FAQ   Search   Memberlist  
Profile    Log in to check your private messages    Register    Log in
9k Update 2005-02-08: Updated abiword packages

 
Post new topic   Reply to topic    BLAG Forum Index -> announcements
View previous topic :: View next topic  
Author Message
mike_m
PostPosted: Sat Mar 05, 2005 2:26 am    Post subject: 9k Update 2005-02-08: Updated abiword packages Reply with quote

———————————————————————–
Fedora Legacy Update Advisory

Synopsis: Updated abiword resolves security vulnerabilities
Advisory ID: FLSA:1906
Issue date: 2005-02-08
Product: Red Hat Linux
Keywords: Security
Cross references: https://bugzilla.fedora.us/show_bug.cgi?id=1906
CVE Names: CAN-2004-0645
———————————————————————–

———————————————————————–
1. Topic:

Updated abiword packages that fix a security vulnerability are now
available.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386

3. Problem description:

AbiWord is a cross-platform, open-source word processor.

A buffer overflow in the wv library included in abiword allows remote
attackers to execute arbitrary code via a document with a long DateTime
field.

All users are advised to upgrade to these updated packages, which contain a
backported fix and are not vulnerable to this issue.

Fedora Legacy would like to thank Marc Deslauriers for reporting this issue,
and Dave Botsch and Marc Deslauriers and preparing updated RPMs.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. This assumes that you have yum or
apt-get configured for obtaining Fedora Legacy content. Please visit
http://www.fedoralegacy.org/docs for directions on how to configure yum
and apt-get.

5. Bug IDs fixed:

http://bugzilla.fedora.us - 1906 - CAN-2004-0645-Abiword wv component buffer
overflow

6. RPMs required:

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/abiword-1.0.4-5.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/abiword-1.0.4-5.legacy.i386.rpm

7. Verification:

SHA1 sum Package Name
—————————————————————————

40ec194cf69f56ee176e6c7bb995a6b34bad5cb2 redhat/9/updates/SRPMS/abiword-1.0.4-5.legacy.src.rpm
fadc8f407110a121ced851d20748c7807f2f71a2 redhat/9/updates/i386/abiword-1.0.4-5.legacy.i386.rpm

These packages are GPG signed by Fedora Legacy for security. Our key is
available from http://www.fedoralegacy org/about/security.php

You can verify each package with the following command:

rpm –checksig -v

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum

8. References:

http://www.abisource.com/release-notes/2.0.9.phtml
http://xforce.iss.net/xforce/xfdb/16660
http://www.idefense.com/application/poi/display?id=115&type=vulnerabilities&flashstatus=true

Display posts from previous:   
Post new topic   Reply to topic    BLAG Forum Index -> announcements
Page 1 of 1

Protected by Anti-Spam ACP