BLAG

BLAG Forums
It is currently Mon Dec 22, 2014 7:10 am

All times are UTC




Post new topic Reply to topic  [ 2 posts ] 
Author Message
 Post subject: Update lha for 10k & 20k
PostPosted: Wed Sep 08, 2004 11:03 pm 
Offline
Site Admin

Joined: Sun Mar 14, 2004 3:17 pm
Posts: 4492
Location: Loveland, Colorado, USA
---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-294
2004-09-08
---------------------------------------------------------------------

Product : Fedora Core 1
Name : lha
Version : 1.14i
Release : 12.2
Summary : An archiving and compression utility for LHarc format
archives.
Description :
LHA is an archiving and compression utility for LHarc format archives.
LHA is mostly used in the DOS world, but can be used under Linux to
extract DOS files from LHA archives.

Install the lha package if you need to extract DOS files from LHA archives.

---------------------------------------------------------------------
Update Information:

Lukasz Wojtow discovered a stack-based buffer overflow in all versions
of lha up to and including version 1.14. A carefully created archive could
allow an attacker to execute arbitrary code when a victim extracts or tests
the archive. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0769 to this issue.

Buffer overflows were discovered in the command line processing of all
versions of lha up to and including version 1.14. If a malicious user can
trick a victim into passing a specially crafted command line to the lha
command, it is possible that arbitrary code could be executed. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
names CAN-2004-0771 and CAN-2004-0694 to these issues.

Thomas Biege discovered a shell meta character command execution
vulnerability in all versions of lha up to and including 1.14. An attacker
could create a directory with shell meta characters in its name which could
lead to arbitrary command execution. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0745 to
this issue.

Users of lha should update to this updated package
---------------------------------------------------------------------
* Tue Sep 07 2004 Than Ngo <than@redhat.com> 1.14i-12.2

- security vulnerabilities CAN-2004-0769, CAN-2004-0771, CAN-2004-0694,
CAN-2004-0745


---------------------------------------------------------------------
This update can be downloaded from:
http://download.fedora.redhat.com/pub/f ... updates/1/

4c8e03b8489c398e6f01c9c26e76a956 SRPMS/lha-1.14i-12.2.src.rpm
170bcabffe4609754eac38e4cab8b592 x86_64/lha-1.14i-12.2.x86_64.rpm
571754fe612bce9f0119dec63049dbca
x86_64/debug/lha-debuginfo-1.14i-12.2.x86_64.rpm
6b0f4909ea0753a01a2e29319348240d i386/lha-1.14i-12.2.i386.rpm
db44f0f1eeb45ebbbd0f39e079593879
i386/debug/lha-debuginfo-1.14i-12.2.i386.rpm


---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-295
2004-09-08
---------------------------------------------------------------------

Product : Fedora Core 2
Name : lha
Version : 1.14i
Release : 14.1
Summary : An archiving and compression utility for LHarc format
archives.
Description :
LHA is an archiving and compression utility for LHarc format archives.
LHA is mostly used in the DOS world, but can be used under Linux to
extract DOS files from LHA archives.

Install the lha package if you need to extract DOS files from LHA archives.

---------------------------------------------------------------------
Update Information:

Lukasz Wojtow discovered a stack-based buffer overflow in all versions
of lha up to and including version 1.14. A carefully created archive could
allow an attacker to execute arbitrary code when a victim extracts or tests
the archive. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0769 to this issue.

Buffer overflows were discovered in the command line processing of all
versions of lha up to and including version 1.14. If a malicious user can
trick a victim into passing a specially crafted command line to the lha
command, it is possible that arbitrary code could be executed. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
names CAN-2004-0771 and CAN-2004-0694 to these issues.

Thomas Biege discovered a shell meta character command execution
vulnerability in all versions of lha up to and including 1.14. An attacker
could create a directory with shell meta characters in its name which could
lead to arbitrary command execution. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0745 to
this issue.

Users of lha should update to this updated package
---------------------------------------------------------------------
* Tue Sep 07 2004 Than Ngo <than@redhat.com> 1.14i-14.1

- security vulnerabilities CAN-2004-0769, CAN-2004-0771, CAN-2004-0694,
CAN-2004-0745


---------------------------------------------------------------------
This update can be downloaded from:
http://download.fedora.redhat.com/pub/f ... updates/2/

bccb95c64b01e506961bdacb3323031b SRPMS/lha-1.14i-14.1.src.rpm
af515d31f9ff998a88383d0651efff68 x86_64/lha-1.14i-14.1.x86_64.rpm
8641060ad39c6bbe14e68014fbe06ce2
x86_64/debug/lha-debuginfo-1.14i-14.1.x86_64.rpm
494c07eccce7cd3f5a040d8fb384eb8b i386/lha-1.14i-14.1.i386.rpm
a8d018efd6c9fe0b8db6f96327557182
i386/debug/lha-debuginfo-1.14i-14.1.i386.rpm


Top
 Profile  
 
PostPosted: Wed Sep 08, 2004 11:04 pm 
Offline
Site Admin

Joined: Sun Mar 14, 2004 3:17 pm
Posts: 4492
Location: Loveland, Colorado, USA
For those of you running KDE...

---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-291
2004-09-08
---------------------------------------------------------------------

Product : Fedora Core 2
Name : kdelibs
Version : 3.2.2
Release : 8.FC2
Summary : K Desktop Environment - Libraries
Description :
Libraries for the K Desktop Environment:
KDE Libraries included: kdecore (KDE core library), kdeui (user interface),
kfm (file manager), khtmlw (HTML widget), kio (Input/Output, networking),
kspell (spelling checker), jscript (javascript), kab (addressbook),
kimgio (image manipulation).

---------------------------------------------------------------------
Update Information:

Andrew Tuitt reported that versions of KDE up to and including 3.2.3 create
temporary directories with predictable names. A local attacker could
prevent KDE applications from functioning correctly, or overwrite files
owned by other users by creating malicious symlinks. The Common
Vulnerabilities and Exposures project has assigned the name CAN-2004-0689
to this issue.

WESTPOINT internet reconnaissance services has discovered that the KDE web
browser Konqueror allows websites to set cookies for certain country
specific secondary top level domains. An attacker within one of the
affected domains could construct a cookie which would be sent to all other
websites within the domain leading to a session fixation attack. This
issue does not affect popular domains such as .co.uk, .co.in, or .com. The
Common Vulnerabilities and Exposures project has assigned the name
CAN-2004-0721 to this issue.

A frame injection spoofing vulnerability has been discovered in the
Konqueror web browser. This issue could allow a malicious website to show
arbitrary content in a named frame of a different browser window. The
Common Vulnerabilities and Exposures project has assigned the name
CAN-2004-0746 to this issue.

All users of KDE are advised to upgrade to these packages,
which contain backported patches from the KDE team for these issues.
---------------------------------------------------------------------
* Wed Sep 01 2004 Than Ngo <than@redhat.com> 6:3.2.2-8.FC2

- Konqueror Frame Injection Vulnerability CAN-2004-0721
- Konqueror Cross-Domain Cookie Injection CAN-2004-0746

* Wed Jul 28 2004 Than Ngo <than@redhat.com> 6:3.2.2-7

- DCOPServer Temporary Filename Vulnerability, CAN-2004-0690
- temporary directory vulnerability, CAN-2004-0689


---------------------------------------------------------------------
This update can be downloaded from:
http://download.fedora.redhat.com/pub/f ... updates/2/

1f58d8b1b9a5598e249f9cca9dfd989d SRPMS/kdelibs-3.2.2-8.FC2.src.rpm
b5106d0e1e28796c79df11a798d1e1bb x86_64/kdelibs-3.2.2-8.FC2.x86_64.rpm
9460641c334c4e448cd94f20dfda49fd
x86_64/kdelibs-devel-3.2.2-8.FC2.x86_64.rpm
82353b5f48c540655dbec591ff6afa28
x86_64/debug/kdelibs-debuginfo-3.2.2-8.FC2.x86_64.rpm
bbe4cd8f2842be7209f7821d8548926a i386/kdelibs-3.2.2-8.FC2.i386.rpm
9d25c78e9ae1e911411c47f8f4aaae2f i386/kdelibs-devel-3.2.2-8.FC2.i386.rpm
3cb3189b5c72aa10fef2bfb99b2059d2
i386/debug/kdelibs-debuginfo-3.2.2-8.FC2.i386.rpm

---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-290
2004-09-08
---------------------------------------------------------------------

Product : Fedora Core 1
Name : kdelibs
Version : 3.1.4
Release : 7
Summary : K Desktop Environment - Libraries
Description :
Libraries for the K Desktop Environment:
KDE Libraries included: kdecore (KDE core library), kdeui (user interface),
kfm (file manager), khtmlw (HTML widget), kio (Input/Output, networking),
kspell (spelling checker), jscript (javascript), kab (addressbook),
kimgio (image manipulation).

---------------------------------------------------------------------
Update Information:

Andrew Tuitt reported that versions of KDE up to and including 3.2.3 create
temporary directories with predictable names. A local attacker could
prevent KDE applications from functioning correctly, or overwrite files
owned by other users by creating malicious symlinks. The Common
Vulnerabilities and Exposures project has assigned the name CAN-2004-0689
to this issue.

WESTPOINT internet reconnaissance services has discovered that the KDE web
browser Konqueror allows websites to set cookies for certain country
specific secondary top level domains. An attacker within one of the
affected domains could construct a cookie which would be sent to all other
websites within the domain leading to a session fixation attack. This
issue does not affect popular domains such as .co.uk, .co.in, or .com. The
Common Vulnerabilities and Exposures project has assigned the name
CAN-2004-0721 to this issue.

A frame injection spoofing vulnerability has been discovered in the
Konqueror web browser. This issue could allow a malicious website to show
arbitrary content in a named frame of a different browser window. The
Common Vulnerabilities and Exposures project has assigned the name
CAN-2004-0746 to this issue.

All users of KDE are advised to upgrade to these erratum packages,
which contain backported patches from the KDE team for these issues.

---------------------------------------------------------------------
* Wed Sep 01 2004 Than Ngo <than@redhat.com> 6:3.1.4-7

- Konqueror Frame Injection Vulnerability CAN-2004-0721
- Konqueror Cross-Domain Cookie Injection CAN-2004-0746

* Wed Jul 28 2004 Than Ngo <than@redhat.com> 6:3.1.4-6

- temporary directory vulnerability, CAN-2004-0689


---------------------------------------------------------------------
This update can be downloaded from:
http://download.fedora.redhat.com/pub/f ... updates/1/

008938cbdcd2153b84d2dda1cbcbf887 SRPMS/kdelibs-3.1.4-7.src.rpm
eb7ea45f4d74c1445336bcef9761f02f x86_64/kdelibs-3.1.4-7.x86_64.rpm
09e622613f98b001d548815e0e8a8a1e x86_64/kdelibs-devel-3.1.4-7.x86_64.rpm
5b239bdfa7ccadb00fe6eca14b4c0593
x86_64/debug/kdelibs-debuginfo-3.1.4-7.x86_64.rpm
61cef6ddcc8a103f0aae6d7c8a31e224 i386/kdelibs-3.1.4-7.i386.rpm
987c650d14f71dc848cce75f8bf4dc3a i386/kdelibs-devel-3.1.4-7.i386.rpm
b2831db469e778da7a7d4073d6cb5517
i386/debug/kdelibs-debuginfo-3.1.4-7.i386.rpm


---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-292
2004-09-08
---------------------------------------------------------------------

Product : Fedora Core 1
Name : kdebase
Version : 3.1.4
Release : 7
Summary : K Desktop Environment - core files
Description :
Core applications for the K Desktop Environment. Included are: kdm
(replacement for xdm), kwin (window manager), konqueror (filemanager,
web browser, ftp client, ...), konsole (xterm replacement), kpanel
(application starter and desktop pager), kaudio (audio server),
kdehelp (viewer for kde help files, info and man pages), kthememgr
(system for managing alternate theme packages) plus other KDE
components (kcheckpass, kikbd, kscreensaver, kcontrol, kfind,
kfontmanager, kmenuedit).

---------------------------------------------------------------------
Update Information:

Andrew Tuitt reported that versions of KDE up to and including 3.2.3 create
temporary directories with predictable names. A local attacker could
prevent KDE applications from functioning correctly, or overwrite files
owned by other users by creating malicious symlinks. The Common
Vulnerabilities and Exposures project has assigned the name CAN-2004-0689
to this issue.

WESTPOINT internet reconnaissance services has discovered that the KDE web
browser Konqueror allows websites to set cookies for certain country
specific secondary top level domains. An attacker within one of the
affected domains could construct a cookie which would be sent to all other
websites within the domain leading to a session fixation attack. This
issue does not affect popular domains such as .co.uk, .co.in, or .com. The
Common Vulnerabilities and Exposures project has assigned the name
CAN-2004-0721 to this issue.

A frame injection spoofing vulnerability has been discovered in the
Konqueror web browser. This issue could allow a malicious website to show
arbitrary content in a named frame of a different browser window. The
Common Vulnerabilities and Exposures project has assigned the name
CAN-2004-0746 to this issue.

All users of KDE are advised to upgrade to these packages,
which contain backported patches from the KDE team for these issues.
---------------------------------------------------------------------
* Wed Sep 01 2004 Than Ngo <than@redhat.com> 6:3.1.4-7

- Konqueror Frame Injection Vulnerability, CAN-2004-0721


---------------------------------------------------------------------
This update can be downloaded from:
http://download.fedora.redhat.com/pub/f ... updates/1/

3004c6dd30bc64d3631acd3d2219814d SRPMS/kdebase-3.1.4-7.src.rpm
e91dc13e33256a43b283372e4c7d112c x86_64/kdebase-3.1.4-7.x86_64.rpm
21b010b35a8ed93dc8ab0c53a6e37f06 x86_64/kdebase-devel-3.1.4-7.x86_64.rpm
4c89d11b04180f76815b531a52d0d19c
x86_64/debug/kdebase-debuginfo-3.1.4-7.x86_64.rpm
d0ec97d874f9a5c9b380c6aee2fa5d64 i386/kdebase-3.1.4-7.i386.rpm
af1d70916ef1fc53b7dd2f999650374a i386/kdebase-devel-3.1.4-7.i386.rpm
df6a6e5af583325164291aaeaeca4269
i386/debug/kdebase-debuginfo-3.1.4-7.i386.rpm

---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-293
2004-09-08
---------------------------------------------------------------------

Product : Fedora Core 2
Name : kdebase
Version : 3.2.2
Release : 6.FC2
Summary : K Desktop Environment - core files
Description :
Core applications for the K Desktop Environment. Included are: kdm
(replacement for xdm), kwin (window manager), konqueror (filemanager,
web browser, ftp client, ...), konsole (xterm replacement), kpanel
(application starter and desktop pager), kaudio (audio server),
kdehelp (viewer for kde help files, info and man pages), kthememgr
(system for managing alternate theme packages) plus other KDE
components (kcheckpass, kikbd, kscreensaver, kcontrol, kfind,
kfontmanager, kmenuedit).

---------------------------------------------------------------------
Update Information:

Andrew Tuitt reported that versions of KDE up to and including 3.2.3 create
temporary directories with predictable names. A local attacker could
prevent KDE applications from functioning correctly, or overwrite files
owned by other users by creating malicious symlinks. The Common
Vulnerabilities and Exposures project has assigned the name CAN-2004-0689
to this issue.

WESTPOINT internet reconnaissance services has discovered that the KDE web
browser Konqueror allows websites to set cookies for certain country
specific secondary top level domains. An attacker within one of the
affected domains could construct a cookie which would be sent to all other
websites within the domain leading to a session fixation attack. This
issue does not affect popular domains such as .co.uk, .co.in, or .com. The
Common Vulnerabilities and Exposures project has assigned the name
CAN-2004-0721 to this issue.

A frame injection spoofing vulnerability has been discovered in the
Konqueror web browser. This issue could allow a malicious website to show
arbitrary content in a named frame of a different browser window. The
Common Vulnerabilities and Exposures project has assigned the name
CAN-2004-0746 to this issue.

All users of KDE are advised to upgrade to these packages,
which contain backported patches from the KDE team for these issues.
---------------------------------------------------------------------
* Mon Sep 06 2004 Than Ngo <than@redhat.com> 6:3.2.2-6.FC2

- fix a bug in keyboard layout with xorg.x11, bug #121950
- fix df problem on AFS

* Wed Sep 01 2004 Than Ngo <than@redhat.com> 6:3.2.2-5.FC2

- Konqueror Frame Injection Vulnerability, CAN-2004-0721


---------------------------------------------------------------------
This update can be downloaded from:
http://download.fedora.redhat.com/pub/f ... updates/2/

80f87d426b760776fc7fc03653ad30a6 SRPMS/kdebase-3.2.2-6.FC2.src.rpm
6bbf33f60b428bc3f2e0fac4fa09b64f x86_64/kdebase-3.2.2-6.FC2.x86_64.rpm
8eb7ca6d4dd1557114980885744ecdfd
x86_64/kdebase-devel-3.2.2-6.FC2.x86_64.rpm
4e9b9094fc7abd21083de2c17b9f51f0
x86_64/debug/kdebase-debuginfo-3.2.2-6.FC2.x86_64.rpm
a05b23c8202566417a5bc2d3a3a5cd88 i386/kdebase-3.2.2-6.FC2.i386.rpm
bc6d4263395d4af1a4b89503ff4a8e28 i386/kdebase-devel-3.2.2-6.FC2.i386.rpm
1835604099fdd8c8ed532f5c15709c0d
i386/debug/kdebase-debuginfo-3.2.2-6.FC2.i386.rpm


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 2 posts ] 

All times are UTC


Who is online

Users browsing this forum: No registered users and 0 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB® Forum Software © phpBB Group