Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2987 poppler security, bug fix, and enhancement update 8 August 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: poppler evince ocular Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 7 Red Hat Enterprise Linux WS/Desktop 7 Impact/Access: Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-9631 CVE-2019-9200 CVE-2019-7310 CVE-2018-20662 CVE-2018-20650 CVE-2018-20481 CVE-2018-19149 CVE-2018-19060 CVE-2018-19059 CVE-2018-19058 CVE-2018-18897 CVE-2018-16646 Reference: ESB-2019.2332 ESB-2019.1216 ESB-2018.3411.3 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:2022 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: poppler security, bug fix, and enhancement update Advisory ID: RHSA-2019:2022-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:2022 Issue date: 2019-08-06 CVE Names: CVE-2018-16646 CVE-2018-18897 CVE-2018-19058 CVE-2018-19059 CVE-2018-19060 CVE-2018-19149 CVE-2018-20481 CVE-2018-20650 CVE-2018-20662 CVE-2019-7310 CVE-2019-9200 CVE-2019-9631 ===================================================================== 1. Summary: An update for poppler, evince, and okular is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince or Okular. Security Fix(es): * poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc (CVE-2019-7310) * poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc (CVE-2019-9200) * poppler: infinite recursion in Parser::getObj function in Parser.cc (CVE-2018-16646) * poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc (CVE-2018-18897) * poppler: reachable abort in Object.h (CVE-2018-19058) * poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc (CVE-2018-19059) * poppler: pdfdetach utility does not validate save paths (CVE-2018-19060) * poppler: NULL pointer dereference in _poppler_attachment_new (CVE-2018-19149) * poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc (CVE-2018-20481) * poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc (CVE-2018-20650) * poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc (CVE-2018-20662) * poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc (CVE-2019-9631) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1378075 - Evince is not showing comments in document 1378961 - Error displaying PDF in Evince 1458037 - [RFE] okular should also display the FontName (after font path) 1541358 - [RFE] Evince does not read PDF file PrintScaling scaling tags 1626618 - CVE-2018-16646 poppler: infinite recursion in Parser::getObj function in Parser.cc 1639595 - [RFE] provide fontname for used fonts 1646546 - CVE-2018-18897 poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc 1649435 - CVE-2018-19058 poppler: reachable abort in Object.h 1649440 - CVE-2018-19059 poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc 1649450 - CVE-2018-19060 poppler: pdfdetach utility does not validate save paths 1649457 - CVE-2018-19149 poppler: NULL pointer dereference in _poppler_attachment_new 1658304 - Export PrintScaling preference 1665263 - CVE-2018-20650 poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc 1665266 - CVE-2018-20481 poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc 1665273 - CVE-2018-20662 poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc 1672419 - CVE-2019-7310 poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc 1683632 - CVE-2019-9200 poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc 1686802 - CVE-2019-9631 poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: evince-3.28.2-8.el7.src.rpm okular-4.10.5-7.el7.src.rpm poppler-0.26.5-38.el7.src.rpm x86_64: evince-3.28.2-8.el7.x86_64.rpm evince-debuginfo-3.28.2-8.el7.i686.rpm evince-debuginfo-3.28.2-8.el7.x86_64.rpm evince-dvi-3.28.2-8.el7.x86_64.rpm evince-libs-3.28.2-8.el7.i686.rpm evince-libs-3.28.2-8.el7.x86_64.rpm evince-nautilus-3.28.2-8.el7.x86_64.rpm okular-4.10.5-7.el7.x86_64.rpm okular-debuginfo-4.10.5-7.el7.i686.rpm okular-debuginfo-4.10.5-7.el7.x86_64.rpm okular-libs-4.10.5-7.el7.i686.rpm okular-libs-4.10.5-7.el7.x86_64.rpm okular-part-4.10.5-7.el7.x86_64.rpm poppler-0.26.5-38.el7.i686.rpm poppler-0.26.5-38.el7.x86_64.rpm poppler-debuginfo-0.26.5-38.el7.i686.rpm poppler-debuginfo-0.26.5-38.el7.x86_64.rpm poppler-glib-0.26.5-38.el7.i686.rpm poppler-glib-0.26.5-38.el7.x86_64.rpm poppler-qt-0.26.5-38.el7.i686.rpm poppler-qt-0.26.5-38.el7.x86_64.rpm poppler-utils-0.26.5-38.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: evince-browser-plugin-3.28.2-8.el7.x86_64.rpm evince-debuginfo-3.28.2-8.el7.i686.rpm evince-debuginfo-3.28.2-8.el7.x86_64.rpm evince-devel-3.28.2-8.el7.i686.rpm evince-devel-3.28.2-8.el7.x86_64.rpm okular-debuginfo-4.10.5-7.el7.i686.rpm okular-debuginfo-4.10.5-7.el7.x86_64.rpm okular-devel-4.10.5-7.el7.i686.rpm okular-devel-4.10.5-7.el7.x86_64.rpm poppler-cpp-0.26.5-38.el7.i686.rpm poppler-cpp-0.26.5-38.el7.x86_64.rpm poppler-cpp-devel-0.26.5-38.el7.i686.rpm poppler-cpp-devel-0.26.5-38.el7.x86_64.rpm poppler-debuginfo-0.26.5-38.el7.i686.rpm poppler-debuginfo-0.26.5-38.el7.x86_64.rpm poppler-demos-0.26.5-38.el7.x86_64.rpm poppler-devel-0.26.5-38.el7.i686.rpm poppler-devel-0.26.5-38.el7.x86_64.rpm poppler-glib-devel-0.26.5-38.el7.i686.rpm poppler-glib-devel-0.26.5-38.el7.x86_64.rpm poppler-qt-devel-0.26.5-38.el7.i686.rpm poppler-qt-devel-0.26.5-38.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: poppler-0.26.5-38.el7.src.rpm x86_64: poppler-0.26.5-38.el7.i686.rpm poppler-0.26.5-38.el7.x86_64.rpm poppler-debuginfo-0.26.5-38.el7.i686.rpm poppler-debuginfo-0.26.5-38.el7.x86_64.rpm poppler-qt-0.26.5-38.el7.i686.rpm poppler-qt-0.26.5-38.el7.x86_64.rpm poppler-utils-0.26.5-38.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: poppler-cpp-0.26.5-38.el7.i686.rpm poppler-cpp-0.26.5-38.el7.x86_64.rpm poppler-cpp-devel-0.26.5-38.el7.i686.rpm poppler-cpp-devel-0.26.5-38.el7.x86_64.rpm poppler-debuginfo-0.26.5-38.el7.i686.rpm poppler-debuginfo-0.26.5-38.el7.x86_64.rpm poppler-demos-0.26.5-38.el7.x86_64.rpm poppler-devel-0.26.5-38.el7.i686.rpm poppler-devel-0.26.5-38.el7.x86_64.rpm poppler-glib-0.26.5-38.el7.i686.rpm poppler-glib-0.26.5-38.el7.x86_64.rpm poppler-glib-devel-0.26.5-38.el7.i686.rpm poppler-glib-devel-0.26.5-38.el7.x86_64.rpm poppler-qt-devel-0.26.5-38.el7.i686.rpm poppler-qt-devel-0.26.5-38.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: evince-3.28.2-8.el7.src.rpm okular-4.10.5-7.el7.src.rpm poppler-0.26.5-38.el7.src.rpm ppc64: evince-3.28.2-8.el7.ppc64.rpm evince-debuginfo-3.28.2-8.el7.ppc.rpm evince-debuginfo-3.28.2-8.el7.ppc64.rpm evince-dvi-3.28.2-8.el7.ppc64.rpm evince-libs-3.28.2-8.el7.ppc.rpm evince-libs-3.28.2-8.el7.ppc64.rpm evince-nautilus-3.28.2-8.el7.ppc64.rpm poppler-0.26.5-38.el7.ppc.rpm poppler-0.26.5-38.el7.ppc64.rpm poppler-debuginfo-0.26.5-38.el7.ppc.rpm poppler-debuginfo-0.26.5-38.el7.ppc64.rpm poppler-glib-0.26.5-38.el7.ppc.rpm poppler-glib-0.26.5-38.el7.ppc64.rpm poppler-utils-0.26.5-38.el7.ppc64.rpm ppc64le: evince-3.28.2-8.el7.ppc64le.rpm evince-debuginfo-3.28.2-8.el7.ppc64le.rpm evince-dvi-3.28.2-8.el7.ppc64le.rpm evince-libs-3.28.2-8.el7.ppc64le.rpm evince-nautilus-3.28.2-8.el7.ppc64le.rpm okular-4.10.5-7.el7.ppc64le.rpm okular-debuginfo-4.10.5-7.el7.ppc64le.rpm okular-devel-4.10.5-7.el7.ppc64le.rpm okular-libs-4.10.5-7.el7.ppc64le.rpm okular-part-4.10.5-7.el7.ppc64le.rpm poppler-0.26.5-38.el7.ppc64le.rpm poppler-debuginfo-0.26.5-38.el7.ppc64le.rpm poppler-glib-0.26.5-38.el7.ppc64le.rpm poppler-qt-0.26.5-38.el7.ppc64le.rpm poppler-utils-0.26.5-38.el7.ppc64le.rpm s390x: evince-3.28.2-8.el7.s390x.rpm evince-debuginfo-3.28.2-8.el7.s390.rpm evince-debuginfo-3.28.2-8.el7.s390x.rpm evince-dvi-3.28.2-8.el7.s390x.rpm evince-libs-3.28.2-8.el7.s390.rpm evince-libs-3.28.2-8.el7.s390x.rpm evince-nautilus-3.28.2-8.el7.s390x.rpm poppler-0.26.5-38.el7.s390.rpm poppler-0.26.5-38.el7.s390x.rpm poppler-debuginfo-0.26.5-38.el7.s390.rpm poppler-debuginfo-0.26.5-38.el7.s390x.rpm poppler-glib-0.26.5-38.el7.s390.rpm poppler-glib-0.26.5-38.el7.s390x.rpm poppler-utils-0.26.5-38.el7.s390x.rpm x86_64: evince-3.28.2-8.el7.x86_64.rpm evince-debuginfo-3.28.2-8.el7.i686.rpm evince-debuginfo-3.28.2-8.el7.x86_64.rpm evince-dvi-3.28.2-8.el7.x86_64.rpm evince-libs-3.28.2-8.el7.i686.rpm evince-libs-3.28.2-8.el7.x86_64.rpm evince-nautilus-3.28.2-8.el7.x86_64.rpm okular-4.10.5-7.el7.x86_64.rpm okular-debuginfo-4.10.5-7.el7.i686.rpm okular-debuginfo-4.10.5-7.el7.x86_64.rpm okular-devel-4.10.5-7.el7.i686.rpm okular-devel-4.10.5-7.el7.x86_64.rpm okular-libs-4.10.5-7.el7.i686.rpm okular-libs-4.10.5-7.el7.x86_64.rpm okular-part-4.10.5-7.el7.x86_64.rpm poppler-0.26.5-38.el7.i686.rpm poppler-0.26.5-38.el7.x86_64.rpm poppler-debuginfo-0.26.5-38.el7.i686.rpm poppler-debuginfo-0.26.5-38.el7.x86_64.rpm poppler-glib-0.26.5-38.el7.i686.rpm poppler-glib-0.26.5-38.el7.x86_64.rpm poppler-qt-0.26.5-38.el7.i686.rpm poppler-qt-0.26.5-38.el7.x86_64.rpm poppler-utils-0.26.5-38.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: evince-browser-plugin-3.28.2-8.el7.ppc64.rpm evince-debuginfo-3.28.2-8.el7.ppc.rpm evince-debuginfo-3.28.2-8.el7.ppc64.rpm evince-devel-3.28.2-8.el7.ppc.rpm evince-devel-3.28.2-8.el7.ppc64.rpm poppler-cpp-0.26.5-38.el7.ppc.rpm poppler-cpp-0.26.5-38.el7.ppc64.rpm poppler-cpp-devel-0.26.5-38.el7.ppc.rpm poppler-cpp-devel-0.26.5-38.el7.ppc64.rpm poppler-debuginfo-0.26.5-38.el7.ppc.rpm poppler-debuginfo-0.26.5-38.el7.ppc64.rpm poppler-demos-0.26.5-38.el7.ppc64.rpm poppler-devel-0.26.5-38.el7.ppc.rpm poppler-devel-0.26.5-38.el7.ppc64.rpm poppler-glib-devel-0.26.5-38.el7.ppc.rpm poppler-glib-devel-0.26.5-38.el7.ppc64.rpm poppler-qt-0.26.5-38.el7.ppc.rpm poppler-qt-0.26.5-38.el7.ppc64.rpm poppler-qt-devel-0.26.5-38.el7.ppc.rpm poppler-qt-devel-0.26.5-38.el7.ppc64.rpm ppc64le: evince-browser-plugin-3.28.2-8.el7.ppc64le.rpm evince-debuginfo-3.28.2-8.el7.ppc64le.rpm evince-devel-3.28.2-8.el7.ppc64le.rpm poppler-cpp-0.26.5-38.el7.ppc64le.rpm poppler-cpp-devel-0.26.5-38.el7.ppc64le.rpm poppler-debuginfo-0.26.5-38.el7.ppc64le.rpm poppler-demos-0.26.5-38.el7.ppc64le.rpm poppler-devel-0.26.5-38.el7.ppc64le.rpm poppler-glib-devel-0.26.5-38.el7.ppc64le.rpm poppler-qt-devel-0.26.5-38.el7.ppc64le.rpm s390x: evince-browser-plugin-3.28.2-8.el7.s390x.rpm evince-debuginfo-3.28.2-8.el7.s390.rpm evince-debuginfo-3.28.2-8.el7.s390x.rpm evince-devel-3.28.2-8.el7.s390.rpm evince-devel-3.28.2-8.el7.s390x.rpm poppler-cpp-0.26.5-38.el7.s390.rpm poppler-cpp-0.26.5-38.el7.s390x.rpm poppler-cpp-devel-0.26.5-38.el7.s390.rpm poppler-cpp-devel-0.26.5-38.el7.s390x.rpm poppler-debuginfo-0.26.5-38.el7.s390.rpm poppler-debuginfo-0.26.5-38.el7.s390x.rpm poppler-demos-0.26.5-38.el7.s390x.rpm poppler-devel-0.26.5-38.el7.s390.rpm poppler-devel-0.26.5-38.el7.s390x.rpm poppler-glib-devel-0.26.5-38.el7.s390.rpm poppler-glib-devel-0.26.5-38.el7.s390x.rpm poppler-qt-0.26.5-38.el7.s390.rpm poppler-qt-0.26.5-38.el7.s390x.rpm poppler-qt-devel-0.26.5-38.el7.s390.rpm poppler-qt-devel-0.26.5-38.el7.s390x.rpm x86_64: evince-browser-plugin-3.28.2-8.el7.x86_64.rpm evince-debuginfo-3.28.2-8.el7.i686.rpm evince-debuginfo-3.28.2-8.el7.x86_64.rpm evince-devel-3.28.2-8.el7.i686.rpm evince-devel-3.28.2-8.el7.x86_64.rpm poppler-cpp-0.26.5-38.el7.i686.rpm poppler-cpp-0.26.5-38.el7.x86_64.rpm poppler-cpp-devel-0.26.5-38.el7.i686.rpm poppler-cpp-devel-0.26.5-38.el7.x86_64.rpm poppler-debuginfo-0.26.5-38.el7.i686.rpm poppler-debuginfo-0.26.5-38.el7.x86_64.rpm poppler-demos-0.26.5-38.el7.x86_64.rpm poppler-devel-0.26.5-38.el7.i686.rpm poppler-devel-0.26.5-38.el7.x86_64.rpm poppler-glib-devel-0.26.5-38.el7.i686.rpm poppler-glib-devel-0.26.5-38.el7.x86_64.rpm poppler-qt-devel-0.26.5-38.el7.i686.rpm poppler-qt-devel-0.26.5-38.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: evince-3.28.2-8.el7.src.rpm okular-4.10.5-7.el7.src.rpm poppler-0.26.5-38.el7.src.rpm x86_64: evince-3.28.2-8.el7.x86_64.rpm evince-debuginfo-3.28.2-8.el7.i686.rpm evince-debuginfo-3.28.2-8.el7.x86_64.rpm evince-dvi-3.28.2-8.el7.x86_64.rpm evince-libs-3.28.2-8.el7.i686.rpm evince-libs-3.28.2-8.el7.x86_64.rpm evince-nautilus-3.28.2-8.el7.x86_64.rpm okular-4.10.5-7.el7.x86_64.rpm okular-debuginfo-4.10.5-7.el7.i686.rpm okular-debuginfo-4.10.5-7.el7.x86_64.rpm okular-devel-4.10.5-7.el7.i686.rpm okular-devel-4.10.5-7.el7.x86_64.rpm okular-libs-4.10.5-7.el7.i686.rpm okular-libs-4.10.5-7.el7.x86_64.rpm okular-part-4.10.5-7.el7.x86_64.rpm poppler-0.26.5-38.el7.i686.rpm poppler-0.26.5-38.el7.x86_64.rpm poppler-debuginfo-0.26.5-38.el7.i686.rpm poppler-debuginfo-0.26.5-38.el7.x86_64.rpm poppler-glib-0.26.5-38.el7.i686.rpm poppler-glib-0.26.5-38.el7.x86_64.rpm poppler-qt-0.26.5-38.el7.i686.rpm poppler-qt-0.26.5-38.el7.x86_64.rpm poppler-utils-0.26.5-38.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: evince-browser-plugin-3.28.2-8.el7.x86_64.rpm evince-debuginfo-3.28.2-8.el7.i686.rpm evince-debuginfo-3.28.2-8.el7.x86_64.rpm evince-devel-3.28.2-8.el7.i686.rpm evince-devel-3.28.2-8.el7.x86_64.rpm poppler-cpp-0.26.5-38.el7.i686.rpm poppler-cpp-0.26.5-38.el7.x86_64.rpm poppler-cpp-devel-0.26.5-38.el7.i686.rpm poppler-cpp-devel-0.26.5-38.el7.x86_64.rpm poppler-debuginfo-0.26.5-38.el7.i686.rpm poppler-debuginfo-0.26.5-38.el7.x86_64.rpm poppler-demos-0.26.5-38.el7.x86_64.rpm poppler-devel-0.26.5-38.el7.i686.rpm poppler-devel-0.26.5-38.el7.x86_64.rpm poppler-glib-devel-0.26.5-38.el7.i686.rpm poppler-glib-devel-0.26.5-38.el7.x86_64.rpm poppler-qt-devel-0.26.5-38.el7.i686.rpm poppler-qt-devel-0.26.5-38.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-16646 https://access.redhat.com/security/cve/CVE-2018-18897 https://access.redhat.com/security/cve/CVE-2018-19058 https://access.redhat.com/security/cve/CVE-2018-19059 https://access.redhat.com/security/cve/CVE-2018-19060 https://access.redhat.com/security/cve/CVE-2018-19149 https://access.redhat.com/security/cve/CVE-2018-20481 https://access.redhat.com/security/cve/CVE-2018-20650 https://access.redhat.com/security/cve/CVE-2018-20662 https://access.redhat.com/security/cve/CVE-2019-7310 https://access.redhat.com/security/cve/CVE-2019-9200 https://access.redhat.com/security/cve/CVE-2019-9631 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXUl3wdzjgjWX9erEAQgg1hAAh01I6tdUAEDwdAqwL89rrmrytalR2iq6 ZsCwpZxkzB7EcDEK10p4+CzFifwt4S6KZ95cQSximHKWkiejfLiSX4xgn4RVxgoc 2PiYdbgwBhgwB5Xo1IXvdE4FDjL1SUWnN7OgBrWDsOFp6QW4s9SOrYLlOrEFnp+R 0Q+Xc0f/88S3FA4wyMsGknfANgaHU89kqvvD1s+VU+azu5TYo25SXcHrNwyX3U8t t4lEOEOEnPvAvGBIUW1TAUu5MTkhQLULXAbT5JpZKQoFTkQrf+C5hQ6yjSCtmQ0p +20sc+8oG9ZiKB08ijyVZOMV2cNgiPOY35pDWrLHE0aSjtvI7e4SN6KYurPJzfoP HpTqilPUeFHyO3bviG9zxreo6JjnIQEuu9JjjTtxe6rkDnmVzCJ/vD0Z+6dWbr5t WK1tfH8CwQzOiiEHY7H7LCtjGu8iBJ7QSZhOIRGqZowjbP05yF+Q3CGJdebM1Qf/ WWPx9350lg179pFsEaWN4AYvKznpUG2fiSnazB7WLIWdR/oWnffyk5AXqUmklMhx XdOQcu4CzeKkWsQRe15Fdt7FnkozC3jG4+ftmtfcttQ6emLgimCjY1nycN3i0Dxc QwhYH7vuEEnVO4GTp05BW1wV0fHsRajkObNTDY5jxOiokdDMYnIWvPlvoLqoZBfY /Upwouf17QQ= =aAGV - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXUt1oWaOgq3Tt24GAQjGfxAA2t70QpSiWEfRwZjqo2h0cvI9LQElZ4ph AvhsqfuhSn5qSmW0Rw2aIEZaL2OPLisUokWyyBO2ySJqwdYRYWFFspEChj2GbjLE TJ03lWT034hfFqF9cUbB2fDl7+N4Tseafs3DUoT9v/cabV4bKDkNmyIukFnhySiL M2sRER74peIZy5dlro76cZTt7BK9nJxYNXOLvii+2Q7SyN8vHIUKSOuVM9z7W6HH y28RJ4SJkn5hAHgeU7ONCmfZdugjw6zU34ilE3h3bjqHrjT0OtXWJjiiAc7hmznZ cCJ66gZ3q3n4+sv1YVFUSxXMaMQ9jzQFSuuvaUd5W8z25r1LHu8upNk8UNj7bYzu 8ASszE85BWDBunPAWww9Dhm2lU1Ua7/KHDCpeo/WdzqPVG3ipxnzWTh96GomnGuk Gs6fXhQwODrh9Uead2Jx4NbnCuyLxu68k34p8+EIWYxUWyoZSoWzFa6PMaabfSAP X54/Kj6LxCt72T82h0wxRt575ntRT09x6mbZUwnIBbU3eUxlT8w8cWRC8J0HhCqk hMwR7uVRRlU3fFPGid7xF4QYSV5hxrv1w6olXNbQo2QvXvIh3nNkrv63Msnnhu50 +vQdWsJ+lODo/jV4zlJNpVdGTGSr7KsZ+zGMrXd42MZT7oBliP1r+8z45jkqRRWa f3E9ObjimJI= =NTT2 -----END PGP SIGNATURE-----