aspell
11
An off-by-one overflow flaw was found in the way apr-util processed a variable list of arguments. An
attacker could provide a specially-crafted string as input for the formatted output conversion routine,
which could, on big-endian platforms, potentially lead to the disclosure of sensitive information or a
denial of service (application crash). (
CVE-2009-1956
94
)
Note: The CVE-2009-1956 flaw only affects big-endian platforms, such as the IBM S/390 and
PowerPC. It does not affect users using the apr-util package on little-endian platforms, due to their
different organization of byte ordering used to represent particular data.
A denial of service flaw was found in the apr-util Extensible Markup Language (XML) parser. A
remote attacker could create a specially-crafted XML document that would cause excessive memory
consumption when processed by the XML decoding engine. (
CVE-2009-1955
95
)
A heap-based underwrite flaw was found in the way apr-util created compiled forms of particular
search patterns. An attacker could formulate a specially-crafted search keyword, that would
overwrite arbitrary heap memory locations when processed by the pattern preparation engine.
(
CVE-2009-0023
96
)
All apr-util users should upgrade to these updated packages, which contain backported patches to
correct these issues. Applications using the Apache Portable Runtime library, such as httpd, must be
restarted for this update to take effect.
1.10. aspell
1.10.1. RHBA-2009:1070: bug fix update
Note
This update has already been released (prior to the GA of this release) as FASTRACK
errata
RHBA-2009:1070
97
An updated aspell-nl package that fixes a bug is now available.
Aspel-nl provides the word list/dictionaries for Dutch language.
This updated aspell-nl package fixes the following bug:
• the previous aspell-nl update provided also an empty aspell-nl-debuginfo package. The dictionary
packages for Aspell do not require debuginfo packages; this update therefore removes the
extraneous aspell-nl-debuginfo package. (
BZ#500540
98
)
All Dutch language Aspell users are advised to upgrade to this updated package, which resolves this
issue.
94
https://www.redhat.com/security/data/cve/CVE-2009-1956.html
95
https://www.redhat.com/security/data/cve/CVE-2009-1955.html
96
https://www.redhat.com/security/data/cve/CVE-2009-0023.html
Summary of Contents for ENTERPRISE 5.4 RELEASE NOTES
Page 1: ...Red Hat Enterprise Linux 5 4 Technical Notes Every Change to Every Package ...
Page 18: ...xviii ...
Page 306: ...288 ...
Page 464: ...446 ...
Page 466: ...448 ...