A new update is available for Red Hat Enterprise Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: file security update
Advisory ID: RHSA-2007:0124-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0124.html
Issue date: 2007-03-23
Updated on: 2007-03-23
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-1536
- ---------------------------------------------------------------------
1. Summary:
An updated file package that fixes a security flaw is now available for Red
Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
3. Problem description:
The file command is used to identify a particular file according to the
type of data contained by the file.
An integer underflow flaw was found in the file utility. An attacker could
create a carefully crafted file which, if examined by a victim using the
file utility, could lead to arbitrary code execution. (CVE-2007-1536)
This issue did not affect the version of the file utility distributed with
Red Hat Enterprise Linux 2.1 or 3.
Users should upgrade to this erratum package, which contain a backported
patch to correct this issue.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
233161 - CVE-2007-1536 file 4.20 fixes a heap overflow in that can result in arbitrary code execution
233337 - CVE-2007-1536 file 4.20 fixes a heap overflow in that can result in arbitrary code execution
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5 file-4.10-3.EL4.5.src.rpm
i386:
2148dbe144b2c050a5aa94559f3a1fe1 file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992 file-debuginfo-4.10-3.EL4.5.i386.rpm
ia64:
4213f7d5e2c136a3bebc008f43f9b9cb file-4.10-3.EL4.5.ia64.rpm
fb6b0962efe14f3d9d3675d0b8ed7243 file-debuginfo-4.10-3.EL4.5.ia64.rpm
ppc:
4ff799e23850ad56b777c3213b5897b3 file-4.10-3.EL4.5.ppc.rpm
5e8256aa72a078d8a236ade85838000e file-debuginfo-4.10-3.EL4.5.ppc.rpm
s390:
947e89850ecd9f3e218a86b31060bbff file-4.10-3.EL4.5.s390.rpm
c9b44db20a5f0f3ef326e13ab8e91416 file-debuginfo-4.10-3.EL4.5.s390.rpm
s390x:
238b84277df82e589e2da1c080390391 file-4.10-3.EL4.5.s390x.rpm
afbd86c4b660e26cf5a855834978453e file-debuginfo-4.10-3.EL4.5.s390x.rpm
x86_64:
ca289eace58ff0886e6fc40f55b7d03e file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06 file-debuginfo-4.10-3.EL4.5.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5 file-4.10-3.EL4.5.src.rpm
i386:
2148dbe144b2c050a5aa94559f3a1fe1 file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992 file-debuginfo-4.10-3.EL4.5.i386.rpm
x86_64:
ca289eace58ff0886e6fc40f55b7d03e file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06 file-debuginfo-4.10-3.EL4.5.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5 file-4.10-3.EL4.5.src.rpm
i386:
2148dbe144b2c050a5aa94559f3a1fe1 file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992 file-debuginfo-4.10-3.EL4.5.i386.rpm
ia64:
4213f7d5e2c136a3bebc008f43f9b9cb file-4.10-3.EL4.5.ia64.rpm
fb6b0962efe14f3d9d3675d0b8ed7243 file-debuginfo-4.10-3.EL4.5.ia64.rpm
x86_64:
ca289eace58ff0886e6fc40f55b7d03e file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06 file-debuginfo-4.10-3.EL4.5.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/file-4.10-3.EL4.5.src.rpm
c8528fe4a34f010c709d5f9dc93b73a5 file-4.10-3.EL4.5.src.rpm
i386:
2148dbe144b2c050a5aa94559f3a1fe1 file-4.10-3.EL4.5.i386.rpm
8deda2519eefea693b0f40ab5360e992 file-debuginfo-4.10-3.EL4.5.i386.rpm
ia64:
4213f7d5e2c136a3bebc008f43f9b9cb file-4.10-3.EL4.5.ia64.rpm
fb6b0962efe14f3d9d3675d0b8ed7243 file-debuginfo-4.10-3.EL4.5.ia64.rpm
x86_64:
ca289eace58ff0886e6fc40f55b7d03e file-4.10-3.EL4.5.x86_64.rpm
e82cdde24302aeef692b6feb3b8d5f06 file-debuginfo-4.10-3.EL4.5.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/file-4.17-9.el5.src.rpm
565e3adeb330d941e62779e973043c8a file-4.17-9.el5.src.rpm
i386:
d044793730b6eb50f99f89e250ff1f68 file-4.17-9.el5.i386.rpm
3e6bccacfabae8a111b4d50d9a18ce55 file-debuginfo-4.17-9.el5.i386.rpm
x86_64:
7d76d229b35d23af0ab593322c49c1b6 file-4.17-9.el5.x86_64.rpm
99ca293ef9794b8708f7380e6627a8fb file-debuginfo-4.17-9.el5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/file-4.17-9.el5.src.rpm
565e3adeb330d941e62779e973043c8a file-4.17-9.el5.src.rpm
i386:
d044793730b6eb50f99f89e250ff1f68 file-4.17-9.el5.i386.rpm
3e6bccacfabae8a111b4d50d9a18ce55 file-debuginfo-4.17-9.el5.i386.rpm
ia64:
ec120e826901810a56d962483b02612a file-4.17-9.el5.ia64.rpm
a7ec74f8c96a2e219eac81c96d0d3325 file-debuginfo-4.17-9.el5.ia64.rpm
ppc:
9fe5754f3933494b9c973e30d570ff77 file-4.17-9.el5.ppc.rpm
29883718c7ce2a2b404647f0104c9f29 file-debuginfo-4.17-9.el5.ppc.rpm
s390x:
798d452831a511b2145aeb4ab21b66d3 file-4.17-9.el5.s390x.rpm
dfe62528bfa601ee08bece711f0263b5 file-debuginfo-4.17-9.el5.s390x.rpm
x86_64:
7d76d229b35d23af0ab593322c49c1b6 file-4.17-9.el5.x86_64.rpm
99ca293ef9794b8708f7380e6627a8fb file-debuginfo-4.17-9.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFGA6dZXlSAg2UNWIIRAvf2AKCte4fpG34FbUaiOSh8yTuQcCEo/QCcDVBN
TEYQ2antuxSENPvCajvfImE=
=8hwE
-----END PGP SIGNATURE-----