[RHSA-2007:0391-01] Moderate: file security update

bugzilla at redhat.com bugzilla at redhat.com
Wed May 30 09:45:22 UTC 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: file security update
Advisory ID:       RHSA-2007:0391-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0391.html
Issue date:        2007-05-30
Updated on:        2007-05-30
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-2799 
- ---------------------------------------------------------------------

1. Summary:

An updated file package that fixes a security flaw is now available for Red
Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

The file command is used to identify a particular file according to the
type of data contained by the file.

The fix for CVE-2007-1536 introduced a new integer underflow flaw in the
file utility. An attacker could create a carefully crafted file which, if
examined by a victim using the file utility, could lead to arbitrary code
execution. (CVE-2007-2799)

This issue did not affect the version of the file utility distributed with
Red Hat Enterprise Linux 2.1 or 3.

Users should upgrade to this erratum package, which contain a backported
patch to correct this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

241022 - CVE-2007-2799 file integer overflow
241026 - CVE-2007-2799 file integer overflow
241027 - CVE-2007-2799 file integer overflow

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/file-4.10-3.0.2.el4.src.rpm
b965edbfc8969978c85c0523d8d66e86  file-4.10-3.0.2.el4.src.rpm

i386:
75f00f87378cd18b54aedb769f794301  file-4.10-3.0.2.el4.i386.rpm
efdab1d800634966e2e1139ce469d4c2  file-debuginfo-4.10-3.0.2.el4.i386.rpm

ia64:
8783b9863d2ed05c508d92b23503f920  file-4.10-3.0.2.el4.ia64.rpm
c19ef25c3e5a879853ecaab505ff2597  file-debuginfo-4.10-3.0.2.el4.ia64.rpm

ppc:
dd47db6fa389f2ff5928250893a7be8b  file-4.10-3.0.2.el4.ppc.rpm
e0bb1116776232c5ebc2681548dcb7f7  file-debuginfo-4.10-3.0.2.el4.ppc.rpm

s390:
b546e7c44fb7eda2e7be1d1d72433799  file-4.10-3.0.2.el4.s390.rpm
084965a1f9db4bef813eaebf0287f51b  file-debuginfo-4.10-3.0.2.el4.s390.rpm

s390x:
e7f435b24698bc2317dd9b5899cb1b90  file-4.10-3.0.2.el4.s390x.rpm
1fcc1b07f8047f39b7329e444172399a  file-debuginfo-4.10-3.0.2.el4.s390x.rpm

x86_64:
d015b5bc4eb50598633b251145cfc5ad  file-4.10-3.0.2.el4.x86_64.rpm
4e5bff0f6f01ad0920063e59d982ac3b  file-debuginfo-4.10-3.0.2.el4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/file-4.10-3.0.2.el4.src.rpm
b965edbfc8969978c85c0523d8d66e86  file-4.10-3.0.2.el4.src.rpm

i386:
75f00f87378cd18b54aedb769f794301  file-4.10-3.0.2.el4.i386.rpm
efdab1d800634966e2e1139ce469d4c2  file-debuginfo-4.10-3.0.2.el4.i386.rpm

x86_64:
d015b5bc4eb50598633b251145cfc5ad  file-4.10-3.0.2.el4.x86_64.rpm
4e5bff0f6f01ad0920063e59d982ac3b  file-debuginfo-4.10-3.0.2.el4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/file-4.10-3.0.2.el4.src.rpm
b965edbfc8969978c85c0523d8d66e86  file-4.10-3.0.2.el4.src.rpm

i386:
75f00f87378cd18b54aedb769f794301  file-4.10-3.0.2.el4.i386.rpm
efdab1d800634966e2e1139ce469d4c2  file-debuginfo-4.10-3.0.2.el4.i386.rpm

ia64:
8783b9863d2ed05c508d92b23503f920  file-4.10-3.0.2.el4.ia64.rpm
c19ef25c3e5a879853ecaab505ff2597  file-debuginfo-4.10-3.0.2.el4.ia64.rpm

x86_64:
d015b5bc4eb50598633b251145cfc5ad  file-4.10-3.0.2.el4.x86_64.rpm
4e5bff0f6f01ad0920063e59d982ac3b  file-debuginfo-4.10-3.0.2.el4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/file-4.10-3.0.2.el4.src.rpm
b965edbfc8969978c85c0523d8d66e86  file-4.10-3.0.2.el4.src.rpm

i386:
75f00f87378cd18b54aedb769f794301  file-4.10-3.0.2.el4.i386.rpm
efdab1d800634966e2e1139ce469d4c2  file-debuginfo-4.10-3.0.2.el4.i386.rpm

ia64:
8783b9863d2ed05c508d92b23503f920  file-4.10-3.0.2.el4.ia64.rpm
c19ef25c3e5a879853ecaab505ff2597  file-debuginfo-4.10-3.0.2.el4.ia64.rpm

x86_64:
d015b5bc4eb50598633b251145cfc5ad  file-4.10-3.0.2.el4.x86_64.rpm
4e5bff0f6f01ad0920063e59d982ac3b  file-debuginfo-4.10-3.0.2.el4.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/file-4.17-9.0.1.el5.src.rpm
e5f3056e10d0abf9ab2d4734d2c40df6  file-4.17-9.0.1.el5.src.rpm

i386:
1bca600f3b0de26a2725d6f4e7a72383  file-4.17-9.0.1.el5.i386.rpm
a384f2635a5e6964a3f315d771ff75a4  file-debuginfo-4.17-9.0.1.el5.i386.rpm

x86_64:
1750ba7e71efd10cd3883b2de825f896  file-4.17-9.0.1.el5.x86_64.rpm
3117f2b7873d607da5b0e11e56b3da74  file-debuginfo-4.17-9.0.1.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/file-4.17-9.0.1.el5.src.rpm
e5f3056e10d0abf9ab2d4734d2c40df6  file-4.17-9.0.1.el5.src.rpm

i386:
1bca600f3b0de26a2725d6f4e7a72383  file-4.17-9.0.1.el5.i386.rpm
a384f2635a5e6964a3f315d771ff75a4  file-debuginfo-4.17-9.0.1.el5.i386.rpm

ia64:
2d7e954147b37218beafcebf771865b3  file-4.17-9.0.1.el5.ia64.rpm
18c9cb33b74bb8c962ca0d8fe08c84da  file-debuginfo-4.17-9.0.1.el5.ia64.rpm

ppc:
8051227058fb32153ce838aea9f36268  file-4.17-9.0.1.el5.ppc.rpm
5d498107c435b67be6f6bf36c214caa4  file-debuginfo-4.17-9.0.1.el5.ppc.rpm

s390x:
d9ccaf596792a8487e1ef137cb6db3f3  file-4.17-9.0.1.el5.s390x.rpm
ded763b43e263cb6b9b8b99ff9a99ff9  file-debuginfo-4.17-9.0.1.el5.s390x.rpm

x86_64:
1750ba7e71efd10cd3883b2de825f896  file-4.17-9.0.1.el5.x86_64.rpm
3117f2b7873d607da5b0e11e56b3da74  file-debuginfo-4.17-9.0.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGXUesXlSAg2UNWIIRArf0AKDFC2kWwA0Yj/ofxm/lh/3PyCDe2QCgq19p
+a0FUG7Yj2MCtqNS69z3GBE=
=62Og
-----END PGP SIGNATURE-----






More information about the Enterprise-watch-list mailing list