SuSE: 2004-027: qt3 Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: qt3/qt3-non-mt/qt3-32bit/qt3-static
Announcement-ID: SUSE-SA:2004:027
Date: Thursday, Aug 19th 2004 15:00 MEST
Affected products: 8.1, 8.2, 9.0, 9.1
SUSE Linux Database Server,
SUSE eMail Server III, 3.1
SUSE Linux Enterprise Server 8, 9
SUSE Linux Firewall on CD/Admin host
SUSE Linux Connectivity Server
SUSE Linux Office Server
Vulnerability Type: remote system compromise
Severity (1-10): 7
SUSE default package: yes
Cross References: CAN-2004-0691
CAN-2004-0692
CAN-2004-0693
Content of this advisory:
1) security vulnerability resolved:
- buffer overflow in image handling code
problem description
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
- opera
- acroread
6) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion
The QT-library is an environment for GUI-programming and is used in
various well-known projects, like KDE.
Chris Evans found a heap overflow in the BMP image format parser
(CAN-2004-0691) which can probably be abused by remote attackers to
execute arbitrary code with the privileges of the user using a
malformed image as input for a vulnerable QT-based application.
Additionally a NULL dereference in the GIF parser (CAN-2004-0693)
was found.
This lead to more research by other people and revealed another NULL
dereference in the XPM parser (CAN-2004-0692) found by Marcus Meissner,
SuSE Security-Team.
The last two bugs can be used to trigger a remote denial-of-service
attack against QT-based applications.
2) solution/workaround
A temporary workaround for this issue is not known.
3) special instructions and notes
After applying the update make sure all QT-based applications are
restarted. It would be best to re-login if you use KDE.
4) package location and checksums
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
x86 Platform:
SUSE Linux 9.1:
ee1026d5b6a4a554d95ce9d3626d6bf7
ea6c27890eb69d47b54786a727cb782f
b965364531163627f34b9a66e6d0b07e
patch rpm(s):
e698670506097dff0f9e61b594bcfeb9
e64be5421ff6f1451c2b2dc926f8f081
b891c79e3a96538b69417e1aba6e85c4
source rpm(s):
7d3b4859cca3548004d4dc0e2cb431a8
1ebff5e543d7d36cd13670189fe50443
a14a20c83eedde899af40a88cf60a14a
SUSE Linux 9.0:
975f35315d69a283355a9734edb323b1
2256aa7e05a0d6f3a055dc915c6823a9
df61777b0ce9dc097c794bcf3d236981
patch rpm(s):
26cb661048adf99b3633d633347043a7
f36dcd428c96ff5126817d0dfb130816
2bb28c8adac1b2db9a5c024c66095254
source rpm(s):
79e218f9442f1d466d962c1a8c192f6d
df6ad6d300013d65cce5907bc4db2cce
55a6d43b4e9cb67e3cff9efa6948e28d
SUSE Linux 8.2:
cdd76473d916801409c2076b5d8cb46a
2cd5ce43cd92a32ad398c951678bfdd4
ec1dd1ddd3386ff6928c6fd865efcf31
patch rpm(s):
cc95b4f40c3cafb77ecedbd99c820cad
a114f7060501d6b5eab88ed7b97f5da1
7da86919fd126713bb45fc30c8689b0b
source rpm(s):
843966bca098ac9c4e14f07c4cbdfc31
ce74982f20ab42826681e6839a6c8985
31125b894ab4554760941b92d74d7b24
SUSE Linux 8.1:
c9d7dc3a5670751d223c64b7e9fb9268
fbab1881ad8cbbb9631a61592a86c271
0e4950eebe57d7fa9994320c74382049
patch rpm(s):
5925050be240253a7c084ce981c85bc7
62e78b9496aeb0d0840f6a13d7e59785
456b459f8c2ca4faaa0fabe3b334e570
source rpm(s):
53c739863f94725f0f9fb5f0a1b9e4fd
fe6b13ab4a056648b75597f2727e25d7
x86-64 Platform:
SUSE Linux 9.1:
3524b344918baf5355c7c2e0725db323
6b0e942470d01229251e574dd9d4f96d
e9d953b5d043b290b3b1cff662f86946
patch rpm(s):
d4ad80cb52efb2d135f398e209c52632
b84ad3c425ba10a37faa9bbba6a060c7
d53a5b337037a74589b11da4729bfa14
source rpm(s):
68a890f08853c1cdc08788a9241d0cbf
937ee28b2e943d0c8dc0ffe618afb5b1
95b1ba6fe5ef947376570de538578081
SUSE Linux 9.0:
b2110cb13ee350d616f6558fa719089e
2e43ea64c00a319d734dcba439a8b08e
1856dbb6ac0a1936766f45bf4de4d1c3
patch rpm(s):
e358d84c5b3cb6633cc932d25f4ab7bf
6d7f993e6148b60eaa40dadc5c2b9919
0717ffc7d31766e3cba63b5af84b338a
source rpm(s):
5091d4b48d52dae0efc4c50e1dffad19
24524c12c4315715a925e2d4dee12235
c0987ba79b084d5782441890a2a0dacf
______________________________________________________________________________
5) Pending vulnerabilities in SUSE Distributions and Workarounds:
- opera
The web-browser opera is affected by several security bugs. Due to
the nature of this package we are not able to provide security updates
in a timely manner and have to wait for binary packages to be published
by "Opera Software".
- acroread
iDEFENSE reported a buffer overflow and insecure handling of shell
meta-chars in acroread code.
We depend on the release of a new binary package by Adobe.
An update will be available as soon as possible.
______________________________________________________________________________
6) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References