-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                qt3/qt3-non-mt/qt3-32bit/qt3-static
        Announcement-ID:        SUSE-SA:2004:027
        Date:                   Thursday, Aug 19th 2004 15:00 MEST
        Affected products:      8.1, 8.2, 9.0, 9.1
                                SUSE Linux Database Server,
                                SUSE eMail Server III, 3.1
                                SUSE Linux Enterprise Server 8, 9
                                SUSE Linux Firewall on CD/Admin host
                                SUSE Linux Connectivity Server
                                SUSE Linux Office Server
        Vulnerability Type:     remote system compromise
        Severity (1-10):        7
        SUSE default package:   yes
        Cross References:       CAN-2004-0691
                                CAN-2004-0692
                                CAN-2004-0693

    Content of this advisory:
        1) security vulnerability resolved:
             - buffer overflow in image handling code
           problem description
        2) solution/workaround
        3) special instructions and notes
        4) package location and checksums
        5) pending vulnerabilities, solutions, workarounds:
            - opera
            - acroread
        6) standard appendix (further information)

______________________________________________________________________________

1) problem description, brief discussion

    The QT-library is an environment for GUI-programming and is used in
    various well-known projects, like KDE.

    Chris Evans found a heap overflow in the BMP image format parser
    (CAN-2004-0691) which can probably be abused by remote attackers to
    execute arbitrary code with the privileges of the user using a
    malformed image as input for a vulnerable QT-based application.
    Additionally a NULL dereference in the GIF parser (CAN-2004-0693)
    was found.
    This lead to more research by other people and revealed another NULL
    dereference in the XPM parser (CAN-2004-0692) found by Marcus Meissner,
    SuSE Security-Team.
    The last two bugs can be used to trigger a remote denial-of-service
    attack against QT-based applications.


2) solution/workaround

    A temporary workaround for this issue is not known.


3) special instructions and notes

    After applying the update make sure all QT-based applications are
    restarted. It would be best to re-login if you use KDE.


4) package location and checksums

    Please download the update package for your distribution and verify its
    integrity by the methods listed in section 3) of this announcement.
    Then, install the package using the command "rpm -Fhv file.rpm" to apply
    the update.
    Our maintenance customers are being notified individually. The packages
    are being offered to install from the maintenance web.


    x86 Platform:

    SUSE Linux 9.1:
          ee1026d5b6a4a554d95ce9d3626d6bf7
          ea6c27890eb69d47b54786a727cb782f
          b965364531163627f34b9a66e6d0b07e
    patch rpm(s):
          e698670506097dff0f9e61b594bcfeb9
          e64be5421ff6f1451c2b2dc926f8f081
          b891c79e3a96538b69417e1aba6e85c4
    source rpm(s):
          7d3b4859cca3548004d4dc0e2cb431a8
          1ebff5e543d7d36cd13670189fe50443
          a14a20c83eedde899af40a88cf60a14a

    SUSE Linux 9.0:
          975f35315d69a283355a9734edb323b1
          2256aa7e05a0d6f3a055dc915c6823a9
          df61777b0ce9dc097c794bcf3d236981
    patch rpm(s):
          26cb661048adf99b3633d633347043a7
          f36dcd428c96ff5126817d0dfb130816
          2bb28c8adac1b2db9a5c024c66095254
    source rpm(s):
          79e218f9442f1d466d962c1a8c192f6d
          df6ad6d300013d65cce5907bc4db2cce
          55a6d43b4e9cb67e3cff9efa6948e28d

    SUSE Linux 8.2:
          cdd76473d916801409c2076b5d8cb46a
          2cd5ce43cd92a32ad398c951678bfdd4
          ec1dd1ddd3386ff6928c6fd865efcf31
    patch rpm(s):
          cc95b4f40c3cafb77ecedbd99c820cad
          a114f7060501d6b5eab88ed7b97f5da1
          7da86919fd126713bb45fc30c8689b0b
    source rpm(s):
          843966bca098ac9c4e14f07c4cbdfc31
          ce74982f20ab42826681e6839a6c8985
          31125b894ab4554760941b92d74d7b24

    SUSE Linux 8.1:
          c9d7dc3a5670751d223c64b7e9fb9268
          fbab1881ad8cbbb9631a61592a86c271
          0e4950eebe57d7fa9994320c74382049
    patch rpm(s):
          5925050be240253a7c084ce981c85bc7
          62e78b9496aeb0d0840f6a13d7e59785
          456b459f8c2ca4faaa0fabe3b334e570
    source rpm(s):
          53c739863f94725f0f9fb5f0a1b9e4fd
          fe6b13ab4a056648b75597f2727e25d7




    x86-64 Platform:

    SUSE Linux 9.1:
          3524b344918baf5355c7c2e0725db323
          6b0e942470d01229251e574dd9d4f96d
          e9d953b5d043b290b3b1cff662f86946
    patch rpm(s):
          d4ad80cb52efb2d135f398e209c52632
          b84ad3c425ba10a37faa9bbba6a060c7
          d53a5b337037a74589b11da4729bfa14
    source rpm(s):
          68a890f08853c1cdc08788a9241d0cbf
          937ee28b2e943d0c8dc0ffe618afb5b1
          95b1ba6fe5ef947376570de538578081

    SUSE Linux 9.0:
          b2110cb13ee350d616f6558fa719089e
          2e43ea64c00a319d734dcba439a8b08e
          1856dbb6ac0a1936766f45bf4de4d1c3
    patch rpm(s):
          e358d84c5b3cb6633cc932d25f4ab7bf
          6d7f993e6148b60eaa40dadc5c2b9919
          0717ffc7d31766e3cba63b5af84b338a
    source rpm(s):
          5091d4b48d52dae0efc4c50e1dffad19
          24524c12c4315715a925e2d4dee12235
          c0987ba79b084d5782441890a2a0dacf

______________________________________________________________________________

5)  Pending vulnerabilities in SUSE Distributions and Workarounds:

    - opera
    The web-browser opera is affected by several security bugs. Due to
    the nature of this package we are not able to provide security updates
    in a timely manner and have to wait for binary packages to be published
    by "Opera Software".

    - acroread
    iDEFENSE reported a buffer overflow and insecure handling of shell
    meta-chars in acroread code.
    We depend on the release of a new binary package by Adobe.
    An update will be available as soon as possible.

______________________________________________________________________________

6)  standard appendix: authenticity verification, additional information

  - Package authenticity verification:

    SUSE update packages are available on many mirror ftp servers all over
    the world. While this service is being considered valuable and important
    to the free and open source software community, many users wish to be
    sure about the origin of the package and its content before installing
    the package. There are two verification methods that can be used
    independently from each other to prove the authenticity of a downloaded
    file or rpm package:
    1) md5sums as provided in the (cryptographically signed) announcement.
    2) using the internal gpg signatures of the rpm package.

    1) execute the command
        md5sum 
       after you downloaded the file from a SUSE ftp server or its mirrors.
       Then, compare the resulting md5sum with the one that is listed in the
       announcement. Since the announcement containing the checksums is
       cryptographically signed (usually using the key security@suse.de),
       the checksums show proof of the authenticity of the package.
       We disrecommend to subscribe to security lists which cause the
       email message containing the announcement to be modified so that
       the signature does not match after transport through the mailing
       list software.
       Downsides: You must be able to verify the authenticity of the
       announcement in the first place. If RPM packages are being rebuilt
       and a new version of a package is published on the ftp server, all
       md5 sums for the files are useless.

    2) rpm package signatures provide an easy way to verify the authenticity
       of an rpm package. Use the command
        rpm -v --checksig 
       to verify the signature of the package, where  is the
       filename of the rpm package that you have downloaded. Of course,
       package authenticity verification can only target an un-installed rpm
       package file.
       Prerequisites:
        a) gpg is installed
        b) The package is signed using a certain key. The public part of this
           key must be installed by the gpg program in the directory
           ~/.gnupg/ under the user's home directory who performs the
           signature verification (usually root). You can import the key
           that is used by SUSE in rpm packages for SUSE Linux by saving
           this announcement to a file ("announcement.txt") and
           running the command (do "su -" to be root):
            gpg --batch; gpg < announcement.txt | gpg --import
           SUSE Linux distributions version 7.1 and thereafter install the
           key "build@suse.de" upon installation or upgrade, provided that
           the package gpg is installed. The file containing the public key
           is placed at the top-level directory of the first CD (pubring.gpg)
           and at  .


  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   general/linux/SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an email to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an email to
                .

    For general information or the frequently asked questions (faq)
    send mail to:
         or
         respectively.

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

SuSE: 2004-027: qt3 Security Update

August 19, 2004
The QT-library is an environment for GUI-programming and is used in The QT-library is an environment for GUI-programming and is used in various well-known projects, like KDE

Summary


-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                qt3/qt3-non-mt/qt3-32bit/qt3-static
        Announcement-ID:        SUSE-SA:2004:027
        Date:                   Thursday, Aug 19th 2004 15:00 MEST
        Affected products:      8.1, 8.2, 9.0, 9.1
                                SUSE Linux Database Server,
                                SUSE eMail Server III, 3.1
                                SUSE Linux Enterprise Server 8, 9
                                SUSE Linux Firewall on CD/Admin host
                                SUSE Linux Connectivity Server
                                SUSE Linux Office Server
        Vulnerability Type:     remote system compromise
        Severity (1-10):        7
        SUSE default package:   yes
        Cross References:       CAN-2004-0691
                                CAN-2004-0692
                                CAN-2004-0693

    Content of this advisory:
        1) security vulnerability resolved:
             - buffer overflow in image handling code
           problem description
        2) solution/workaround
        3) special instructions and notes
        4) package location and checksums
        5) pending vulnerabilities, solutions, workarounds:
            - opera
            - acroread
        6) standard appendix (further information)

______________________________________________________________________________

1) problem description, brief discussion

    The QT-library is an environment for GUI-programming and is used in
    various well-known projects, like KDE.

    Chris Evans found a heap overflow in the BMP image format parser
    (CAN-2004-0691) which can probably be abused by remote attackers to
    execute arbitrary code with the privileges of the user using a
    malformed image as input for a vulnerable QT-based application.
    Additionally a NULL dereference in the GIF parser (CAN-2004-0693)
    was found.
    This lead to more research by other people and revealed another NULL
    dereference in the XPM parser (CAN-2004-0692) found by Marcus Meissner,
    SuSE Security-Team.
    The last two bugs can be used to trigger a remote denial-of-service
    attack against QT-based applications.


2) solution/workaround

    A temporary workaround for this issue is not known.


3) special instructions and notes

    After applying the update make sure all QT-based applications are
    restarted. It would be best to re-login if you use KDE.


4) package location and checksums

    Please download the update package for your distribution and verify its
    integrity by the methods listed in section 3) of this announcement.
    Then, install the package using the command "rpm -Fhv file.rpm" to apply
    the update.
    Our maintenance customers are being notified individually. The packages
    are being offered to install from the maintenance web.


    x86 Platform:

    SUSE Linux 9.1:
          ee1026d5b6a4a554d95ce9d3626d6bf7
          ea6c27890eb69d47b54786a727cb782f
          b965364531163627f34b9a66e6d0b07e
    patch rpm(s):
          e698670506097dff0f9e61b594bcfeb9
          e64be5421ff6f1451c2b2dc926f8f081
          b891c79e3a96538b69417e1aba6e85c4
    source rpm(s):
          7d3b4859cca3548004d4dc0e2cb431a8
          1ebff5e543d7d36cd13670189fe50443
          a14a20c83eedde899af40a88cf60a14a

    SUSE Linux 9.0:
          975f35315d69a283355a9734edb323b1
          2256aa7e05a0d6f3a055dc915c6823a9
          df61777b0ce9dc097c794bcf3d236981
    patch rpm(s):
          26cb661048adf99b3633d633347043a7
          f36dcd428c96ff5126817d0dfb130816
          2bb28c8adac1b2db9a5c024c66095254
    source rpm(s):
          79e218f9442f1d466d962c1a8c192f6d
          df6ad6d300013d65cce5907bc4db2cce
          55a6d43b4e9cb67e3cff9efa6948e28d

    SUSE Linux 8.2:
          cdd76473d916801409c2076b5d8cb46a
          2cd5ce43cd92a32ad398c951678bfdd4
          ec1dd1ddd3386ff6928c6fd865efcf31
    patch rpm(s):
          cc95b4f40c3cafb77ecedbd99c820cad
          a114f7060501d6b5eab88ed7b97f5da1
          7da86919fd126713bb45fc30c8689b0b
    source rpm(s):
          843966bca098ac9c4e14f07c4cbdfc31
          ce74982f20ab42826681e6839a6c8985
          31125b894ab4554760941b92d74d7b24

    SUSE Linux 8.1:
          c9d7dc3a5670751d223c64b7e9fb9268
          fbab1881ad8cbbb9631a61592a86c271
          0e4950eebe57d7fa9994320c74382049
    patch rpm(s):
          5925050be240253a7c084ce981c85bc7
          62e78b9496aeb0d0840f6a13d7e59785
          456b459f8c2ca4faaa0fabe3b334e570
    source rpm(s):
          53c739863f94725f0f9fb5f0a1b9e4fd
          fe6b13ab4a056648b75597f2727e25d7




    x86-64 Platform:

    SUSE Linux 9.1:
          3524b344918baf5355c7c2e0725db323
          6b0e942470d01229251e574dd9d4f96d
          e9d953b5d043b290b3b1cff662f86946
    patch rpm(s):
          d4ad80cb52efb2d135f398e209c52632
          b84ad3c425ba10a37faa9bbba6a060c7
          d53a5b337037a74589b11da4729bfa14
    source rpm(s):
          68a890f08853c1cdc08788a9241d0cbf
          937ee28b2e943d0c8dc0ffe618afb5b1
          95b1ba6fe5ef947376570de538578081

    SUSE Linux 9.0:
          b2110cb13ee350d616f6558fa719089e
          2e43ea64c00a319d734dcba439a8b08e
          1856dbb6ac0a1936766f45bf4de4d1c3
    patch rpm(s):
          e358d84c5b3cb6633cc932d25f4ab7bf
          6d7f993e6148b60eaa40dadc5c2b9919
          0717ffc7d31766e3cba63b5af84b338a
    source rpm(s):
          5091d4b48d52dae0efc4c50e1dffad19
          24524c12c4315715a925e2d4dee12235
          c0987ba79b084d5782441890a2a0dacf

______________________________________________________________________________

5)  Pending vulnerabilities in SUSE Distributions and Workarounds:

    - opera
    The web-browser opera is affected by several security bugs. Due to
    the nature of this package we are not able to provide security updates
    in a timely manner and have to wait for binary packages to be published
    by "Opera Software".

    - acroread
    iDEFENSE reported a buffer overflow and insecure handling of shell
    meta-chars in acroread code.
    We depend on the release of a new binary package by Adobe.
    An update will be available as soon as possible.

______________________________________________________________________________

6)  standard appendix: authenticity verification, additional information

  - Package authenticity verification:

    SUSE update packages are available on many mirror ftp servers all over
    the world. While this service is being considered valuable and important
    to the free and open source software community, many users wish to be
    sure about the origin of the package and its content before installing
    the package. There are two verification methods that can be used
    independently from each other to prove the authenticity of a downloaded
    file or rpm package:
    1) md5sums as provided in the (cryptographically signed) announcement.
    2) using the internal gpg signatures of the rpm package.

    1) execute the command
        md5sum 
       after you downloaded the file from a SUSE ftp server or its mirrors.
       Then, compare the resulting md5sum with the one that is listed in the
       announcement. Since the announcement containing the checksums is
       cryptographically signed (usually using the key security@suse.de),
       the checksums show proof of the authenticity of the package.
       We disrecommend to subscribe to security lists which cause the
       email message containing the announcement to be modified so that
       the signature does not match after transport through the mailing
       list software.
       Downsides: You must be able to verify the authenticity of the
       announcement in the first place. If RPM packages are being rebuilt
       and a new version of a package is published on the ftp server, all
       md5 sums for the files are useless.

    2) rpm package signatures provide an easy way to verify the authenticity
       of an rpm package. Use the command
        rpm -v --checksig 
       to verify the signature of the package, where  is the
       filename of the rpm package that you have downloaded. Of course,
       package authenticity verification can only target an un-installed rpm
       package file.
       Prerequisites:
        a) gpg is installed
        b) The package is signed using a certain key. The public part of this
           key must be installed by the gpg program in the directory
           ~/.gnupg/ under the user's home directory who performs the
           signature verification (usually root). You can import the key
           that is used by SUSE in rpm packages for SUSE Linux by saving
           this announcement to a file ("announcement.txt") and
           running the command (do "su -" to be root):
            gpg --batch; gpg < announcement.txt | gpg --import
           SUSE Linux distributions version 7.1 and thereafter install the
           key "build@suse.de" upon installation or upgrade, provided that
           the package gpg is installed. The file containing the public key
           is placed at the top-level directory of the first CD (pubring.gpg)
           and at  .


  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   general/linux/SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an email to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an email to
                .

    For general information or the frequently asked questions (faq)
    send mail to:
         or
         respectively.

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

References

Severity

Related News