Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Errata des produits Red Hat RHSA-2006:0727 - Security Advisory
Publié :
2006-11-08
Mis à jour :
2006-11-08

RHSA-2006:0727 - Security Advisory

  • Aperçu général
  • Paquets mis à jour

Synopsis

Moderate: texinfo security update

Type / Sévérité

Security Advisory: Moderate

Analyse des correctifs dans Red Hat Insights

Identifiez et remédiez aux systèmes concernés par cette alerte.

Voir les systèmes concernés

Sujet

New Texinfo packages that fix various security vulnerabilities are now
available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

Texinfo is a documentation system that can produce both online information
and printed output from a single source file.

A buffer overflow flaw was found in Texinfo's texindex command. An attacker
could construct a carefully crafted Texinfo file that could cause texindex
to crash or possibly execute arbitrary code when opened. (CVE-2006-4810)

A flaw was found in the way Texinfo's texindex command creates temporary
files. A local user could leverage this flaw to overwrite files the user
executing texindex has write access to. (CVE-2005-3011)

Users of Texinfo should upgrade to these updated packages which contain
backported patches and are not vulnerable to these issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Produits concernés

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server 3 x86_64
  • Red Hat Enterprise Linux Server 3 ia64
  • Red Hat Enterprise Linux Server 3 i386
  • Red Hat Enterprise Linux Server 2 ia64
  • Red Hat Enterprise Linux Server 2 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Workstation 3 x86_64
  • Red Hat Enterprise Linux Workstation 3 ia64
  • Red Hat Enterprise Linux Workstation 3 i386
  • Red Hat Enterprise Linux Workstation 2 ia64
  • Red Hat Enterprise Linux Workstation 2 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux Desktop 3 x86_64
  • Red Hat Enterprise Linux Desktop 3 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems 3 s390x
  • Red Hat Enterprise Linux for IBM z Systems 3 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian 3 ppc

Correctifs

  • BZ - 169583 - CVE-2005-3011 texindex insecure temporary file usage
  • BZ - 170743 - CVE-2005-3011 texindex insecure temporary file usage
  • BZ - 170744 - CVE-2005-3011 texindex insecure temporary file usage
  • BZ - 211484 - CVE-2006-4810 texindex buffer overflow

CVE

  • CVE-2005-3011
  • CVE-2006-4810

Références

  • http://www.redhat.com/security/updates/classification/#moderate
Remarque: Il existe peut-être des versions plus récentes de ces paquets. Cliquer sur un nom de paquet pour obtenir plus de détails.

Red Hat Enterprise Linux Server 4

SRPM
x86_64
info-4.7-5.el4.2.x86_64.rpm SHA-256: b7cb4a0bb0855742781328da14224ceec28a95e70490ba543895e0a1e55a77eb
info-4.7-5.el4.2.x86_64.rpm SHA-256: b7cb4a0bb0855742781328da14224ceec28a95e70490ba543895e0a1e55a77eb
texinfo-4.7-5.el4.2.x86_64.rpm SHA-256: c7146fc54591401a548abb15c11d0b1bbcb0002c51901d138deb2f8446ed3ef6
texinfo-4.7-5.el4.2.x86_64.rpm SHA-256: c7146fc54591401a548abb15c11d0b1bbcb0002c51901d138deb2f8446ed3ef6
ia64
info-4.7-5.el4.2.ia64.rpm SHA-256: 545459ac8693a7a61848eaeadf9c4ebcb2585e008e4b51fa8130c825bed8a706
info-4.7-5.el4.2.ia64.rpm SHA-256: 545459ac8693a7a61848eaeadf9c4ebcb2585e008e4b51fa8130c825bed8a706
texinfo-4.7-5.el4.2.ia64.rpm SHA-256: 6d598f22c52c095186e07ca7e5530c16841f6224f8bb863f7e13fa587c8092c0
texinfo-4.7-5.el4.2.ia64.rpm SHA-256: 6d598f22c52c095186e07ca7e5530c16841f6224f8bb863f7e13fa587c8092c0
i386
info-4.7-5.el4.2.i386.rpm SHA-256: d80cc9b2e1c5f04ee535d63a2120fdc17839d10a495d835c0a4f06a56e360d33
info-4.7-5.el4.2.i386.rpm SHA-256: d80cc9b2e1c5f04ee535d63a2120fdc17839d10a495d835c0a4f06a56e360d33
texinfo-4.7-5.el4.2.i386.rpm SHA-256: 20ea6381d84d83928fc21e08abd2c9932959423eb21e97db83f4dfcf0305dfec
texinfo-4.7-5.el4.2.i386.rpm SHA-256: 20ea6381d84d83928fc21e08abd2c9932959423eb21e97db83f4dfcf0305dfec

Red Hat Enterprise Linux Server 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server 2

SRPM
ia64
i386

Red Hat Enterprise Linux Workstation 4

SRPM
x86_64
info-4.7-5.el4.2.x86_64.rpm SHA-256: b7cb4a0bb0855742781328da14224ceec28a95e70490ba543895e0a1e55a77eb
texinfo-4.7-5.el4.2.x86_64.rpm SHA-256: c7146fc54591401a548abb15c11d0b1bbcb0002c51901d138deb2f8446ed3ef6
ia64
info-4.7-5.el4.2.ia64.rpm SHA-256: 545459ac8693a7a61848eaeadf9c4ebcb2585e008e4b51fa8130c825bed8a706
texinfo-4.7-5.el4.2.ia64.rpm SHA-256: 6d598f22c52c095186e07ca7e5530c16841f6224f8bb863f7e13fa587c8092c0
i386
info-4.7-5.el4.2.i386.rpm SHA-256: d80cc9b2e1c5f04ee535d63a2120fdc17839d10a495d835c0a4f06a56e360d33
texinfo-4.7-5.el4.2.i386.rpm SHA-256: 20ea6381d84d83928fc21e08abd2c9932959423eb21e97db83f4dfcf0305dfec

Red Hat Enterprise Linux Workstation 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 2

SRPM
ia64
i386

Red Hat Enterprise Linux Desktop 4

SRPM
x86_64
info-4.7-5.el4.2.x86_64.rpm SHA-256: b7cb4a0bb0855742781328da14224ceec28a95e70490ba543895e0a1e55a77eb
texinfo-4.7-5.el4.2.x86_64.rpm SHA-256: c7146fc54591401a548abb15c11d0b1bbcb0002c51901d138deb2f8446ed3ef6
i386
info-4.7-5.el4.2.i386.rpm SHA-256: d80cc9b2e1c5f04ee535d63a2120fdc17839d10a495d835c0a4f06a56e360d33
texinfo-4.7-5.el4.2.i386.rpm SHA-256: 20ea6381d84d83928fc21e08abd2c9932959423eb21e97db83f4dfcf0305dfec

Red Hat Enterprise Linux Desktop 3

SRPM
x86_64
i386

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
s390x
info-4.7-5.el4.2.s390x.rpm SHA-256: e3721d0bc5a4c147766a9a9aa5de2c7739e726c614b3ab0ee157edeea3642480
texinfo-4.7-5.el4.2.s390x.rpm SHA-256: 30889318a369c32e93bb6274a42a3cf3202168e50a717bb950fe93654b17f364
s390
info-4.7-5.el4.2.s390.rpm SHA-256: b718d2067f45488e34308ed493cf67787378db8d8aea4852451212b0308fc2e0
texinfo-4.7-5.el4.2.s390.rpm SHA-256: ac2adbdefa26eaf0c8e2944ff52ba2d24ba78eadf89cdac4847fb0d71f5a5115

Red Hat Enterprise Linux for IBM z Systems 3

SRPM
s390x
s390

Red Hat Enterprise Linux for Power, big endian 4

SRPM
ppc
info-4.7-5.el4.2.ppc.rpm SHA-256: 8875d0f650f8ff9e4618d513b4ed51e6503a82c2c96bfff3da8201f4803673d6
texinfo-4.7-5.el4.2.ppc.rpm SHA-256: d1b9472493a9f8e6964b79978d33c74e147e03e3655e0a926992fdccb9d988a2

Red Hat Enterprise Linux for Power, big endian 3

SRPM
ppc

Le contact Red Hat Security est secalert@redhat.com. Plus d'infos contact à https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility