Home > Security > Advisories

Advisories

Mandriva Advisories

Package name gtkhtml
Date September 18th, 2003
Advisory ID MDKSA-2003:093
Affected versions 9.0, CS2.1
Synopsis Updated gtkhtml packages fix vulnerability

Problem Description

Alan Cox discovered that certain malformed messages could cause the
Evolution mail component to crash due to a null pointer dereference in
the GtkHTML library, versions prior to 1.1.0.

The updated package provides a patched version of GtkHTML; versions of
Mandrake Linux more recent than 9.0 do not require this fix as they
already come with version 1.1.0.

Updated Packages

Mandrakelinux 9.0

 8fff610cfe6d31ab32833a52a6937b5b  9.0/RPMS/libgtkhtml20-1.0.4-4.1.90mdk.i586.rpm
2e044e668ab66f1cbffbb09365494b7a  9.0/RPMS/libgtkhtml20-devel-1.0.4-4.1.90mdk.i586.rpm
ae52b73667079e1fa604717d87640258  9.0/RPMS/gtkhtml-1.0.4-4.1.90mdk.i586.rpm
02a15f57e85cc7d4be925304dec3dcfb  9.0/SRPMS/gtkhtml-1.0.4-4.1.90mdk.src.rpm

Corporate Server 2.1

 8fff610cfe6d31ab32833a52a6937b5b  corporate/2.1/RPMS/libgtkhtml20-1.0.4-4.1.90mdk.i586.rpm
2e044e668ab66f1cbffbb09365494b7a  corporate/2.1/RPMS/libgtkhtml20-devel-1.0.4-4.1.90mdk.i586.rpm
ae52b73667079e1fa604717d87640258  corporate/2.1/RPMS/gtkhtml-1.0.4-4.1.90mdk.i586.rpm
02a15f57e85cc7d4be925304dec3dcfb  corporate/2.1/SRPMS/gtkhtml-1.0.4-4.1.90mdk.src.rpm

Corporate Server 2.1/X86_64

 1f7a5c793e476bb75aca9a0cbfd4ce70  x86_64/corporate/2.1/RPMS/libgtkhtml20-1.0.4-4.1.90mdk.x86_64.rpm
f1ea6dac507cfb2dd8874cfd8f034484  x86_64/corporate/2.1/RPMS/libgtkhtml20-devel-1.0.4-4.1.90mdk.x86_64.rpm
073f8f4585ea46c5345d888b7b9c80ac  x86_64/corporate/2.1/RPMS/gtkhtml-1.0.4-4.1.90mdk.x86_64.rpm
02a15f57e85cc7d4be925304dec3dcfb  x86_64/corporate/2.1/SRPMS/gtkhtml-1.0.4-4.1.90mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0541

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.