[RHSA-2002:004-06] New groff packages available to fix security problems

From: bugzillaat_private
Date: Mon Jan 14 2002 - 08:18:38 PST

  • Next message: Jonas Eriksson: "Sudo version 1.6.4 now available (fwd)"

    ---------------------------------------------------------------------
                       Red Hat, Inc. Red Hat Security Advisory
    
    Synopsis:          New groff packages available to fix security problems
    Advisory ID:       RHSA-2002:004-06
    Issue date:        2002-01-07
    Updated on:        2002-01-14
    Product:           Red Hat Linux
    Keywords:          groff security
    Cross references:  
    Obsoletes:         
    ---------------------------------------------------------------------
    
    1. Topic:
    
    New groff packages have been made available that fix an overflow in groff.
    If the printing system running this is a security issue, it is recommended
    to update to the new, fixed packages.
    
    2. Relevant releases/architectures:
    
    Red Hat Linux 7.0 - alpha, i386
    
    Red Hat Linux 7.1 - alpha, i386, ia64
    
    Red Hat Linux 7.2 - i386, ia64
    
    3. Problem description:
    
    Groff is a document formatting system.  The groff preprocessor contains an
    exploitable buffer overflow. If groff can be invoked within the LPRng
    printing system, an attacker can gain rights as the "lp" user.
    
    Remote exploitation may be possible if lpd is running and is accessible
    remotely, and the attacker knows the name of the printer and spoolfile.
    
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CAN-2002-0003 to this issue.
    
    Thanks to zen-parse for bringing this bug to our attention.
    
    4. Solution:
    
    Before applying this update, make sure all previously released errata
    relevant to your system have been applied.
    
    To update all RPMs for your particular architecture, run:
    
    rpm -Fvh [filenames]
    
    where [filenames] is a list of the RPMs you wish to upgrade.  Only those
    RPMs which are currently installed will be updated.  Those RPMs which are
    not installed but included in the list will not be updated.  Note that you
    can also use wildcards (*.rpm) if your current directory *only* contains
    the
    desired RPMs.
    
    Please note that this update is also available via Red Hat Network.  Many
    people find this an easier way to apply updates.  To use Red Hat Network,
    launch the Red Hat Update Agent with the following command:
    
    up2date
    
    This will start an interactive process that will result in the appropriate
    RPMs being upgraded on your system.
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
    
    
    
    6. RPMs required:
    
    Red Hat Linux 7.0:
    
    SRPMS:
    ftp://updates.redhat.com/7.0/en/os/SRPMS/groff-1.16-7.1.src.rpm
    
    alpha:
    ftp://updates.redhat.com/7.0/en/os/alpha/groff-1.16-7.1.alpha.rpm
    
    i386:
    ftp://updates.redhat.com/7.0/en/os/i386/groff-1.16-7.1.i386.rpm
    
    Red Hat Linux 7.1:
    
    SRPMS:
    ftp://updates.redhat.com/7.1/en/os/SRPMS/groff-1.17.2-7.0.2.src.rpm
    
    alpha:
    ftp://updates.redhat.com/7.1/en/os/alpha/groff-1.17.2-7.0.2.alpha.rpm
    
    i386:
    ftp://updates.redhat.com/7.1/en/os/i386/groff-1.17.2-7.0.2.i386.rpm
    
    ia64:
    ftp://updates.redhat.com/7.1/en/os/ia64/groff-1.17.2-7.0.2.ia64.rpm
    
    Red Hat Linux 7.2:
    
    SRPMS:
    ftp://updates.redhat.com/7.2/en/os/SRPMS/groff-1.17.2-7.0.2.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.2/en/os/i386/groff-1.17.2-7.0.2.i386.rpm
    
    ia64:
    ftp://updates.redhat.com/7.2/en/os/ia64/groff-1.17.2-7.0.2.ia64.rpm
    
    
    
    7. Verification:
    
    MD5 sum                          Package Name
    --------------------------------------------------------------------------
    4fe878d0720088830c29954d25c9e032 7.0/en/os/SRPMS/groff-1.16-7.1.src.rpm
    b37f80ae0a4e6ad49b3d697376cfdde2 7.0/en/os/alpha/groff-1.16-7.1.alpha.rpm
    6e7cfc9cf998ac9a6a6401d627acdea4 7.0/en/os/i386/groff-1.16-7.1.i386.rpm
    1d4e9b5068fcf178ddacf032c0db523d 7.1/en/os/SRPMS/groff-1.17.2-7.0.2.src.rpm
    93cbf905335c1474ed9e632c0ec83738 7.1/en/os/alpha/groff-1.17.2-7.0.2.alpha.rpm
    f3181dd6c32ffc9478721244b77c89af 7.1/en/os/i386/groff-1.17.2-7.0.2.i386.rpm
    4f08644532e54b8c3553b04148424e56 7.1/en/os/ia64/groff-1.17.2-7.0.2.ia64.rpm
    1d4e9b5068fcf178ddacf032c0db523d 7.2/en/os/SRPMS/groff-1.17.2-7.0.2.src.rpm
    f3181dd6c32ffc9478721244b77c89af 7.2/en/os/i386/groff-1.17.2-7.0.2.i386.rpm
    4f08644532e54b8c3553b04148424e56 7.2/en/os/ia64/groff-1.17.2-7.0.2.ia64.rpm
     
    
    These packages are GPG signed by Red Hat, Inc. for security.  Our key
    is available at:
        http://www.redhat.com/about/contact/pgpkey.html
    
    You can verify each package with the following command:
        rpm --checksig  <filename>
    
    If you only wish to verify that each package has not been corrupted or
    tampered with, examine only the md5sum with the following command:
        rpm --checksig --nogpg <filename>
    
    8. References:
    
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0003
    
    
    Copyright(c) 2000, 2001, 2002 Red Hat, Inc.
    



    This archive was generated by hypermail 2b30 : Mon Jan 14 2002 - 12:22:38 PST