Advisories
Mandriva Advisories
|
![]() |
Problem Description |
zen-parse discovered an exploitable buffer overflow in groff's
preprocessor. If groff is invoked using the LPRng printing system, an
attacker can gain rights as the "lp" user. Likewise, this may be
remotely exploitable if lpd is running and remotely accessible and the
attacker knows the name of the printer and it's spool file.
Updated Packages |
Mandrakelinux 7.2
56d6ca492d028660e7358e2af1236e5f 7.2/RPMS/groff-1.16.1-7.2mdk.i586.rpm 1aba691d52d4954e6c4ec330577509e3 7.2/RPMS/groff-for-man-1.16.1-7.2mdk.i586.rpm 2974b9435ff20c60d9db90e3e7942973 7.2/RPMS/groff-gxditview-1.16.1-7.2mdk.i586.rpm d5ad075b6be3e520dcbb101c6e368955 7.2/RPMS/groff-perl-1.16.1-7.2mdk.i586.rpm 57ac693f4a507a9a9869281fa5e868c0 7.2/SRPMS/groff-1.16.1-7.2mdk.src.rpm
Mandrakelinux 8.0
69b21ea6f7811e0180b81f5e6e763bff 8.0/RPMS/groff-1.16.1-7.2mdk.i586.rpm c77033dc0048071b21085bdbd1f899ef 8.0/RPMS/groff-for-man-1.16.1-7.2mdk.i586.rpm 33f5822612914a8b9dc05ce939e3ebd0 8.0/RPMS/groff-gxditview-1.16.1-7.2mdk.i586.rpm c9f933dfbd2c5b5e312919698621a682 8.0/RPMS/groff-perl-1.16.1-7.2mdk.i586.rpm 57ac693f4a507a9a9869281fa5e868c0 8.0/SRPMS/groff-1.16.1-7.2mdk.src.rpm
Mandrakelinux 8.0/PPC
3f8cde1fde265be24d7a8da36c3e5b8b ppc/8.0/RPMS/groff-1.16.1-7.2mdk.ppc.rpm 952284ae71a894a7325b8fe6cabc331b ppc/8.0/RPMS/groff-for-man-1.16.1-7.2mdk.ppc.rpm b0f13231c69dd6c50f4da9a6e2f06d2d ppc/8.0/RPMS/groff-gxditview-1.16.1-7.2mdk.ppc.rpm f601ba4f903212a67c32f71d8f1e757d ppc/8.0/RPMS/groff-perl-1.16.1-7.2mdk.ppc.rpm 57ac693f4a507a9a9869281fa5e868c0 ppc/8.0/SRPMS/groff-1.16.1-7.2mdk.src.rpm
Mandrakelinux 8.1
6cc7c8c5936c4a15dca519219c4f078a 8.1/RPMS/groff-1.17.2-3.3mdk.i586.rpm c8a8ae0e7848c60b922c8d8326afe01e 8.1/RPMS/groff-for-man-1.17.2-3.3mdk.i586.rpm 23dd6a64b3007bcd6bc3f807f5373462 8.1/RPMS/groff-gxditview-1.17.2-3.3mdk.i586.rpm a92f47ab6a6d3a46509f3dd0d76ea9e3 8.1/RPMS/groff-perl-1.17.2-3.3mdk.i586.rpm fdae065cd64b4527919d44dbcf126497 8.1/SRPMS/groff-1.17.2-3.3mdk.src.rpm
Mandrakelinux 8.1/IA64
3f14c6b7f03bd22b9224e01a49208db2 ia64/8.1/RPMS/groff-1.17.2-3.3mdk.ia64.rpm a1bf708aba7524d62b37d188fd9b28e3 ia64/8.1/RPMS/groff-for-man-1.17.2-3.3mdk.ia64.rpm e0a4732b4af728fcf3da51df15193490 ia64/8.1/RPMS/groff-gxditview-1.17.2-3.3mdk.ia64.rpm efdc1cc2cb3feabbc13b211c62d215d6 ia64/8.1/RPMS/groff-perl-1.17.2-3.3mdk.ia64.rpm fdae065cd64b4527919d44dbcf126497 ia64/8.1/SRPMS/groff-1.17.2-3.3mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0003
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.