Skip to navigation

Security Advisory Moderate: opal security update

Advisory: RHSA-2007:0957-3
Type: Security Advisory
Severity: Moderate
Issued on: 2007-10-08
Last updated on: 2007-10-08
Affected Products: RHEL Desktop Workstation (v. 5 client)
RHEL Optional Productivity Applications (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2007-4924

Details

Updated opal packages that fix a security issue are now available for Red
Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Open Phone Abstraction Library (opal) is implementation of various
telephony and video communication protocols for use over packet based
networks.

In Red Hat Enterprise Linux 5, the Ekiga application uses opal.

A flaw was discovered in the way opal handled certain Session Initiation
Protocol (SIP) packets. An attacker could use this flaw to crash an
application, such as Ekiga, which is linked with opal. (CVE-2007-4924)

Users should upgrade to these updated opal packages which contain a
backported patch to correct this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
opal-2.2.2-1.1.0.1.src.rpm     MD5: e8f4df804ac6245a4e41262f847b66da
 
IA-32:
opal-devel-2.2.2-1.1.0.1.i386.rpm     MD5: 46f1516b61bf9ac4a2078141fe520c63
 
x86_64:
opal-devel-2.2.2-1.1.0.1.x86_64.rpm     MD5: 0610e0dbfb007c36b071032cba0a3382
 
RHEL Optional Productivity Applications (v. 5 server)

SRPMS:
opal-2.2.2-1.1.0.1.src.rpm     MD5: e8f4df804ac6245a4e41262f847b66da
 
IA-32:
opal-2.2.2-1.1.0.1.i386.rpm     MD5: c15683ea9ee48593ccd10d86e5261594
opal-devel-2.2.2-1.1.0.1.i386.rpm     MD5: 46f1516b61bf9ac4a2078141fe520c63
 
x86_64:
opal-2.2.2-1.1.0.1.x86_64.rpm     MD5: 6eade6ae26711964dd706eef11e200b5
opal-devel-2.2.2-1.1.0.1.x86_64.rpm     MD5: 0610e0dbfb007c36b071032cba0a3382
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
opal-2.2.2-1.1.0.1.src.rpm     MD5: e8f4df804ac6245a4e41262f847b66da
 
IA-32:
opal-2.2.2-1.1.0.1.i386.rpm     MD5: c15683ea9ee48593ccd10d86e5261594
 
x86_64:
opal-2.2.2-1.1.0.1.x86_64.rpm     MD5: 6eade6ae26711964dd706eef11e200b5
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

296371 - CVE-2007-4924 ekiga remote crash caused by insufficient input validation


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/