TITLE: Fedora update for libungif SECUNIA ADVISORY ID: SA17438 VERIFY ADVISORY: http://secunia.com/advisories/17438/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/ Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued an update for libungif. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. For more information: SA17436 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 59b249a82af75aac014f5f59feb9cc90 SRPMS/libungif-4.1.3-1.fc3.2.src.rpm 957e1e48dea2fd1c00002300383ea0ff x86_64/libungif-4.1.3-1.fc3.2.x86_64.rpm 22e85959823663ab61a3051c647ee4db x86_64/libungif-devel-4.1.3-1.fc3.2.x86_64.rpm 294a1239db36f6ed2a19d81ce231cccf x86_64/libungif-progs-4.1.3-1.fc3.2.x86_64.rpm 52e4a7e9202399f70a70c9acd8f91ebf x86_64/debug/libungif-debuginfo-4.1.3-1.fc3.2.x86_64.rpm fb89bd175856a46addbba3ccdd425311 x86_64/libungif-4.1.3-1.fc3.2.i386.rpm fb89bd175856a46addbba3ccdd425311 i386/libungif-4.1.3-1.fc3.2.i386.rpm ca85f8bee06885cc740ac3525892059b i386/libungif-devel-4.1.3-1.fc3.2.i386.rpm afae5a45ffcaa93b91f4b360abe30c93 i386/libungif-progs-4.1.3-1.fc3.2.i386.rpm 0ab5bdd2c1c837c0a3e78f5465c3edb5 i386/debug/libungif-debuginfo-4.1.3-1.fc3.2.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ ab573bcf8a97ff41f69272d807eacc76 SRPMS/libungif-4.1.3-3.fc4.2.src.rpm 97d138079ce2fe9edf048886576530e6 ppc/libungif-4.1.3-3.fc4.2.ppc.rpm 3dab5f6447ebd94f02aa7324c340e343 ppc/libungif-devel-4.1.3-3.fc4.2.ppc.rpm f27bb1917944b4f85a1d90ad8a66ef10 ppc/libungif-progs-4.1.3-3.fc4.2.ppc.rpm 56ff34c7206080080edafc5642c9f609 ppc/debug/libungif-debuginfo-4.1.3-3.fc4.2.ppc.rpm e41eff33e21b0be593a718492d81c0a4 ppc/libungif-4.1.3-3.fc4.2.ppc64.rpm ec5c0639efa501a8629150bed747754f x86_64/libungif-4.1.3-3.fc4.2.x86_64.rpm f5bf4717befb8fc239ef91ded1f9a65e x86_64/libungif-devel-4.1.3-3.fc4.2.x86_64.rpm ab42694f55e4674a802be3d2f8a6027e x86_64/libungif-progs-4.1.3-3.fc4.2.x86_64.rpm 3c306e3109f6fb56852832eb23315f7b x86_64/debug/libungif-debuginfo-4.1.3-3.fc4.2.x86_64.rpm a484b2fab31810d710154accbe2d6ced x86_64/libungif-4.1.3-3.fc4.2.i386.rpm a484b2fab31810d710154accbe2d6ced i386/libungif-4.1.3-3.fc4.2.i386.rpm f25162d9e6f157c63802ca645251e070 i386/libungif-devel-4.1.3-3.fc4.2.i386.rpm 568e4e6af237d5c414bad4bc7053abec i386/libungif-progs-4.1.3-3.fc4.2.i386.rpm 56ea24dfa869521a9955901f2a3ccb29 i386/debug/libungif-debuginfo-4.1.3-3.fc4.2.i386.rpm OTHER REFERENCES: SA17436: http://secunia.com/advisories/17436/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------