A new update is available for Red Hat Enterprise Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: pwlib security update
Advisory ID: RHSA-2007:0932-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0932.html
Issue date: 2007-10-08
Updated on: 2007-10-08
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-4897
- ---------------------------------------------------------------------
1. Summary:
Updated pwlib packages that fix a security issue are now available for Red
Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64
3. Problem description:
PWLib is a library used to support cross-platform applications.
In Red Hat Enterprise Linux 5, the Ekiga teleconferencing application uses
PWLib.
A memory management flaw was discovered in PWLib. An attacker could use this
flaw to crash an application, such as Ekiga, which is linked with pwlib
(CVE-2007-4897).
Users should upgrade to these updated packages which contain a backported
patch to correct this issue.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
292831 - CVE-2007-4897 ekiga GetHostAddress remote DoS
6. RPMs required:
Red Hat Enterprise Linux Desktop (v. 5 client):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pwlib-1.10.1-7.0.1.el5.src.rpm
12bf503921102722f4fd4a186dbfe33a pwlib-1.10.1-7.0.1.el5.src.rpm
i386:
817015505ca658d99a772f9767c9a68d pwlib-1.10.1-7.0.1.el5.i386.rpm
c63326632da424bfa642294768361812 pwlib-debuginfo-1.10.1-7.0.1.el5.i386.rpm
x86_64:
0d60956bb433f4806818e508ca834634 pwlib-1.10.1-7.0.1.el5.x86_64.rpm
680df82f90ddc98f7dde1496cd19258e pwlib-debuginfo-1.10.1-7.0.1.el5.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pwlib-1.10.1-7.0.1.el5.src.rpm
12bf503921102722f4fd4a186dbfe33a pwlib-1.10.1-7.0.1.el5.src.rpm
i386:
c63326632da424bfa642294768361812 pwlib-debuginfo-1.10.1-7.0.1.el5.i386.rpm
a89f52f37a42bb2f99fd46624c13288d pwlib-devel-1.10.1-7.0.1.el5.i386.rpm
x86_64:
680df82f90ddc98f7dde1496cd19258e pwlib-debuginfo-1.10.1-7.0.1.el5.x86_64.rpm
1b5db71a779c5dce18f44545403c6462 pwlib-devel-1.10.1-7.0.1.el5.x86_64.rpm
RHEL Optional Productivity Applications (v. 5 server):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/pwlib-1.10.1-7.0.1.el5.src.rpm
12bf503921102722f4fd4a186dbfe33a pwlib-1.10.1-7.0.1.el5.src.rpm
i386:
817015505ca658d99a772f9767c9a68d pwlib-1.10.1-7.0.1.el5.i386.rpm
c63326632da424bfa642294768361812 pwlib-debuginfo-1.10.1-7.0.1.el5.i386.rpm
a89f52f37a42bb2f99fd46624c13288d pwlib-devel-1.10.1-7.0.1.el5.i386.rpm
x86_64:
0d60956bb433f4806818e508ca834634 pwlib-1.10.1-7.0.1.el5.x86_64.rpm
680df82f90ddc98f7dde1496cd19258e pwlib-debuginfo-1.10.1-7.0.1.el5.x86_64.rpm
1b5db71a779c5dce18f44545403c6462 pwlib-devel-1.10.1-7.0.1.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4897
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHCebhXlSAg2UNWIIRAssgAJ4ynga1gyDr/AcpuRcvIL9lvoFA1ACcC1Yn
4BPRiKaupq7G/romhXW7618=
=YQzW
-----END PGP SIGNATURE-----