Google Site SearchFN Site Search FN Blog Login FN Blog Login
Site Navigation:
 
 

Fedora Update

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/
This update can be installed with Yum Update Agent; you can type 'yum update' command in the terminal.
This update can also be installed with the Red Hat Update Agent; you can launch the Red Hat Update Agent with the 'up2date' command in the terminal.

[SECURITY] Fedora Core 1 Update: pwlib-1.5.0-4

---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-078
2004-03-02
---------------------------------------------------------------------

Name        : pwlib
Version     : 1.5.0                      
Release     : 4                  
Summary     : Portable Windows Libary
Description :

PWLib is a cross-platform class library designed to support the OpenH323
project.  OpenH323 provides an implementation of the ITU H.323
teleconferencing protocol, used by packages such as Gnome Meeting.

---------------------------------------------------------------------
Update Information:

A test suite for the H.225 protocol (part of the H.323 family) provided
by the NISCC uncovered bugs in PWLib prior to version 1.6.0.  An
attacker could trigger these bugs by sending carefully crafted messages
to an application.  The effects of such an attack can vary depending on
the application, but would usually result in a Denial of Service. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0097 to this issue.

Users are advised to upgrade to the update packages, which contain
backported security fixes and are not vulnerable to these issues.

Red Hat would like to thank Craig Southeren of the OpenH323 project for
providing the fixes for these issues.

---------------------------------------------------------------------
* Tue Feb 17 2004 Alexander Larsson  1.5.0-4

- add ranges security fix

* Fri Feb 13 2004 Elliot Lee 

- rebuilt

---------------------------------------------------------------------