From security@mandriva.com Mon Mar 20 18:16:31 2006 From: security@mandriva.com To: full-disclosure@lists.grok.org.uk Date: Mon, 20 Mar 2006 16:17:00 -0700 Reply-To: xsecurity@mandriva.com Subject: [Full-disclosure] [ MDKSA-2006:057 ] - Updated cairo packages to address Evolution DoS vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2006:057 http://www.mandriva.com/security/ _______________________________________________________________________ Package : cairo Date : March 20, 2006 Affected: 2006.0 _______________________________________________________________________ Problem Description: GNOME Evolution allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment. The underlying issue is in libcairo, which is used by recent versions of Evolution for message rendering. The Corporate Desktop 3.0 version of Evolution does not use libcairo and is not vulnerable to this issue. Updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0528 _______________________________________________________________________ Updated Packages: Mandriva Linux 2006.0: 18795da3000ba593f1667b14c299a505 2006.0/RPMS/libcairo2-1.0.0-8.1.20060mdk.i586.rpm 8cc112928efae0689998f9eeab317e16 2006.0/RPMS/libcairo2-devel-1.0.0-8.1.20060mdk.i586.rpm 38abc115e3d581fed3788a543d54acea 2006.0/RPMS/libcairo2-static-devel-1.0.0-8.1.20060mdk.i586.rpm d611cf94f1bee1c88810053cc6dce68c 2006.0/SRPMS/cairo-1.0.0-8.1.20060mdk.src.rpm Mandriva Linux 2006.0/X86_64: 8b134af67bed9ea300530e02765d34bb x86_64/2006.0/RPMS/lib64cairo2-1.0.0-8.1.20060mdk.x86_64.rpm e3626b3500ab87dc9abd0ef05d8b1870 x86_64/2006.0/RPMS/lib64cairo2-devel-1.0.0-8.1.20060mdk.x86_64.rpm ce16dbfb1065b07c758ff5afb5e89dca x86_64/2006.0/RPMS/lib64cairo2-static-devel-1.0.0-8.1.20060mdk.x86_64.rpm d611cf94f1bee1c88810053cc6dce68c x86_64/2006.0/SRPMS/cairo-1.0.0-8.1.20060mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEHw0bmqjQ0CJFipgRAj3PAJ9MKwFvrdwhll7obp6h0tDiBoi36ACfVijD 7KS+I5Xzsv7M2NAxP62ukrM= =RwN4 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/