Skip to navigation

Security Advisory grip security update

Advisory: RHSA-2005:304-08
Type: Security Advisory
Severity: Moderate
Issued on: 2005-03-28
Last updated on: 2005-03-28
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2005-0706

Details

A new grip package is available that fixes a remote buffer overflow.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

Grip is a GTK+ based front-end for CD rippers (such as cdparanoia and
cdda2wav) and Ogg Vorbis encoders.

Dean Brettle discovered a buffer overflow bug in the way grip handles data
returned by CDDB servers. It is possible that if a user connects to a
malicious CDDB server, an attacker could execute arbitrary code on the
victim's machine. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0706 to this issue.

Users of grip should upgrade to this updated package, which
contains a backported patch, and is not vulnerable to this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/grip/2.96-1.3/i386/grip-2.96-1.3.i386.rpm
Missing file
    MD5: 4bf449365661b5cadc1f0a9c6c0bc3a7
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/grip/2.96-1.3/ia64/grip-2.96-1.3.ia64.rpm
Missing file
    MD5: 6d2c64d58783feb49c895c27a2e9e993
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/grip/2.96-1.3/i386/grip-2.96-1.3.i386.rpm
Missing file
    MD5: 4bf449365661b5cadc1f0a9c6c0bc3a7
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/grip/2.96-1.3/i386/grip-2.96-1.3.i386.rpm
Missing file
    MD5: 4bf449365661b5cadc1f0a9c6c0bc3a7
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/grip/2.96-1.3/ia64/grip-2.96-1.3.ia64.rpm
Missing file
    MD5: 6d2c64d58783feb49c895c27a2e9e993
 

Bugs fixed (see bugzilla for more information)

150712 - CAN-2005-0706 Buffer overflow in grip


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/