Home / vulnerabilitiesPDF  

MDKSA-2006-203.txt

Posted on 09 November 2006
Source : packetstormsecurity.org Link

 


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:203
http://www.mandriva.com/security/
_______________________________________________________________________

Package : texinfo
Date : November 8, 2006
Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0
_______________________________________________________________________

Problem Description:

Miloslav Trmac discovered a buffer overflow in texinfo. This issue can
cause texi2dvi or texindex to crash when processing a carefully crafted
file.

Updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
cc1879d0392af708f7c37bca15dd9879 2006.0/i586/info-4.8-1.2.20060mdk.i586.rpm
4c80a4e06e04e28ae6bc9d34d0ce6b9c 2006.0/i586/info-install-4.8-1.2.20060mdk.i586.rpm
84e851c4c094d8259debe9a92da97efd 2006.0/i586/texinfo-4.8-1.2.20060mdk.i586.rpm
f63eeab2e5fd19d6df4d794cc9a0556d 2006.0/SRPMS/texinfo-4.8-1.2.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
b37fd6f8393fe1a997da4dfcf24e0c6c 2006.0/x86_64/info-4.8-1.2.20060mdk.x86_64.rpm
d3e5f5d3df7464226e370d18d2040d78 2006.0/x86_64/info-install-4.8-1.2.20060mdk.x86_64.rpm
94ad72f47a76488f8fe3000187217e9d 2006.0/x86_64/texinfo-4.8-1.2.20060mdk.x86_64.rpm
f63eeab2e5fd19d6df4d794cc9a0556d 2006.0/SRPMS/texinfo-4.8-1.2.20060mdk.src.rpm

Mandriva Linux 2007.0:
841f25fd2ae052fa135f347d1a321a61 2007.0/i586/info-4.8-4.1mdv2007.0.i586.rpm
d0ba0f48503167816581c5f4166949ad 2007.0/i586/info-install-4.8-4.1mdv2007.0.i586.rpm
c731ee9865530fdbafc445b56b67e5ad 2007.0/i586/texinfo-4.8-4.1mdv2007.0.i586.rpm
b8bf1a5838ac82d4910e9a5e5ea612b4 2007.0/SRPMS/texinfo-4.8-4.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
054058a5ef065bc25d0bb87b36ad3622 2007.0/x86_64/info-4.8-4.1mdv2007.0.x86_64.rpm
5b63631e0cd60e201e14332faf3e30d8 2007.0/x86_64/info-install-4.8-4.1mdv2007.0.x86_64.rpm
cbdda90e9cce0abc9de7fdfab70f593e 2007.0/x86_64/texinfo-4.8-4.1mdv2007.0.x86_64.rpm
b8bf1a5838ac82d4910e9a5e5ea612b4 2007.0/SRPMS/texinfo-4.8-4.1mdv2007.0.src.rpm

Corporate 3.0:
81b5711c0afe51a12aa4458ab0b680c3 corporate/3.0/i586/info-4.6-1.2.C30mdk.i586.rpm
65e67c1be9ca13d7320218e60fab855c corporate/3.0/i586/info-install-4.6-1.2.C30mdk.i586.rpm
fc7f021455259a97412c95b3939ede98 corporate/3.0/i586/texinfo-4.6-1.2.C30mdk.i586.rpm
13d484c70a47aa50038c1f59b514aaaa corporate/3.0/SRPMS/texinfo-4.6-1.2.C30mdk.src.rpm

Corporate 3.0/X86_64:
942bc82c461a5bd53799978b7c7d37ac corporate/3.0/x86_64/info-4.6-1.2.C30mdk.x86_64.rpm
616999400ddebcfc8593bfb47f7a8835 corporate/3.0/x86_64/info-install-4.6-1.2.C30mdk.x86_64.rpm
ad900d22f4e1402ef303aa211109845a corporate/3.0/x86_64/texinfo-4.6-1.2.C30mdk.x86_64.rpm
13d484c70a47aa50038c1f59b514aaaa corporate/3.0/SRPMS/texinfo-4.6-1.2.C30mdk.src.rpm

Corporate 4.0:
cc0ef9a317302dc40c14d90bbc10200d corporate/4.0/i586/info-4.8-1.2.20060mlcs4.i586.rpm
db1c66093560e85561313346c9e8d110 corporate/4.0/i586/info-install-4.8-1.2.20060mlcs4.i586.rpm
cacd6c6cc8e1f1199d3bfc9efafe53f7 corporate/4.0/i586/texinfo-4.8-1.2.20060mlcs4.i586.rpm
915e8d5f747b0ed558491ed474f3ca4f corporate/4.0/SRPMS/texinfo-4.8-1.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
0016ff4dfe7b413ef3dff74d6d5037e2 corporate/4.0/x86_64/info-4.8-1.2.20060mlcs4.x86_64.rpm
4d4b71acc580a419fbb2a8654324a8b7 corporate/4.0/x86_64/info-install-4.8-1.2.20060mlcs4.x86_64.rpm
09f9fcfe879baa6a4296bde478e536c5 corporate/4.0/x86_64/texinfo-4.8-1.2.20060mlcs4.x86_64.rpm
915e8d5f747b0ed558491ed474f3ca4f corporate/4.0/SRPMS/texinfo-4.8-1.2.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFUckhmqjQ0CJFipgRAq1PAJ4w4mL8uDnDkRGrZYQ7/Mz/8B98kwCggUQo
uHTmSaCDpMEUjAqWp9zkmOM=
=SLd6
-----END PGP SIGNATURE-----

 

TOP