0b1b
kernel-source-2.4.21-47.0.1.EL.ia64.rpm
1ba8b8f6b004e84ff7c14cdd240fa4bc kernel-unsupported-2.4.21-47.0.1.EL.ia64.rpm

ppc:
2f96672418b277c5e3a58dff0d68b029 kernel-2.4.21-47.0.1.EL.ppc64iseries.rpm
e85ec012314131b50d8fe46c682d358f
kernel-2.4.21-47.0.1.EL.ppc64pseries.rpm
fbbfbb2d1a2527058dfae7b75f553c1c kernel-debuginfo-2.4.21-47.0.1.EL.ppc64.rpm
069b9d978dcf771836d6a779b0a1fe70
kernel-debuginfo-2.4.21-47.0.1.EL.ppc64iseries.rpm
b10dd5d39b92aa8a88e57f24c6f024af kernel-debuginfo-2.4.21-47.0.1.EL.ppc64pseries.rpm
2698e18f678563138bef3261dea9759f
kernel-doc-2.4.21-47.0.1.EL.ppc64.rpm
9eab3900eb6956ae11be1ed1548d3153 kernel-source-2.4.21-47.0.1.EL.ppc64.rpm
157ccc0bdf87ed876355e55e94e3d43b
kernel-unsupported-2.4.21-47.0.1.EL.ppc64iseries.rpm
782224ea0019ca9cef8a21540f5227d7 kernel-unsupported-2.4.21-47.0.1.EL.ppc64pseries.rpm

s390:
80aad86ed64d189d9ba16d2ec37c61d1 kernel-2.4.21-47.0.1.EL.s390.rpm
a256d51fa8ed3d633638717d86973351
kernel-debuginfo-2.4.21-47.0.1.EL.s390.rpm
0981d57893d93eb7c47dd52c4e5695b6 kernel-doc-2.4.21-47.0.1.EL.s390.rpm
d2d86901a3bb6ec15a5b52cdfefcb697
kernel-source-2.4.21-47.0.1.EL.s390.rpm
e0c0c89de07cf2e0958247eea2d7a6ec kernel-unsupported-2.4.21-47.0.1.EL.s390.rpm

s390x:
3b4e35b36335ff8464bd355c3e215c62 kernel-2.4.21-47.0.1.EL.s390x.rpm
98256fe095ed60fac7acb95786f2f825
kernel-debuginfo-2.4.21-47.0.1.EL.s390x.rpm
46853dab961b6f0259847c313bc2c74c kernel-doc-2.4.21-47.0.1.EL.s390x.rpm
f88b41322834d7de02030a79607748e8
kernel-source-2.4.21-47.0.1.EL.s390x.rpm
adfcb3d2981bf71d5684828d5c4bcdbe kernel-unsupported-2.4.21-47.0.1.EL.s390x.rpm

x86_64:
ff59e82c378d27a85273dfe2c2ecf198 kernel-2.4.21-47.0.1.EL.ia32e.rpm
3eac97481cabbf31b26b658d77ef3145
kernel-2.4.21-47.0.1.EL.x86_64.rpm
a7238213f3d21fedc7119cda744b5840 kernel-debuginfo-2.4.21-47.0.1.EL.ia32e.rpm
383b6deb766f4193d01f227486ff73bc
kernel-debuginfo-2.4.21-47.0.1.EL.x86_64.rpm
66af96af71704aaaa39ad359dd641cd2 kernel-doc-2.4.21-47.0.1.EL.x86_64.rpm
95823cfe05beddc2de47ea0ddb87f2aa
kernel-smp-2.4.21-47.0.1.EL.x86_64.rpm
502f7c42a96d3b40c09f4e708a326ca4 kernel-smp-unsupported-2.4.21-47.0.1.EL.x86_64.rpm
f76a70595a8cbbff038fdc83e8eb818a
kernel-source-2.4.21-47.0.1.EL.x86_64.rpm
8e2e4813caec5884256374c62f823f7d kernel-unsupported-2.4.21-47.0.1.EL.ia32e.rpm
d0b7dda546e145208f4193b0e0d901bb
kernel-unsupported-2.4.21-47.0.1.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm
fe57bb5ba14c1f2410b158ed5900f8af kernel-2.4.21-47.0.1.EL.src.rpm

i386:
0f313988a3b5ee1c13eef6ac33f90366 kernel-2.4.21-47.0.1.EL.athlon.rpm
69feb474be6b1bee161180ccc07891b6
kernel-2.4.21-47.0.1.EL.i686.rpm
cfeeab04ef806f0f067975b6d652053f kernel-BOOT-2.4.21-47.0.1.EL.i386.rpm
0b580ecfd116199f4dd8c92111e7af2d
kernel-debuginfo-2.4.21-47.0.1.EL.athlon.rpm
584ac1201581a453f48da2d6bcb78e7c kernel-debuginfo-2.4.21-47.0.1.EL.i386.rpm
d72dca6f97c717b4ce0e7698016fcad4
kernel-debuginfo-2.4.21-47.0.1.EL.i686.rpm
6792b74295d0ece09cd1c108c9d8f23e kernel-doc-2.4.21-47.0.1.EL.i386.rpm
4ec2c0fa1fbf3017bdaf36c6ae8f75a3
kernel-hugemem-2.4.21-47.0.1.EL.i686.rpm
3617b38352971c71c64d5560db52b3ad kernel-hugemem-unsupported-2.4.21-47.0.1.EL.i686.rpm
51ae45ba954b3ff40f4f162c369fefbe
kernel-smp-2.4.21-47.0.1.EL.athlon.rpm
e4cf369455f6ae40d67e29711bee6519 kernel-smp-2.4.21-47.0.1.EL.i686.rpm
91abcffc492b21a8953a2745ddbed3e2
kernel-smp-unsupported-2.4.21-47.0.1.EL.athlon.rpm
40510c2d3066d9b789ec669be6d70dfb kernel-smp-unsupported-2.4.21-47.0.1.EL.i686.rpm
cef35a37a7bc657f5e6989fa5e1b5d47
kernel-source-2.4.21-47.0.1.EL.i386.rpm
b0c04546c3d59e4d6646123d41ecdc35 kernel-unsupported-2.4.21-47.0.1.EL.athlon.rpm
49b1c869f5e57f0e4996d65f2af6abba
kernel-unsupported-2.4.21-47.0.1.EL.i686.rpm

x86_64:
ff59e82c378d27a85273dfe2c2ecf198 kernel-2.4.21-47.0.1.EL.ia32e.rpm
3eac97481cabbf31b26b658d77ef3145
kernel-2.4.21-47.0.1.EL.x86_64.rpm
a7238213f3d21fedc7119cda744b5840 kernel-debuginfo-2.4.21-47.0.1.EL.ia32e.rpm
383b6deb766f4193d01f227486ff73bc
kernel-debuginfo-2.4.21-47.0.1.EL.x86_64.rpm
66af96af71704aaaa39ad359dd641cd2 kernel-doc-2.4.21-47.0.1.EL.x86_64.rpm
95823cfe05beddc2de47ea0ddb87f2aa
kernel-smp-2.4.21-47.0.1.EL.x86_64.rpm
502f7c42a96d3b40c09f4e708a326ca4 kernel-smp-unsupported-2.4.21-47.0.1.EL.x86_64.rpm
f76a70595a8cbbff038fdc83e8eb818a
kernel-source-2.4.21-47.0.1.EL.x86_64.rpm
8e2e4813caec5884256374c62f823f7d kernel-unsupported-2.4.21-47.0.1.EL.ia32e.rpm
d0b7dda546e145208f4193b0e0d901bb
kernel-unsupported-2.4.21-47.0.1.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm
fe57bb5ba14c1f2410b158ed5900f8af kernel-2.4.21-47.0.1.EL.src.rpm

i386:
0f313988a3b5ee1c13eef6ac33f90366 kernel-2.4.21-47.0.1.EL.athlon.rpm
69feb474be6b1bee161180ccc07891b6
kernel-2.4.21-47.0.1.EL.i686.rpm
cfeeab04ef806f0f067975b6d652053f kernel-BOOT-2.4.21-47.0.1.EL.i386.rpm
0b580ecfd116199f4dd8c92111e7af2d
kernel-debuginfo-2.4.21-47.0.1.EL.athlon.rpm
584ac1201581a453f48da2d6bcb78e7c kernel-debuginfo-2.4.21-47.0.1.EL.i386.rpm
d72dca6f97c717b4ce0e7698016fcad4
kernel-debuginfo-2.4.21-47.0.1.EL.i686.rpm
6792b74295d0ece09cd1c108c9d8f23e kernel-doc-2.4.21-47.0.1.EL.i386.rpm
4ec2c0fa1fbf3017bdaf36c6ae8f75a3
kernel-hugemem-2.4.21-47.0.1.EL.i686.rpm
3617b38352971c71c64d5560db52b3ad kernel-hugemem-unsupported-2.4.21-47.0.1.EL.i686.rpm
51ae45ba954b3ff40f4f162c369fefbe
kernel-smp-2.4.21-47.0.1.EL.athlon.rpm
e4cf369455f6ae40d67e29711bee6519 kernel-smp-2.4.21-47.0.1.EL.i686.rpm
91abcffc492b21a8953a2745ddbed3e2
kernel-smp-unsupported-2.4.21-47.0.1.EL.athlon.rpm
40510c2d3066d9b789ec669be6d70dfb kernel-smp-unsupported-2.4.21-47.0.1.EL.i686.rpm
cef35a37a7bc657f5e6989fa5e1b5d47
kernel-source-2.4.21-47.0.1.EL.i386.rpm
b0c04546c3d59e4d6646123d41ecdc35 kernel-unsupported-2.4.21-47.0.1.EL.athlon.rpm
49b1c869f5e57f0e4996d65f2af6abba
kernel-unsupported-2.4.21-47.0.1.EL.i686.rpm

ia64:
47f0a4f327831bc6410334a6a4455e21 kernel-2.4.21-47.0.1.EL.ia64.rpm
0d06dd40f1920fc487a9f85e57de6234
kernel-debuginfo-2.4.21-47.0.1.EL.ia64.rpm
5c292c4491643ee45a1b97dcdbdd2847 kernel-doc-2.4.21-47.0.1.EL.ia64.rpm
bec034502e425f71d4283caffbce0b1b
kernel-source-2.4.21-47.0.1.EL.ia64.rpm
1ba8b8f6b004e84ff7c14cdd240fa4bc kernel-unsupported-2.4.21-47.0.1.EL.ia64.rpm

x86_64:
ff59e82c378d27a85273dfe2c2ecf198 kernel-2.4.21-47.0.1.EL.ia32e.rpm
3eac97481cabbf31b26b658d77ef3145
kernel-2.4.21-47.0.1.EL.x86_64.rpm
a7238213f3d21fedc7119cda744b5840 kernel-debuginfo-2.4.21-47.0.1.EL.ia32e.rpm
383b6deb766f4193d01f227486ff73bc
kernel-debuginfo-2.4.21-47.0.1.EL.x86_64.rpm
66af96af71704aaaa39ad359dd641cd2 kernel-doc-2.4.21-47.0.1.EL.x86_64.rpm
95823cfe05beddc2de47ea0ddb87f2aa
kernel-smp-2.4.21-47.0.1.EL.x86_64.rpm
502f7c42a96d3b40c09f4e708a326ca4 kernel-smp-unsupported-2.4.21-47.0.1.EL.x86_64.rpm
f76a70595a8cbbff038fdc83e8eb818a
kernel-source-2.4.21-47.0.1.EL.x86_64.rpm
8e2e4813caec5884256374c62f823f7d kernel-unsupported-2.4.21-47.0.1.EL.ia32e.rpm
d0b7dda546e145208f4193b0e0d901bb
kernel-unsupported-2.4.21-47.0.1.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm
fe57bb5ba14c1f2410b158ed5900f8af kernel-2.4.21-47.0.1.EL.src.rpm

i386:
0f313988a3b5ee1c13eef6ac33f90366 kernel-2.4.21-47.0.1.EL.athlon.rpm
69feb474be6b1bee161180ccc07891b6
kernel-2.4.21-47.0.1.EL.i686.rpm
cfeeab04ef806f0f067975b6d652053f kernel-BOOT-2.4.21-47.0.1.EL.i386.rpm
0b580ecfd116199f4dd8c92111e7af2d
kernel-debuginfo-2.4.21-47.0.1.EL.athlon.rpm
584ac1201581a453f48da2d6bcb78e7c kernel-debuginfo-2.4.21-47.0.1.EL.i386.rpm
d72dca6f97c717b4ce0e7698016fcad4
kernel-debuginfo-2.4.21-47.0.1.EL.i686.rpm
6792b74295d0ece09cd1c108c9d8f23e kernel-doc-2.4.21-47.0.1.EL.i386.rpm
4ec2c0fa1fbf3017bdaf36c6ae8f75a3
kernel-hugemem-2.4.21-47.0.1.EL.i686.rpm
3617b38352971c71c64d5560db52b3ad kernel-hugemem-unsupported-2.4.21-47.0.1.EL.i686.rpm
51ae45ba954b3ff40f4f162c369fefbe
kernel-smp-2.4.21-47.0.1.EL.athlon.rpm
e4cf369455f6ae40d67e29711bee6519 kernel-smp-2.4.21-47.0.1.EL.i686.rpm
91abcffc492b21a8953a2745ddbed3e2
kernel-smp-unsupported-2.4.21-47.0.1.EL.athlon.rpm
40510c2d3066d9b789ec669be6d70dfb kernel-smp-unsupported-2.4.21-47.0.1.EL.i686.rpm
cef35a37a7bc657f5e6989fa5e1b5d47
kernel-source-2.4.21-47.0.1.EL.i386.rpm
b0c04546c3d59e4d6646123d41ecdc35 kernel-unsupported-2.4.21-47.0.1.EL.athlon.rpm
49b1c869f5e57f0e4996d65f2af6abba
kernel-unsupported-2.4.21-47.0.1.EL.i686.rpm

ia64:
47f0a4f327831bc6410334a6a4455e21 kernel-2.4.21-47.0.1.EL.ia64.rpm
0d06dd40f1920fc487a9f85e57de6234
kernel-debuginfo-2.4.21-47.0.1.EL.ia64.rpm
5c292c4491643ee45a1b97dcdbdd2847 kernel-doc-2.4.21-47.0.1.EL.ia64.rpm
bec034502e425f71d4283caffbce0b1b
kernel-source-2.4.21-47.0.1.EL.ia64.rpm
1ba8b8f6b004e84ff7c14cdd240fa4bc kernel-unsupported-2.4.21-47.0.1.EL.ia64.rpm

x86_64:
ff59e82c378d27a85273dfe2c2ecf198 kernel-2.4.21-47.0.1.EL.ia32e.rpm
3eac97481cabbf31b26b658d77ef3145
kernel-2.4.21-47.0.1.EL.x86_64.rpm
a7238213f3d21fedc7119cda744b5840 kernel-debuginfo-2.4.21-47.0.1.EL.ia32e.rpm
383b6deb766f4193d01f227486ff73bc
kernel-debuginfo-2.4.21-47.0.1.EL.x86_64.rpm
66af96af71704aaaa39ad359dd641cd2 kernel-doc-2.4.21-47.0.1.EL.x86_64.rpm
95823cfe05beddc2de47ea0ddb87f2aa
kernel-smp-2.4.21-47.0.1.EL.x86_64.rpm
502f7c42a96d3b40c09f4e708a326ca4 kernel-smp-unsupported-2.4.21-47.0.1.EL.x86_64.rpm
f76a70595a8cbbff038fdc83e8eb818a
kernel-source-2.4.21-47.0.1.EL.x86_64.rpm
8e2e4813caec5884256374c62f823f7d kernel-unsupported-2.4.21-47.0.1.EL.ia32e.rpm
d0b7dda546e145208f4193b0e0d901bb
kernel-unsupported-2.4.21-47.0.1.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5174
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.

rPath Linux

rPath Security Advisory: 2006-0195-1
Published: 2006-10-18
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
      Indirect User Deterministic Unauthorized Access
Updated Versions:
      kdelibs=/conary.rpath.com@rpl:devel//1/3.4.2-5.12-1

References:

      http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811
      https://issues.rpath.com/browse/RPL-723

Description:

      Previous versions of the KDE khtml library use Qt in a way that
      allows unchecked pixmap image input to be provided to Qt, triggering
      an integer overflow flaw in Qt. This enables a user-complicit denial
      of service attack (application crash), or possibly unauthorized access
      via arbitrary code execution.

Trustix Secure Linux


Trustix Secure Linux Security Advisory #2006-0057

Package names: clamav, kernel, php, php4, python, xorg-x11
Summary: Multiple vulnerabilities
Date: 2006-10-18
Affected versions: Trustix Secure Linux 2.2 Trustix Secure Linux 3.0 Trustix Operating System - Enterprise Server 2


Package description:
clamav
Clam AntiVirus is a GPL anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with package, which you can use with your own software. Most importantly, the virus database is kept up to date .

kernel
The kernel package contains the Linux kernel (vmlinuz), the core of your Trustix Secure Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.

php
PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled