---

Advisories, October 19, 2006

Debian GNU/Linux


Debian Security Advisory DSA 1196-1 security@debian.org
http://www.debian.org/security/
Moritz Muehlenhoff
October 19th, 2006 http://www.debian.org/security/faq


Package : clamav
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-4182 CVE-2006-5295

Several remote vulnerabilities have been discovered in the
ClamAV malware scan engine, which may lead to the execution of
arbitrary code. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2006-4182

      Damian Put discovered a heap
overflow error in the script to rebuild
      PE files, which could lead to
the execution of arbitrary code.

CVE-2006-5295

      Damian Put discovered that
missing input sanitising in the CHM
      handling code might lead to
denial of service.

For the stable distribution (sarge) these problems have been
fixed in version 0.84-2.sarge.11. Due to technical problems with
the build host this update lacks a build for the Sparc
architecture. It will be provided soon.

For the unstable distribution (sid) these problems have been
fixed in version 0.88.5-1.

We recommend that you upgrade your clamav packages.

Upgrade Instructions


wget url

       will fetch the file for
you
dpkg -i file.deb

       will install the referenced
file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

       will update the internal
database apt-get upgrade

       will install corrected
packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11.dsc

      Size/MD5 checksum: 874
28ac6ad45d008a1a40f1043ce208f7e9
      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11.diff.gz

      Size/MD5 checksum: 176562
4b0c191cf10e3184baee4004c7992b09
      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84.orig.tar.gz

      Size/MD5 checksum: 4006624
c43213da01d510faf117daa9a4d5326c

Architecture independent components:

      http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.84-2.sarge.11_all.deb

      Size/MD5 checksum: 154890
32b1629d649ed6168dd411e0458cca08
      http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.84-2.sarge.11_all.deb

      Size/MD5 checksum: 694414
e8160f6502023138511d613240ff8a7a
      http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.84-2.sarge.11_all.deb

      Size/MD5 checksum: 123884
82b26302a2c4697b7d58825dd64149c3

Alpha architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_alpha.deb

      Size/MD5 checksum: 74768
39a1eb656cb857019708e6a9f13e6670
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_alpha.deb

      Size/MD5 checksum: 48830
de988902ce6b7a56b0f72daa6e113614
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_alpha.deb

      Size/MD5 checksum: 2176452
e16e6c071d0233820855fb4777b90a7d
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_alpha.deb

      Size/MD5 checksum: 42120
fa4bd16b77814caf48f9c32e5ebf10f4
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_alpha.deb

      Size/MD5 checksum: 255774
19ff1809f543ca8aadb819be4b879f44
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_alpha.deb

      Size/MD5 checksum: 285586
e33630652b74d4a2ddb1c936daf4a7ec

AMD64 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_amd64.deb

      Size/MD5 checksum: 68850
03fd7d2e437ef1d337236884289f9cfd
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_amd64.deb

      Size/MD5 checksum: 44186
3b44c71024838a3d9e367807fe8664dd
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_amd64.deb

      Size/MD5 checksum: 2173268
f41d15ff5a51f3aa601d8bc1f5ddad6a
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_amd64.deb

      Size/MD5 checksum: 39988
3ae59e939bb67cb743c655089d7c66a7
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_amd64.deb

      Size/MD5 checksum: 176496
bb458a66c0422f2c567e0f5bc0db6fc0
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_amd64.deb

      Size/MD5 checksum: 259796
ace9bd92aec68b79785d812112df3b8c

ARM architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_arm.deb

      Size/MD5 checksum: 63924
13852fbd45ab407a4d12529d3c9af7d1
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_arm.deb

      Size/MD5 checksum: 39600
c11f5ed1c7d9867e2d3c8feebffeafc7
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_arm.deb

      Size/MD5 checksum: 2171292
a28d43cf47bbf88d6eb750eb32b318ee
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_arm.deb

      Size/MD5 checksum: 37314
c12fda2e2e2d6d35ca7b7907e8276cd6
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_arm.deb

      Size/MD5 checksum: 174878
4685182160e39404d8f15fe249b64a5e
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_arm.deb

      Size/MD5 checksum: 249784
0f7eeccd53136dcd6bb78ea6020e73b0

HP Precision architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_hppa.deb

      Size/MD5 checksum: 68278
35e8f30df61e0c77fd22b8c02e2f6ebb
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_hppa.deb

      Size/MD5 checksum: 43282
c0d8fe7883d6d4aff3824549bb221e89
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_hppa.deb

      Size/MD5 checksum: 2173730
4b003090224b6fedf73abd38a1a32eb2
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_hppa.deb

      Size/MD5 checksum: 39456
33b5e0dbc1dc6aff76b0b5f4164b8256
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_hppa.deb

      Size/MD5 checksum: 202698
75ddd21a939d57b35a0f2256bf0d99f7
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_hppa.deb

      Size/MD5 checksum: 283454
82057fdf8dca950c4dd3a72b5b6f811a

Intel IA-32 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_i386.deb

      Size/MD5 checksum: 65200
a945220bc5697dece23aafc00fed3d5f
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_i386.deb

      Size/MD5 checksum: 40308
60923ec7ee8c7b86881f4e5389cf43cb
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_i386.deb

      Size/MD5 checksum: 2171624
59374c11897bcaf9f3dc7c71bcb6fa56
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_i386.deb

      Size/MD5 checksum: 38038
05b67aee86f2c60105806ad74d77e32d
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_i386.deb

      Size/MD5 checksum: 159720
074ef1d4d28391d2eb394ea24c702e78
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_i386.deb

      Size/MD5 checksum: 254468
a80e82dfeb22354d3623a40e85fbbcc6

Intel IA-64 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_ia64.deb

      Size/MD5 checksum: 81828
c46f0b2c499e816a3cb440d0651a2b55
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_ia64.deb

      Size/MD5 checksum: 55246
7a442d4f53746822fe60cb1628730d00
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_ia64.deb

      Size/MD5 checksum: 2180272
33333853b7919432646bcfdae6abd54c
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_ia64.deb

      Size/MD5 checksum: 49190
53a172cf4d463f4e1650d33b4851e832
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_ia64.deb

      Size/MD5 checksum: 252174
8e184d5dba13b625ae0e44e89485c6a7
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_ia64.deb

      Size/MD5 checksum: 317870
2222c0d7e5cf059381ebd9a151b8a5af

Motorola 680×0 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_m68k.deb

      Size/MD5 checksum: 62518
7f0f240a3ecc077fc140e88bac5b1fe8
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_m68k.deb

      Size/MD5 checksum: 38194
06f87cf4f5bcccf1f8d8b1099bef70d3
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_m68k.deb

      Size/MD5 checksum: 2170504
809d90d8aedaa980866431ffa90a28aa
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_m68k.deb

      Size/MD5 checksum: 35070
02f5faec5ab1070cb09e5488d24d910b
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_m68k.deb

      Size/MD5 checksum: 146328
99c2e58e91dbbf20c126b29f0af6bc2c
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_m68k.deb

      Size/MD5 checksum: 250494
87ad44430613edb59b8b8d300786a8b7

Big endian MIPS architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_mips.deb

      Size/MD5 checksum: 67956
2e78155905e710e6b0ff27b53e45f269
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_mips.deb

      Size/MD5 checksum: 43800
fb236f7c6cf785d6a55aae1a4515338a
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_mips.deb

      Size/MD5 checksum: 2173046
ac2d5755af45a3d4a0c20c29508066c8
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_mips.deb

      Size/MD5 checksum: 37668
48b4aa4c897d00929da982ef07c8a15a
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_mips.deb

      Size/MD5 checksum: 195568
bb600d223c0b65faa1b646df27dc7e74
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_mips.deb

      Size/MD5 checksum: 257606
679b4cce53bcc33e8ac10650aff4c5a0

Little endian MIPS architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_mipsel.deb

      Size/MD5 checksum: 67556
4520d58dd04533e2777f3cca4975a4d3
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_mipsel.deb

      Size/MD5 checksum: 43598
92da7fbb103c7a1c37b05522ae1e19a2
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_mipsel.deb

      Size/MD5 checksum: 2173008
e6745c1d5156d5cfca2dac85be5f1423
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_mipsel.deb

      Size/MD5 checksum: 37954
95d22e916f84828d555c5d13674e5d4c
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_mipsel.deb

      Size/MD5 checksum: 191974
604b00ff88ac5373c196248e906beb0d
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_mipsel.deb

      Size/MD5 checksum: 255282
e904a9e0a41a5256e36fc71781135f05

PowerPC architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_powerpc.deb

      Size/MD5 checksum: 69294
07c0764302ddd5a9140581c6ede04487
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_powerpc.deb

      Size/MD5 checksum: 44674
8c9d17ca61c993632aa25da98c8b6cef
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_powerpc.deb

      Size/MD5 checksum: 2173668
5a591aa69f1d101cfce0597398c25ae6
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_powerpc.deb

      Size/MD5 checksum: 38870
8ea03838330fa3c56482e2f343c5431a
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_powerpc.deb

      Size/MD5 checksum: 187714
10bc94cec5fa66dcff4c76f49ba2e3c1
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_powerpc.deb

      Size/MD5 checksum: 264980
c5452abaf240f6f8d927ef69ea29d0b5

IBM S/390 architecture:

      http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.11_s390.deb

      Size/MD5 checksum: 67898
68e72a9d5ac378fc62e1cd6bb076da18
      http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.11_s390.deb

      Size/MD5 checksum: 43554
207dcf7c5897971f44c5afbed4b660e5
      http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.11_s390.deb

      Size/MD5 checksum: 2172956
7408bb7618f0b0d4b984e009b15e3a34
      http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.11_s390.deb

      Size/MD5 checksum: 38932
dc9a5cc5dfcbd829dc65811713d84ba8
      http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.11_s390.deb

      Size/MD5 checksum: 182686
a743f6f9a8dd3aa06e51c168e6a78cf2
      http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.11_s390.deb

      Size/MD5 checksum: 269600
382c4a08915ddc6d50208aeb9468bdab

These files will probably be moved into the stable distribution
on its next update.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Gentoo Linux


Gentoo Linux Security Advisory [ERRATA UPDATE] GLSA 200610-07:02


http://security.gentoo.org/


Severity: Normal

       Title: Python: Buffer
Overflow
       Date: October 17, 2006
Updated: October 17, 2006
       Bugs: #149065
       ID: 200610-07:02


Errata

The Resolution proposed in the original version of this Security
Advisory did not properly mention the package name.

The corrected sections appear below.

Resolution

All Python users should update to the latest version:

      # emerge --syn
      # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.3-r4"

Availability

This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200610-07.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).

The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Mandriva Linux


Mandriva Linux Security Advisory MDKSA-2006:186
http://www.mandriva.com/security/


Package : kdelibs
Date : October 19, 2006
Affected: 2007.0, Corporate 3.0, Corporate 4.0


Problem Description:

A vulnerability was discovered in the way that Qt handled pixmap
images and the KDE khtml library used Qt in such a way that
untrusted parameters could be passed to Qt, resulting in an integer
overflow. This flaw could be exploited by a remote attacker in a
malicious website that, when viewed by an individual using
Konqueror, would cause Konqueror to crash or possibly execute
arbitrary code with the privileges of the user.

Updated packages have been patched to correct this issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811


Updated Packages:

Mandriva Linux 2007.0:
0468fedc69128d4967771b9132b756f4
2007.0/i586/kdelibs-common-3.5.4-19.1mdv2007.0.i586.rpm
2dc30948c1fdce7e25d9b7a8a9379e51
2007.0/i586/kdelibs-devel-doc-3.5.4-19.1mdv2007.0.i586.rpm
7c637c18db5254991e86662b4d0a3dbd
2007.0/i586/libkdecore4-3.5.4-19.1mdv2007.0.i586.rpm
2990a2078b4971d5b3fff5a8282834aa
2007.0/i586/libkdecore4-devel-3.5.4-19.1mdv2007.0.i586.rpm
de92b184fd62a8aa54278c0a7aeb5f43
2007.0/SRPMS/kdelibs-3.5.4-19.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
e067573bb458b0606e19c8950fedb860
2007.0/x86_64/kdelibs-common-3.5.4-19.1mdv2007.0.x86_64.rpm
5143af28520ea05d50bc07a92523bf5a
2007.0/x86_64/kdelibs-devel-doc-3.5.4-19.1mdv2007.0.x86_64.rpm
452cd5fe9b000d31911cc8b19dbed9ca
2007.0/x86_64/lib64kdecore4-3.5.4-19.1mdv2007.0.x86_64.rpm
22e66d820ad6e94c332df514e756b06c
2007.0/x86_64/lib64kdecore4-devel-3.5.4-19.1mdv2007.0.x86_64.rpm

de92b184fd62a8aa54278c0a7aeb5f43
2007.0/SRPMS/kdelibs-3.5.4-19.1mdv2007.0.src.rpm

Corporate 3.0:
692f918e3e7acbe933684d973261ca0c
corporate/3.0/i586/kdelibs-common-3.2-36.16.C30mdk.i586.rpm
8537e316e30762eb2420e0c2412ffaf8
corporate/3.0/i586/libkdecore4-3.2-36.16.C30mdk.i586.rpm
37d09cd7b937ac25e98b87fe4161bfe1
corporate/3.0/i586/libkdecore4-devel-3.2-36.16.C30mdk.i586.rpm
815b64f8f6d1309414fa128ff049fa8a
corporate/3.0/SRPMS/kdelibs-3.2-36.16.C30mdk.src.rpm

Corporate 3.0/X86_64:
80f41ba7cab5c29812574b255487ff75
corporate/3.0/x86_64/kdelibs-common-3.2-36.16.C30mdk.x86_64.rpm
690b32020e45a8f1e1d7cff8dc3d342b
corporate/3.0/x86_64/lib64kdecore4-3.2-36.16.C30mdk.x86_64.rpm
39f37ea645b542dfd872b015d7b2db53
corporate/3.0/x86_64/lib64kdecore4-devel-3.2-36.16.C30mdk.x86_64.rpm

8537e316e30762eb2420e0c2412ffaf8
corporate/3.0/x86_64/libkdecore4-3.2-36.16.C30mdk.i586.rpm
815b64f8f6d1309414fa128ff049fa8a
corporate/3.0/SRPMS/kdelibs-3.2-36.16.C30mdk.src.rpm

Corporate 4.0:
3561f4ec95d79ede9284cb1ff897681b
corporate/4.0/i586/kdelibs-arts-3.5.4-1.2.20060mlcs4.i586.rpm
3e19560491f720fd9034a95dfb4f529d
corporate/4.0/i586/kdelibs-common-3.5.4-1.2.20060mlcs4.i586.rpm
633e83e144a3a0daa1057ecae48a0991
corporate/4.0/i586/kdelibs-devel-doc-3.5.4-1.2.20060mlcs4.i586.rpm

853c0d7af1b8515c9226eb3ff1ae0e52
corporate/4.0/i586/libkdecore4-3.5.4-1.2.20060mlcs4.i586.rpm
ffe121c5ed1528769d981a5b5d526b81
corporate/4.0/i586/libkdecore4-devel-3.5.4-1.2.20060mlcs4.i586.rpm

52f9f74e64bf4da50df95c02d350fa11
corporate/4.0/SRPMS/kdelibs-3.5.4-1.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
6ad107993dc8ba3726eb47bb087393e4
corporate/4.0/x86_64/kdelibs-arts-3.5.4-1.2.20060mlcs4.x86_64.rpm

4be667bf1d745fedc81314d697e3320a
corporate/4.0/x86_64/kdelibs-common-3.5.4-1.2.20060mlcs4.x86_64.rpm

a1480b53dcf74c2af2c044c0da4b45d7
corporate/4.0/x86_64/kdelibs-devel-doc-3.5.4-1.2.20060mlcs4.x86_64.rpm

e40a8bb434849c3976ba57f1e52ba78e
corporate/4.0/x86_64/lib64kdecore4-3.5.4-1.2.20060mlcs4.x86_64.rpm

4e488a23bad70524ef7d731b834cbe50
corporate/4.0/x86_64/lib64kdecore4-devel-3.5.4-1.2.20060mlcs4.x86_64.rpm

52f9f74e64bf4da50df95c02d350fa11
corporate/4.0/SRPMS/kdelibs-3.5.4-1.2.20060mlcs4.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>

Red Hat Linux


Red Hat Security Advisory

Synopsis: Important: kernel security update
Advisory ID: RHSA-2006:0710-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0710.html

Issue date: 2006-10-19
Updated on: 2006-10-19
Product: Red Hat Enterprise Linux
Keywords: taroon kernel security errata
Obsoletes: RHSA-2006:0437
CVE Names: CVE-2006-1864 CVE-2006-2071 CVE-2006-2935 CVE-2006-4342
CVE-2006-4997 CVE-2006-5174


1. Summary:

Updated kernel packages that fix several security issues in the
Red Hat Enterprise Linux 3 kernel are now available.

This security advisory has been rated as having important
security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Desktop version 3 – i386, x86_64
Red Hat Enterprise Linux ES version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 – i386, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating
system.

These new kernel packages contain fixes for the security issues
described below:

  • a flaw in the IPC shared-memory implementation that allowed a
    local user to cause a denial of service (deadlock) that resulted in
    freezing the system (CVE-2006-4342, Important)
  • an information leak in the copy_from_user() implementation on
    s390 and s390x platforms that allowed a local user to read
    arbitrary kernel memory (CVE-2006-5174, Important)
  • a flaw in the ATM subsystem affecting systems with installed
    ATM hardware and configured ATM support that allowed a remote user
    to cause a denial of service (panic) by accessing socket buffer
    memory after it has been freed (CVE-2006-4997, Moderate)
  • a directory traversal vulnerability in smbfs that allowed a
    local user to escape chroot restrictions for an SMB-mounted
    filesystem via “..” sequences (CVE-2006-1864, Moderate)
  • a flaw in the mprotect system call that allowed enabling write
    permission for a read-only attachment of shared memory
    (CVE-2006-2071, Moderate)
  • a flaw in the DVD handling of the CDROM driver that could be
    used together with a custom built USB device to gain root
    privileges (CVE-2006-2935, Moderate)

In addition to the security issues described above, a bug fix
for a clock skew problem (which could lead to unintended keyboard
repeat under X11) was also included. The problem only occurred when
running the 32-bit x86 kernel on 64-bit dual-core x86_64
hardware.

Note: The kernel-unsupported package contains various drivers
and modules that are unsupported and therefore might contain
security problems that have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade
their kernels to the packages associated with their machine
architecture and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:

up2date

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

169428 – repetitive keystroke issue on both RH3 U5 32bit and RH4
U1 32bit.
189436 – CVE-2006-1864 smbfs chroot issue
190074 – CVE-2006-2071 mprotect gives write permission to a
readonly attachment
197672 – CVE-2006-2935 Possible buffer overflow in DVD handling
205618 – CVE-2006-4342 shmat hangs by simultaneous
shmctl(IPC_RMID)
206270 – CVE-2006-4997 IP over ATM clip_mkip dereference freed
pointer
209436 – CVE-2006-5174 copy_from_user information leak on s390

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm

fe57bb5ba14c1f2410b158ed5900f8af
kernel-2.4.21-47.0.1.EL.src.rpm

i386:
0f313988a3b5ee1c13eef6ac33f90366
kernel-2.4.21-47.0.1.EL.athlon.rpm
69feb474be6b1bee161180ccc07891b6

kernel-2.4.21-47.0.1.EL.i686.rpm
cfeeab04ef806f0f067975b6d652053f
kernel-BOOT-2.4.21-47.0.1.EL.i386.rpm
0b580ecfd116199f4dd8c92111e7af2d

kernel-debuginfo-2.4.21-47.0.1.EL.athlon.rpm
584ac1201581a453f48da2d6bcb78e7c
kernel-debuginfo-2.4.21-47.0.1.EL.i386.rpm
d72dca6f97c717b4ce0e7698016fcad4

kernel-debuginfo-2.4.21-47.0.1.EL.i686.rpm
6792b74295d0ece09cd1c108c9d8f23e
kernel-doc-2.4.21-47.0.1.EL.i386.rpm
4ec2c0fa1fbf3017bdaf36c6ae8f75a3

kernel-hugemem-2.4.21-47.0.1.EL.i686.rpm
3617b38352971c71c64d5560db52b3ad
kernel-hugemem-unsupported-2.4.21-47.0.1.EL.i686.rpm
51ae45ba954b3ff40f4f162c369fefbe

kernel-smp-2.4.21-47.0.1.EL.athlon.rpm
e4cf369455f6ae40d67e29711bee6519
kernel-smp-2.4.21-47.0.1.EL.i686.rpm
91abcffc492b21a8953a2745ddbed3e2

kernel-smp-unsupported-2.4.21-47.0.1.EL.athlon.rpm
40510c2d3066d9b789ec669be6d70dfb
kernel-smp-unsupported-2.4.21-47.0.1.EL.i686.rpm
cef35a37a7bc657f5e6989fa5e1b5d47

kernel-source-2.4.21-47.0.1.EL.i386.rpm
b0c04546c3d59e4d6646123d41ecdc35
kernel-unsupported-2.4.21-47.0.1.EL.athlon.rpm
49b1c869f5e57f0e4996d65f2af6abba

kernel-unsupported-2.4.21-47.0.1.EL.i686.rpm

ia64:
47f0a4f327831bc6410334a6a4455e21
kernel-2.4.21-47.0.1.EL.ia64.rpm
0d06dd40f1920fc487a9f85e57de6234

kernel-debuginfo-2.4.21-47.0.1.EL.ia64.rpm
5c292c4491643ee45a1b97dcdbdd2847
kernel-doc-2.4.21-47.0.1.EL.ia64.rpm
bec034502e425f71d4283caffbce0b1b

kernel-source-2.4.21-47.0.1.EL.ia64.rpm
1ba8b8f6b004e84ff7c14cdd240fa4bc
kernel-unsupported-2.4.21-47.0.1.EL.ia64.rpm

ppc:
2f96672418b277c5e3a58dff0d68b029
kernel-2.4.21-47.0.1.EL.ppc64iseries.rpm
e85ec012314131b50d8fe46c682d358f

kernel-2.4.21-47.0.1.EL.ppc64pseries.rpm
fbbfbb2d1a2527058dfae7b75f553c1c
kernel-debuginfo-2.4.21-47.0.1.EL.ppc64.rpm
069b9d978dcf771836d6a779b0a1fe70

kernel-debuginfo-2.4.21-47.0.1.EL.ppc64iseries.rpm
b10dd5d39b92aa8a88e57f24c6f024af
kernel-debuginfo-2.4.21-47.0.1.EL.ppc64pseries.rpm
2698e18f678563138bef3261dea9759f

kernel-doc-2.4.21-47.0.1.EL.ppc64.rpm
9eab3900eb6956ae11be1ed1548d3153
kernel-source-2.4.21-47.0.1.EL.ppc64.rpm
157ccc0bdf87ed876355e55e94e3d43b

kernel-unsupported-2.4.21-47.0.1.EL.ppc64iseries.rpm
782224ea0019ca9cef8a21540f5227d7
kernel-unsupported-2.4.21-47.0.1.EL.ppc64pseries.rpm

s390:
80aad86ed64d189d9ba16d2ec37c61d1
kernel-2.4.21-47.0.1.EL.s390.rpm
a256d51fa8ed3d633638717d86973351

kernel-debuginfo-2.4.21-47.0.1.EL.s390.rpm
0981d57893d93eb7c47dd52c4e5695b6
kernel-doc-2.4.21-47.0.1.EL.s390.rpm
d2d86901a3bb6ec15a5b52cdfefcb697

kernel-source-2.4.21-47.0.1.EL.s390.rpm
e0c0c89de07cf2e0958247eea2d7a6ec
kernel-unsupported-2.4.21-47.0.1.EL.s390.rpm

s390x:
3b4e35b36335ff8464bd355c3e215c62
kernel-2.4.21-47.0.1.EL.s390x.rpm
98256fe095ed60fac7acb95786f2f825

kernel-debuginfo-2.4.21-47.0.1.EL.s390x.rpm
46853dab961b6f0259847c313bc2c74c
kernel-doc-2.4.21-47.0.1.EL.s390x.rpm
f88b41322834d7de02030a79607748e8

kernel-source-2.4.21-47.0.1.EL.s390x.rpm
adfcb3d2981bf71d5684828d5c4bcdbe
kernel-unsupported-2.4.21-47.0.1.EL.s390x.rpm

x86_64:
ff59e82c378d27a85273dfe2c2ecf198
kernel-2.4.21-47.0.1.EL.ia32e.rpm
3eac97481cabbf31b26b658d77ef3145

kernel-2.4.21-47.0.1.EL.x86_64.rpm
a7238213f3d21fedc7119cda744b5840
kernel-debuginfo-2.4.21-47.0.1.EL.ia32e.rpm
383b6deb766f4193d01f227486ff73bc

kernel-debuginfo-2.4.21-47.0.1.EL.x86_64.rpm
66af96af71704aaaa39ad359dd641cd2
kernel-doc-2.4.21-47.0.1.EL.x86_64.rpm
95823cfe05beddc2de47ea0ddb87f2aa

kernel-smp-2.4.21-47.0.1.EL.x86_64.rpm
502f7c42a96d3b40c09f4e708a326ca4
kernel-smp-unsupported-2.4.21-47.0.1.EL.x86_64.rpm
f76a70595a8cbbff038fdc83e8eb818a

kernel-source-2.4.21-47.0.1.EL.x86_64.rpm
8e2e4813caec5884256374c62f823f7d
kernel-unsupported-2.4.21-47.0.1.EL.ia32e.rpm
d0b7dda546e145208f4193b0e0d901bb

kernel-unsupported-2.4.21-47.0.1.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm

fe57bb5ba14c1f2410b158ed5900f8af
kernel-2.4.21-47.0.1.EL.src.rpm

i386:
0f313988a3b5ee1c13eef6ac33f90366
kernel-2.4.21-47.0.1.EL.athlon.rpm
69feb474be6b1bee161180ccc07891b6

kernel-2.4.21-47.0.1.EL.i686.rpm
cfeeab04ef806f0f067975b6d652053f
kernel-BOOT-2.4.21-47.0.1.EL.i386.rpm
0b580ecfd116199f4dd8c92111e7af2d

kernel-debuginfo-2.4.21-47.0.1.EL.athlon.rpm
584ac1201581a453f48da2d6bcb78e7c
kernel-debuginfo-2.4.21-47.0.1.EL.i386.rpm
d72dca6f97c717b4ce0e7698016fcad4

kernel-debuginfo-2.4.21-47.0.1.EL.i686.rpm
6792b74295d0ece09cd1c108c9d8f23e
kernel-doc-2.4.21-47.0.1.EL.i386.rpm
4ec2c0fa1fbf3017bdaf36c6ae8f75a3

kernel-hugemem-2.4.21-47.0.1.EL.i686.rpm
3617b38352971c71c64d5560db52b3ad
kernel-hugemem-unsupported-2.4.21-47.0.1.EL.i686.rpm
51ae45ba954b3ff40f4f162c369fefbe

kernel-smp-2.4.21-47.0.1.EL.athlon.rpm
e4cf369455f6ae40d67e29711bee6519
kernel-smp-2.4.21-47.0.1.EL.i686.rpm
91abcffc492b21a8953a2745ddbed3e2

kernel-smp-unsupported-2.4.21-47.0.1.EL.athlon.rpm
40510c2d3066d9b789ec669be6d70dfb
kernel-smp-unsupported-2.4.21-47.0.1.EL.i686.rpm
cef35a37a7bc657f5e6989fa5e1b5d47

kernel-source-2.4.21-47.0.1.EL.i386.rpm
b0c04546c3d59e4d6646123d41ecdc35
kernel-unsupported-2.4.21-47.0.1.EL.athlon.rpm
49b1c869f5e57f0e4996d65f2af6abba

kernel-unsupported-2.4.21-47.0.1.EL.i686.rpm

x86_64:
ff59e82c378d27a85273dfe2c2ecf198
kernel-2.4.21-47.0.1.EL.ia32e.rpm
3eac97481cabbf31b26b658d77ef3145

kernel-2.4.21-47.0.1.EL.x86_64.rpm
a7238213f3d21fedc7119cda744b5840
kernel-debuginfo-2.4.21-47.0.1.EL.ia32e.rpm
383b6deb766f4193d01f227486ff73bc

kernel-debuginfo-2.4.21-47.0.1.EL.x86_64.rpm
66af96af71704aaaa39ad359dd641cd2
kernel-doc-2.4.21-47.0.1.EL.x86_64.rpm
95823cfe05beddc2de47ea0ddb87f2aa

kernel-smp-2.4.21-47.0.1.EL.x86_64.rpm
502f7c42a96d3b40c09f4e708a326ca4
kernel-smp-unsupported-2.4.21-47.0.1.EL.x86_64.rpm
f76a70595a8cbbff038fdc83e8eb818a

kernel-source-2.4.21-47.0.1.EL.x86_64.rpm
8e2e4813caec5884256374c62f823f7d
kernel-unsupported-2.4.21-47.0.1.EL.ia32e.rpm
d0b7dda546e145208f4193b0e0d901bb

kernel-unsupported-2.4.21-47.0.1.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm

fe57bb5ba14c1f2410b158ed5900f8af
kernel-2.4.21-47.0.1.EL.src.rpm

i386:
0f313988a3b5ee1c13eef6ac33f90366
kernel-2.4.21-47.0.1.EL.athlon.rpm
69feb474be6b1bee161180ccc07891b6

kernel-2.4.21-47.0.1.EL.i686.rpm
cfeeab04ef806f0f067975b6d652053f
kernel-BOOT-2.4.21-47.0.1.EL.i386.rpm
0b580ecfd116199f4dd8c92111e7af2d

kernel-debuginfo-2.4.21-47.0.1.EL.athlon.rpm
584ac1201581a453f48da2d6bcb78e7c
kernel-debuginfo-2.4.21-47.0.1.EL.i386.rpm
d72dca6f97c717b4ce0e7698016fcad4

kernel-debuginfo-2.4.21-47.0.1.EL.i686.rpm
6792b74295d0ece09cd1c108c9d8f23e
kernel-doc-2.4.21-47.0.1.EL.i386.rpm
4ec2c0fa1fbf3017bdaf36c6ae8f75a3

kernel-hugemem-2.4.21-47.0.1.EL.i686.rpm
3617b38352971c71c64d5560db52b3ad
kernel-hugemem-unsupported-2.4.21-47.0.1.EL.i686.rpm
51ae45ba954b3ff40f4f162c369fefbe

kernel-smp-2.4.21-47.0.1.EL.athlon.rpm
e4cf369455f6ae40d67e29711bee6519
kernel-smp-2.4.21-47.0.1.EL.i686.rpm
91abcffc492b21a8953a2745ddbed3e2

kernel-smp-unsupported-2.4.21-47.0.1.EL.athlon.rpm
40510c2d3066d9b789ec669be6d70dfb
kernel-smp-unsupported-2.4.21-47.0.1.EL.i686.rpm
cef35a37a7bc657f5e6989fa5e1b5d47

kernel-source-2.4.21-47.0.1.EL.i386.rpm
b0c04546c3d59e4d6646123d41ecdc35
kernel-unsupported-2.4.21-47.0.1.EL.athlon.rpm
49b1c869f5e57f0e4996d65f2af6abba

kernel-unsupported-2.4.21-47.0.1.EL.i686.rpm

ia64:
47f0a4f327831bc6410334a6a4455e21
kernel-2.4.21-47.0.1.EL.ia64.rpm
0d06dd40f1920fc487a9f85e57de6234

kernel-debuginfo-2.4.21-47.0.1.EL.ia64.rpm
5c292c4491643ee45a1b97dcdbdd2847
kernel-doc-2.4.21-47.0.1.EL.ia64.rpm
bec034502e425f71d4283caffbce0b1b

kernel-source-2.4.21-47.0.1.EL.ia64.rpm
1ba8b8f6b004e84ff7c14cdd240fa4bc
kernel-unsupported-2.4.21-47.0.1.EL.ia64.rpm

x86_64:
ff59e82c378d27a85273dfe2c2ecf198
kernel-2.4.21-47.0.1.EL.ia32e.rpm
3eac97481cabbf31b26b658d77ef3145

kernel-2.4.21-47.0.1.EL.x86_64.rpm
a7238213f3d21fedc7119cda744b5840
kernel-debuginfo-2.4.21-47.0.1.EL.ia32e.rpm
383b6deb766f4193d01f227486ff73bc

kernel-debuginfo-2.4.21-47.0.1.EL.x86_64.rpm
66af96af71704aaaa39ad359dd641cd2
kernel-doc-2.4.21-47.0.1.EL.x86_64.rpm
95823cfe05beddc2de47ea0ddb87f2aa

kernel-smp-2.4.21-47.0.1.EL.x86_64.rpm
502f7c42a96d3b40c09f4e708a326ca4
kernel-smp-unsupported-2.4.21-47.0.1.EL.x86_64.rpm
f76a70595a8cbbff038fdc83e8eb818a

kernel-source-2.4.21-47.0.1.EL.x86_64.rpm
8e2e4813caec5884256374c62f823f7d
kernel-unsupported-2.4.21-47.0.1.EL.ia32e.rpm
d0b7dda546e145208f4193b0e0d901bb

kernel-unsupported-2.4.21-47.0.1.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm

fe57bb5ba14c1f2410b158ed5900f8af
kernel-2.4.21-47.0.1.EL.src.rpm

i386:
0f313988a3b5ee1c13eef6ac33f90366
kernel-2.4.21-47.0.1.EL.athlon.rpm
69feb474be6b1bee161180ccc07891b6

kernel-2.4.21-47.0.1.EL.i686.rpm
cfeeab04ef806f0f067975b6d652053f
kernel-BOOT-2.4.21-47.0.1.EL.i386.rpm
0b580ecfd116199f4dd8c92111e7af2d

kernel-debuginfo-2.4.21-47.0.1.EL.athlon.rpm
584ac1201581a453f48da2d6bcb78e7c
kernel-debuginfo-2.4.21-47.0.1.EL.i386.rpm
d72dca6f97c717b4ce0e7698016fcad4

kernel-debuginfo-2.4.21-47.0.1.EL.i686.rpm
6792b74295d0ece09cd1c108c9d8f23e
kernel-doc-2.4.21-47.0.1.EL.i386.rpm
4ec2c0fa1fbf3017bdaf36c6ae8f75a3

kernel-hugemem-2.4.21-47.0.1.EL.i686.rpm
3617b38352971c71c64d5560db52b3ad
kernel-hugemem-unsupported-2.4.21-47.0.1.EL.i686.rpm
51ae45ba954b3ff40f4f162c369fefbe

kernel-smp-2.4.21-47.0.1.EL.athlon.rpm
e4cf369455f6ae40d67e29711bee6519
kernel-smp-2.4.21-47.0.1.EL.i686.rpm
91abcffc492b21a8953a2745ddbed3e2

kernel-smp-unsupported-2.4.21-47.0.1.EL.athlon.rpm
40510c2d3066d9b789ec669be6d70dfb
kernel-smp-unsupported-2.4.21-47.0.1.EL.i686.rpm
cef35a37a7bc657f5e6989fa5e1b5d47

kernel-source-2.4.21-47.0.1.EL.i386.rpm
b0c04546c3d59e4d6646123d41ecdc35
kernel-unsupported-2.4.21-47.0.1.EL.athlon.rpm
49b1c869f5e57f0e4996d65f2af6abba

kernel-unsupported-2.4.21-47.0.1.EL.i686.rpm

ia64:
47f0a4f327831bc6410334a6a4455e21
kernel-2.4.21-47.0.1.EL.ia64.rpm
0d06dd40f1920fc487a9f85e57de6234

kernel-debuginfo-2.4.21-47.0.1.EL.ia64.rpm
5c292c4491643ee45a1b97dcdbdd2847
kernel-doc-2.4.21-47.0.1.EL.ia64.rpm
bec034502e425f71d4283caffbce0b1b

kernel-source-2.4.21-47.0.1.EL.ia64.rpm
1ba8b8f6b004e84ff7c14cdd240fa4bc
kernel-unsupported-2.4.21-47.0.1.EL.ia64.rpm

x86_64:
ff59e82c378d27a85273dfe2c2ecf198
kernel-2.4.21-47.0.1.EL.ia32e.rpm
3eac97481cabbf31b26b658d77ef3145

kernel-2.4.21-47.0.1.EL.x86_64.rpm
a7238213f3d21fedc7119cda744b5840
kernel-debuginfo-2.4.21-47.0.1.EL.ia32e.rpm
383b6deb766f4193d01f227486ff73bc

kernel-debuginfo-2.4.21-47.0.1.EL.x86_64.rpm
66af96af71704aaaa39ad359dd641cd2
kernel-doc-2.4.21-47.0.1.EL.x86_64.rpm
95823cfe05beddc2de47ea0ddb87f2aa

kernel-smp-2.4.21-47.0.1.EL.x86_64.rpm
502f7c42a96d3b40c09f4e708a326ca4
kernel-smp-unsupported-2.4.21-47.0.1.EL.x86_64.rpm
f76a70595a8cbbff038fdc83e8eb818a

kernel-source-2.4.21-47.0.1.EL.x86_64.rpm
8e2e4813caec5884256374c62f823f7d
kernel-unsupported-2.4.21-47.0.1.EL.ia32e.rpm
d0b7dda546e145208f4193b0e0d901bb

kernel-unsupported-2.4.21-47.0.1.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key
and details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2071

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4342

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4997

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5174

http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More
contact details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.

rPath Linux

rPath Security Advisory: 2006-0195-1
Published: 2006-10-18
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
      Indirect User Deterministic
Unauthorized Access
Updated Versions:
      kdelibs=/conary.rpath.com@rpl:devel//1/3.4.2-5.12-1

References:

      http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811

      https://issues.rpath.com/browse/RPL-723

Description:

      Previous versions of the KDE
khtml library use Qt in a way that
      allows unchecked pixmap image
input to be provided to Qt, triggering
      an integer overflow flaw in Qt.
This enables a user-complicit denial
      of service attack (application
crash), or possibly unauthorized access
      via arbitrary code
execution.

Trustix Secure Linux


Trustix Secure Linux Security Advisory #2006-0057

Package names: clamav, kernel, php, php4, python, xorg-x11
Summary: Multiple vulnerabilities
Date: 2006-10-18
Affected versions: Trustix Secure Linux 2.2 Trustix Secure Linux
3.0 Trustix Operating System – Enterprise Server 2


Package description:
clamav
Clam AntiVirus is a GPL anti-virus toolkit for UNIX. The main
purpose of this software is the integration with mail servers
(attachment scanning). The package provides a flexible and scalable
multi-threaded daemon, a command line scanner, and a tool for
automatic updating via Internet. The programs are based on a shared
library distributed with package, which you can use with your own
software. Most importantly, the virus database is kept up to date .

kernel
The kernel package contains the Linux kernel (vmlinuz), the core of
your Trustix Secure Linux operating system. The kernel handles the
basic functions of the operating system: memory allocation, process
allocation, device input and output, etc.

php
PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated web pages. PHP
also offers built-in database integration for several commercial
and non-commercial database management systems, so writing a
database-enabled

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis