Skip to navigation

Security Advisory mikmod security update

Advisory: RHSA-2005:506-08
Type: Security Advisory
Severity: Low
Issued on: 2005-06-13
Last updated on: 2005-06-13
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2003-0427

Details

Updated mikmod packages that fix a security issue are now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

MikMod is a well known MOD music file player for UNIX-based systems.

A buffer overflow bug was found in mikmod during the processing of archive
filenames. An attacker could create a malicious archive that when opened by
mikmod could result in arbitrary code execution. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0427
to this issue.

Users of mikmod are advised to upgrade to these erratum packages, which
contain backported security patches and are not vulnerable to these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
mikmod-3.1.6-22.EL3.src.rpm
File outdated by:  RHSA-2010:0720
    MD5: ca592164c295c662169f59899b5d20ed
 
IA-32:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-devel-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 4f212188933bf38552074df16b177a10
 
x86_64:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-3.1.6-22.EL3.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: b964adeb79a724b8246c6fbfc5ea15a0
mikmod-devel-3.1.6-22.EL3.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 27ea70c35b53d82c3f7614d0c47698ed
 
Red Hat Desktop (v. 4)

SRPMS:
mikmod-3.1.6-32.EL4.src.rpm
File outdated by:  RHSA-2010:0720
    MD5: db1185414af6d6fe8fd74ee726db714e
 
IA-32:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-devel-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 74fb923f34913d78d51f09c4127ce7eb
 
x86_64:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-3.1.6-32.EL4.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: c6c8501d1224dcdaaabcc3ff85de07b0
mikmod-devel-3.1.6-32.EL4.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 7cab8526728b5a8acc0e99639689300c
 
Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
mikmod-3.1.6-14.EL21.src.rpm     MD5: 3970786eda79db9cb1e296287b37b6ac
 
IA-32:
mikmod-3.1.6-14.EL21.i386.rpm     MD5: 8466e1bce1554356966133dc58a2dacf
 
IA-64:
mikmod-3.1.6-14.EL21.ia64.rpm     MD5: b5213ec19799e26f9c6975e3a4ed2f62
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
mikmod-3.1.6-22.EL3.src.rpm
File outdated by:  RHSA-2010:0720
    MD5: ca592164c295c662169f59899b5d20ed
 
IA-32:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-devel-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 4f212188933bf38552074df16b177a10
 
IA-64:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-3.1.6-22.EL3.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 61cdfc9ac651ec6ac0cebb9b6ee21e5f
mikmod-devel-3.1.6-22.EL3.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 5ad42fbfc304dfbdc3730bbe312a5209
 
PPC:
mikmod-3.1.6-22.EL3.ppc.rpm
File outdated by:  RHSA-2010:0720
    MD5: 81957975a9fd51062153c128383720a8
mikmod-3.1.6-22.EL3.ppc64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 022c641f1a955354b0b0e72bb6b2e8ac
mikmod-devel-3.1.6-22.EL3.ppc.rpm
File outdated by:  RHSA-2010:0720
    MD5: ad5dbdcd0add2466d38f59c9043f8e5b
 
s390:
mikmod-3.1.6-22.EL3.s390.rpm
File outdated by:  RHSA-2010:0720
    MD5: 3fcbfc2496c589fd193c85cc9b8ed80b
mikmod-devel-3.1.6-22.EL3.s390.rpm
File outdated by:  RHSA-2010:0720
    MD5: c73f83b9d004b1d1b29381bf9970874f
 
s390x:
mikmod-3.1.6-22.EL3.s390.rpm
File outdated by:  RHSA-2010:0720
    MD5: 3fcbfc2496c589fd193c85cc9b8ed80b
mikmod-3.1.6-22.EL3.s390x.rpm
File outdated by:  RHSA-2010:0720
    MD5: fe365a4396d912d7dd87762eab613ed1
mikmod-devel-3.1.6-22.EL3.s390x.rpm
File outdated by:  RHSA-2010:0720
    MD5: 08d4c973c1a803f0f4d3e2422218ba1f
 
x86_64:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-3.1.6-22.EL3.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: b964adeb79a724b8246c6fbfc5ea15a0
mikmod-devel-3.1.6-22.EL3.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 27ea70c35b53d82c3f7614d0c47698ed
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
mikmod-3.1.6-32.EL4.src.rpm
File outdated by:  RHSA-2010:0720
    MD5: db1185414af6d6fe8fd74ee726db714e
 
IA-32:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-devel-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 74fb923f34913d78d51f09c4127ce7eb
 
IA-64:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-3.1.6-32.EL4.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 6ef2e377622084eef15242025f1a2e54
mikmod-devel-3.1.6-32.EL4.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 463452e2bf31d86d14ab7ae76d7c19de
 
PPC:
mikmod-3.1.6-32.EL4.ppc.rpm
File outdated by:  RHSA-2010:0720
    MD5: 69639a800fb155b7394c96f92b7fcb1d
mikmod-3.1.6-32.EL4.ppc64.rpm
File outdated by:  RHSA-2010:0720
    MD5: b6ac65c0c55b3cabd3d501aaa3b639c8
mikmod-devel-3.1.6-32.EL4.ppc.rpm
File outdated by:  RHSA-2010:0720
    MD5: b61f7624921a95a60d217b30513f8679
 
s390:
mikmod-3.1.6-32.EL4.s390.rpm
File outdated by:  RHSA-2010:0720
    MD5: 638419bd8668b782555a9ff6ebe2013e
mikmod-devel-3.1.6-32.EL4.s390.rpm
File outdated by:  RHSA-2010:0720
    MD5: 69f181c1aee41ba2169a202b9d2e5187
 
s390x:
mikmod-3.1.6-32.EL4.s390.rpm
File outdated by:  RHSA-2010:0720
    MD5: 638419bd8668b782555a9ff6ebe2013e
mikmod-3.1.6-32.EL4.s390x.rpm
File outdated by:  RHSA-2010:0720
    MD5: 32596b851069a2bdafcb8ea339e1460c
mikmod-devel-3.1.6-32.EL4.s390x.rpm
File outdated by:  RHSA-2010:0720
    MD5: e70152c88e13730d19b20d682440f593
 
x86_64:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-3.1.6-32.EL4.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: c6c8501d1224dcdaaabcc3ff85de07b0
mikmod-devel-3.1.6-32.EL4.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 7cab8526728b5a8acc0e99639689300c
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
mikmod-3.1.6-14.EL21.src.rpm     MD5: 3970786eda79db9cb1e296287b37b6ac
 
IA-32:
mikmod-3.1.6-14.EL21.i386.rpm     MD5: 8466e1bce1554356966133dc58a2dacf
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
mikmod-3.1.6-22.EL3.src.rpm
File outdated by:  RHSA-2010:0720
    MD5: ca592164c295c662169f59899b5d20ed
 
IA-32:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-devel-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 4f212188933bf38552074df16b177a10
 
IA-64:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-3.1.6-22.EL3.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 61cdfc9ac651ec6ac0cebb9b6ee21e5f
mikmod-devel-3.1.6-22.EL3.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 5ad42fbfc304dfbdc3730bbe312a5209
 
x86_64:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-3.1.6-22.EL3.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: b964adeb79a724b8246c6fbfc5ea15a0
mikmod-devel-3.1.6-22.EL3.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 27ea70c35b53d82c3f7614d0c47698ed
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
mikmod-3.1.6-32.EL4.src.rpm
File outdated by:  RHSA-2010:0720
    MD5: db1185414af6d6fe8fd74ee726db714e
 
IA-32:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-devel-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 74fb923f34913d78d51f09c4127ce7eb
 
IA-64:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-3.1.6-32.EL4.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 6ef2e377622084eef15242025f1a2e54
mikmod-devel-3.1.6-32.EL4.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 463452e2bf31d86d14ab7ae76d7c19de
 
x86_64:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-3.1.6-32.EL4.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: c6c8501d1224dcdaaabcc3ff85de07b0
mikmod-devel-3.1.6-32.EL4.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 7cab8526728b5a8acc0e99639689300c
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
mikmod-3.1.6-14.EL21.src.rpm     MD5: 3970786eda79db9cb1e296287b37b6ac
 
IA-32:
mikmod-3.1.6-14.EL21.i386.rpm     MD5: 8466e1bce1554356966133dc58a2dacf
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
mikmod-3.1.6-22.EL3.src.rpm
File outdated by:  RHSA-2010:0720
    MD5: ca592164c295c662169f59899b5d20ed
 
IA-32:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-devel-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 4f212188933bf38552074df16b177a10
 
IA-64:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-3.1.6-22.EL3.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 61cdfc9ac651ec6ac0cebb9b6ee21e5f
mikmod-devel-3.1.6-22.EL3.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 5ad42fbfc304dfbdc3730bbe312a5209
 
x86_64:
mikmod-3.1.6-22.EL3.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 2ad7f47a2cb94d9a93a92ed4bc62c702
mikmod-3.1.6-22.EL3.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: b964adeb79a724b8246c6fbfc5ea15a0
mikmod-devel-3.1.6-22.EL3.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 27ea70c35b53d82c3f7614d0c47698ed
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
mikmod-3.1.6-32.EL4.src.rpm
File outdated by:  RHSA-2010:0720
    MD5: db1185414af6d6fe8fd74ee726db714e
 
IA-32:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-devel-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 74fb923f34913d78d51f09c4127ce7eb
 
IA-64:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-3.1.6-32.EL4.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 6ef2e377622084eef15242025f1a2e54
mikmod-devel-3.1.6-32.EL4.ia64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 463452e2bf31d86d14ab7ae76d7c19de
 
x86_64:
mikmod-3.1.6-32.EL4.i386.rpm
File outdated by:  RHSA-2010:0720
    MD5: 28c57176420b3b899675b8f8d4240bd2
mikmod-3.1.6-32.EL4.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: c6c8501d1224dcdaaabcc3ff85de07b0
mikmod-devel-3.1.6-32.EL4.x86_64.rpm
File outdated by:  RHSA-2010:0720
    MD5: 7cab8526728b5a8acc0e99639689300c
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
mikmod-3.1.6-14.EL21.src.rpm     MD5: 3970786eda79db9cb1e296287b37b6ac
 
IA-64:
mikmod-3.1.6-14.EL21.ia64.rpm     MD5: b5213ec19799e26f9c6975e3a4ed2f62
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

159290 - CAN-2003-0427 mikmod flaw


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/