"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: newt security update
Advisory ID: RHSA-2009:1463-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1463.html
Issue date: 2009-09-24
CVE Names: CVE-2009-2905
=====================================================================
1. Summary:
Updated newt packages that fix one security issue are now available for Red
Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Description:
Newt is a programming library for color text mode, widget-based user
interfaces. Newt can be used to add stacked windows, entry widgets,
checkboxes, radio buttons, labels, plain text fields, scrollbars, and so
on, to text mode user interfaces.
A heap-based buffer overflow flaw was found in the way newt processes
content that is to be displayed in a text dialog box. A local attacker
could issue a specially-crafted text dialog box display request (direct or
via a custom application), leading to a denial of service (application
crash) or, potentially, arbitrary code execution with the privileges of the
user running the application using the newt library. (CVE-2009-2905)
Users of newt should upgrade to these updated packages, which contain a
backported patch to correct this issue. After installing the updated
packages, all applications using the newt library must be restarted for the
update to take effect.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
523955 - CVE-2009-2905 newt: heap-overflow in textbox when text reflowing
6. Package List:
Red Hat Enterprise Linux AS version 3:
Source:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/newt-0.51.5-2.el3.src.rpm
i386:
newt-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-devel-0.51.5-2.el3.i386.rpm
ia64:
newt-0.51.5-2.el3.i386.rpm
newt-0.51.5-2.el3.ia64.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.ia64.rpm
newt-devel-0.51.5-2.el3.ia64.rpm
ppc:
newt-0.51.5-2.el3.ppc.rpm
newt-0.51.5-2.el3.ppc64.rpm
newt-debuginfo-0.51.5-2.el3.ppc.rpm
newt-debuginfo-0.51.5-2.el3.ppc64.rpm
newt-devel-0.51.5-2.el3.ppc.rpm
s390:
newt-0.51.5-2.el3.s390.rpm
newt-debuginfo-0.51.5-2.el3.s390.rpm
newt-devel-0.51.5-2.el3.s390.rpm
s390x:
newt-0.51.5-2.el3.s390.rpm
newt-0.51.5-2.el3.s390x.rpm
newt-debuginfo-0.51.5-2.el3.s390.rpm
newt-debuginfo-0.51.5-2.el3.s390x.rpm
newt-devel-0.51.5-2.el3.s390x.rpm
x86_64:
newt-0.51.5-2.el3.i386.rpm
newt-0.51.5-2.el3.x86_64.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.x86_64.rpm
newt-devel-0.51.5-2.el3.x86_64.rpm
Red Hat Desktop version 3:
Source:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/newt-0.51.5-2.el3.src.rpm
i386:
newt-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-devel-0.51.5-2.el3.i386.rpm
x86_64:
newt-0.51.5-2.el3.i386.rpm
newt-0.51.5-2.el3.x86_64.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.x86_64.rpm
newt-devel-0.51.5-2.el3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
Source:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/newt-0.51.5-2.el3.src.rpm
i386:
newt-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-devel-0.51.5-2.el3.i386.rpm
ia64:
newt-0.51.5-2.el3.i386.rpm
newt-0.51.5-2.el3.ia64.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.ia64.rpm
newt-devel-0.51.5-2.el3.ia64.rpm
x86_64:
newt-0.51.5-2.el3.i386.rpm
newt-0.51.5-2.el3.x86_64.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.x86_64.rpm
newt-devel-0.51.5-2.el3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
Source:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/newt-0.51.5-2.el3.src.rpm
i386:
newt-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-devel-0.51.5-2.el3.i386.rpm
ia64:
newt-0.51.5-2.el3.i386.rpm
newt-0.51.5-2.el3.ia64.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.ia64.rpm
newt-devel-0.51.5-2.el3.ia64.rpm
x86_64:
newt-0.51.5-2.el3.i386.rpm
newt-0.51.5-2.el3.x86_64.rpm
newt-debuginfo-0.51.5-2.el3.i386.rpm
newt-debuginfo-0.51.5-2.el3.x86_64.rpm
newt-devel-0.51.5-2.el3.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/newt-0.51.6-10.el4_8.1.src.rpm
i386:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-devel-0.51.6-10.el4_8.1.i386.rpm
ia64:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-0.51.6-10.el4_8.1.ia64.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.ia64.rpm
newt-devel-0.51.6-10.el4_8.1.ia64.rpm
ppc:
newt-0.51.6-10.el4_8.1.ppc.rpm
newt-0.51.6-10.el4_8.1.ppc64.rpm
newt-debuginfo-0.51.6-10.el4_8.1.ppc.rpm
newt-debuginfo-0.51.6-10.el4_8.1.ppc64.rpm
newt-devel-0.51.6-10.el4_8.1.ppc.rpm
s390:
newt-0.51.6-10.el4_8.1.s390.rpm
newt-debuginfo-0.51.6-10.el4_8.1.s390.rpm
newt-devel-0.51.6-10.el4_8.1.s390.rpm
s390x:
newt-0.51.6-10.el4_8.1.s390.rpm
newt-0.51.6-10.el4_8.1.s390x.rpm
newt-debuginfo-0.51.6-10.el4_8.1.s390.rpm
newt-debuginfo-0.51.6-10.el4_8.1.s390x.rpm
newt-devel-0.51.6-10.el4_8.1.s390x.rpm
x86_64:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-0.51.6-10.el4_8.1.x86_64.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.x86_64.rpm
newt-devel-0.51.6-10.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/newt-0.51.6-10.el4_8.1.src.rpm
i386:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-devel-0.51.6-10.el4_8.1.i386.rpm
x86_64:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-0.51.6-10.el4_8.1.x86_64.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.x86_64.rpm
newt-devel-0.51.6-10.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/newt-0.51.6-10.el4_8.1.src.rpm
i386:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-devel-0.51.6-10.el4_8.1.i386.rpm
ia64:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-0.51.6-10.el4_8.1.ia64.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.ia64.rpm
newt-devel-0.51.6-10.el4_8.1.ia64.rpm
x86_64:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-0.51.6-10.el4_8.1.x86_64.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.x86_64.rpm
newt-devel-0.51.6-10.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/newt-0.51.6-10.el4_8.1.src.rpm
i386:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-devel-0.51.6-10.el4_8.1.i386.rpm
ia64:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-0.51.6-10.el4_8.1.ia64.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.ia64.rpm
newt-devel-0.51.6-10.el4_8.1.ia64.rpm
x86_64:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-0.51.6-10.el4_8.1.x86_64.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
newt-debuginfo-0.51.6-10.el4_8.1.x86_64.rpm
newt-devel-0.51.6-10.el4_8.1.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/newt-0.52.2-12.el5_4.1.src.rpm
i386:
newt-0.52.2-12.el5_4.1.i386.rpm
newt-debuginfo-0.52.2-12.el5_4.1.i386.rpm
x86_64:
newt-0.52.2-12.el5_4.1.i386.rpm
newt-0.52.2-12.el5_4.1.x86_64.rpm
newt-debuginfo-0.52.2-12.el5_4.1.i386.rpm
newt-debuginfo-0.52.2-12.el5_4.1.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/newt-0.52.2-12.el5_4.1.src.rpm
i386:
newt-debuginfo-0.52.2-12.el5_4.1.i386.rpm
newt-devel-0.52.2-12.el5_4.1.i386.rpm
x86_64:
newt-debuginfo-0.52.2-12.el5_4.1.i386.rpm
newt-debuginfo-0.52.2-12.el5_4.1.x86_64.rpm
newt-devel-0.52.2-12.el5_4.1.i386.rpm
newt-devel-0.52.2-12.el5_4.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/newt-0.52.2-12.el5_4.1.src.rpm
i386:
newt-0.52.2-12.el5_4.1.i386.rpm
newt-debuginfo-0.52.2-12.el5_4.1.i386.rpm
newt-devel-0.52.2-12.el5_4.1.i386.rpm
ia64:
newt-0.52.2-12.el5_4.1.ia64.rpm
newt-debuginfo-0.52.2-12.el5_4.1.ia64.rpm
newt-devel-0.52.2-12.el5_4.1.ia64.rpm
ppc:
newt-0.52.2-12.el5_4.1.ppc.rpm
newt-0.52.2-12.el5_4.1.ppc64.rpm
newt-debuginfo-0.52.2-12.el5_4.1.ppc.rpm
newt-debuginfo-0.52.2-12.el5_4.1.ppc64.rpm
newt-devel-0.52.2-12.el5_4.1.ppc.rpm
newt-devel-0.52.2-12.el5_4.1.ppc64.rpm
s390x:
newt-0.52.2-12.el5_4.1.s390.rpm
newt-0.52.2-12.el5_4.1.s390x.rpm
newt-debuginfo-0.52.2-12.el5_4.1.s390.rpm
newt-debuginfo-0.52.2-12.el5_4.1.s390x.rpm
newt-devel-0.52.2-12.el5_4.1.s390.rpm
newt-devel-0.52.2-12.el5_4.1.s390x.rpm
x86_64:
newt-0.52.2-12.el5_4.1.i386.rpm
newt-0.52.2-12.el5_4.1.x86_64.rpm
newt-debuginfo-0.52.2-12.el5_4.1.i386.rpm
newt-debuginfo-0.52.2-12.el5_4.1.x86_64.rpm
newt-devel-0.52.2-12.el5_4.1.i386.rpm
newt-devel-0.52.2-12.el5_4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFKu8cqXlSAg2UNWIIRAj5rAJ93NojFMID2+HqRFyZ+LIdAKpXa5wCeLZhS
8OoeiLToCoMt/vAvwDtSfbU=
47
-----END PGP SIGNATURE-----
"
RHSA-2009:1209-01 Moderate: curl security update
This entry was posted
on 11:31 AM
.
Archives
-
▼
2009
(488)
-
▼
September
(53)
- RHSA-2009:1465-01 Important: kvm security and bug ...
- RHSA-2009:1466-01 Important: kernel security and b...
- DSA 1897-1: New horde3 packages fix arbitrary code...
- DSA 1895-1: New xmltooling packages fix potential ...
- DSA 1894-1: New newt packages fix arbitrary code e...
- DSA 1892-1: New dovecot packages fix arbitrary cod...
- GLSA 200909-20 cURL: Certificate validation error
- RHSA-2009:1461-01 Important: Red Hat Application S...
- RHSA-2009:1463-01 Moderate: newt security update
- USN-837-1: Newt vulnerability
- RHSA-2009:1452-01 Moderate: neon security update
- DSA 1891-1: New changetrack packages fix arbitrary...
- USN-836-1: WebKit vulnerabilities
- RHSA-2009:1459-04 Important: cyrus-imapd security ...
- RHSA-2009:1453-01 Moderate: pidgin security update
- USN-835-1: neon vulnerabilities
- DSA 1888-1: New openssl packages deprecate MD2 has...
- USN-834-1: PostgreSQL vulnerabilities
- GLSA 200909-19 Dnsmasq: Multiple vulnerabilities
- GLSA 200909-18 nginx: Remote execution of arbitra...
- DSA 1889-1: New icu packages correct multibyte seq...
- USN-830-1: OpenSSL vulnerability
- RHSA-2009:1438-01 Important: kernel security and b...
- USN-832-1: FreeRADIUS vulnerability
- DSA 1884-1: New nginx packages fix arbitrary code ...
- RHSA-2009:1451-01 Moderate: freeradius security up...
- DSA 1883-2: New nagios2 packages fix regression
- GLSA 200909-17 ZNC: Directory traversal
- USN-821-1: Firefox and Xulrunner vulnerabilities
- DSA 1887-1: New rails packages fix cross-site scri...
- GLSA 200909-14 Horde: Multiple vulnerabilities
- GLSA 200909-16 Wireshark: Denial of Service
- DSA 1878-2: New devscripts packages fix regressions
- GLSA 200909-12 HTMLDOC: User-assisted execution o...
- GLSA 200909-09 Screenie: Insecure temporary file ...
- DSA 1883-1: New nagios2 packages fix several cross...
- RHSA-2009:1432-01 Critical: seamonkey security update
- RHSA-2009:1431-01 Critical: seamonkey security update
- RHSA-2009:1430-01 Critical: firefox security update
- DSA 1879-1: New silc-client/silc-toolkit packages ...
- GLSA 200909-04 Clam AntiVirus: Multiple vulnerabi...
- DSA 1878-1: New devscripts packages fix remote cod...
- DSA 1881-1: New cyrus-imapd packages fix arbitrary...
- GLSA 200909-01 Linux-PAM: Privilege escalation
- GLSA 200909-02 libvorbis: User-assisted execution...
- RHSA-2009:1339-02 Low: rgmanager security, bug fix...
- RHSA-2009:1289-02 Moderate: mysql security and bug...
- RHSA-2009:1321-02 Low: nfs-utils security and bug ...
- RHSA-2009:1278-02 Low: lftp security and bug fix u...
- RHSA-2009:1341-02 Low: cman security, bug fix, and...
- RHSA-2009:1337-02 Low: gfs2-utils security and bug...
- RHSA-2009:1232-01 Moderate: gnutls security update
- RHSA-2009:1239-02 Important: kernel-rt security an...
-
▼
September
(53)