SuSE: 2004-041: xshared, XFree86-libs, xorg-x11-libs Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: xshared, XFree86-libs, xorg-x11-libs
Announcement-ID: SUSE-SA:2004:041
Date: Wednesday, Nov 17th 2004 15:00 MET
Affected products: 8.1, 8.2, 9.0, 9.1, 9.2
SUSE Linux Desktop 1.0
SUSE Linux Enterprise Server 8, 9
Novell Linux Desktop 1.0
Vulnerability Type: remote system compromise
Severity (1-10): 8
SUSE default package: yes
Cross References: none
Content of this advisory:
1) security vulnerability resolved:
- several integer overflows
- out-of-bounds memory access
- shell command execution
- path traversal
- endless loops
- memory leaks
problem description
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
- ImageMagick
- clamav
- perl-MIME-Tools, perl-Archive-ZIP
- apache / mod_include
- apache2 / mod_SSL
6) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion
The XPM library which is part of the XFree86/XOrg project is used by
several GUI applications to process XPM image files.
A source code review done by Thomas Biege of the SuSE Security-Team
revealed several different kinds of bugs.
The bug types are:
- integer overflows
- out-of-bounds memory access
- shell command execution
- path traversal
- endless loops
By providing a special image these bugs can be exploited by remote and/or
local attackers to gain access to the system or to escalate their local
privileges.
2) solution/workaround
No workaround exists to protect against these bugs.
3) special instructions and notes
Please restart the X server or switch to runlevel 3 and back to 5 to make
sure every GUI application is restarted and uses the new library.
4) package location and checksums
Download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered for installation from the maintenance web.
Smalltalk is the only package using libxpm statically. It will be
available via YOU too.
x86 Platform:
SUSE Linux 9.2:
395edf444f05b448aa7c7e70455333ce
patch rpm(s):
8d215ce255838120c70ba77ad944a84f
source rpm(s):
3889aee5895035c57c716f370f5e414a
SUSE Linux 9.1:
89431783cd8261a970d6ec5484dd09e6
patch rpm(s):
8ea579d10465143a2334be812f23561e
source rpm(s):
a37eaa7e7b99c5c3e61439f2a4b00b2d
SUSE Linux 9.0:
a12b2e861f114868fd70997f72536c8b
patch rpm(s):
c6ea49a796b316aa68dacc51ffd8eb8d
source rpm(s):
f53026511a470b875b0f9a63c52128d3
SUSE Linux 8.2:
b918f14df14961cf89528a930f49d7c4
patch rpm(s):
9c9c268bb248f1bcf2ef899ced2d5aa4
source rpm(s):
9a7846ddf22d58f9f64704b3a2451640
SUSE Linux 8.1:
d4549acb039d8bf317bc6052598764c9
patch rpm(s):
fcfc17915fdddb48ea84e4d528752edc
source rpm(s):
3e1d6cf799d0a8e10e2597458264812e
x86-64 Platform:
SUSE Linux 9.2:
e1a271567b2c784aedf3b10f60bbf8a1
patch rpm(s):
fe95d10e1287ebbe56ba8d7a07954431
source rpm(s):
da697a970a5672a96016fff405f72692
SUSE Linux 9.1:
37b2d73337bd0d70dcc092c0e15a0911
patch rpm(s):
d72e54995bd6468cf1ea78da81546a69
source rpm(s):
0158b2653157f518f8dcf030927c2107
SUSE Linux 9.0:
06a4fd1bd6eeb43fd82e18b9a255ff78
patch rpm(s):
da96d1c51020a7de70195458b197fa3b
source rpm(s):
f369153e40af338af2fd67957db09cff
______________________________________________________________________________
5) Pending vulnerabilities in SUSE Distributions and Workarounds:
- ImageMagick
This update fixes an additional problem in the EXIF handling of
ImageMagick, which could lead to a buffer overflow. This could enable
remote attackers feeding handcrafted images to execute code as the
user handling the image.
New packages are available.
- clamav
The clamav version shipped with SUSE Linux is too old for the new
data files. The version has been upgraded to 0.80.
- perl-Mime-Tools / perl-Archive-ZIP
Problems in the perl-MIME-Tools and perl-Archive-ZIP packages have
been found which could allow virii to pass virus scanners using those
packages (like for instance clamav). Fixed packages are in testing
and will be released soon.
- Apache 1.3 / mod_include
A potential buffer overflow and a argument sanitization problem
were found in the mod_include Apache 1.3 module. These issues
are tracked as CAN-2004-0940 and CAN-2004-0492 by Mitre CVE.
Fixed packages are in testing and will be released soon.
- Apache 2 / mod_SSL
SSL Ciphersuite bypass problems were identified and fixed by the
Apache team in Apache 2. This is tracked under the Mitre CVE ID
CAN-2004-0885. Fixed packages are in testing and will be released
soon.
______________________________________________________________________________
6) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References