grip security update
|Last updated on:||2005-03-28|
|Affected Products:||Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
A new grip package is available that fixes a remote buffer overflow.
This update has been rated as having moderate security impact by the Red Hat
Security Response Team.
Grip is a GTK+ based front-end for CD rippers (such as cdparanoia and
cdda2wav) and Ogg Vorbis encoders.
Dean Brettle discovered a buffer overflow bug in the way grip handles data
returned by CDDB servers. It is possible that if a user connects to a
malicious CDDB server, an attacker could execute arbitrary code on the
victim's machine. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0706 to this issue.
Users of grip should upgrade to this updated package, which
contains a backported patch, and is not vulnerable to this issue.
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
|Red Hat Enterprise Linux AS (v. 2.1)|
|Red Hat Enterprise Linux ES (v. 2.1)|
|Red Hat Enterprise Linux WS (v. 2.1)|
|Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor|
|(The unlinked packages above are only available from the Red Hat Network)|
Bugs fixed (see bugzilla for more information)
150712 - CAN-2005-0706 Buffer overflow in grip
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: