LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Red Hat: gdk-pixbuf everal security flaws Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux Updated gdk-pixbuf packages that fix several security flaws are now available.

---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated gdk-pixbuf packages fix security flaws
Advisory ID:       RHSA-2004:447-02
Issue date:        2004-09-15
Updated on:        2004-09-15
Product:           Red Hat Enterprise Linux
Obsoletes:         RHSA-2004:103
CVE Names:         CAN-2004-0753 CAN-2004-0782 CAN-2004-0783 CAN-2004-0788
---------------------------------------------------------------------

1. Summary:

Updated gdk-pixbuf packages that fix several security flaws are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The gdk-pixbuf package contains an image loading library used with the
GNOME GUI desktop environment.

[Updated 15th September 2004]
Packages have been updated to correct a bug which caused the xpm loader
to fail.

During testing of a previously fixed flaw in Qt (CAN-2004-0691), a flaw was
discovered in the BMP image processor of gdk-pixbuf.  An attacker could
create a carefully crafted BMP file which would cause an application
to enter an infinite loop and not respond to user input when the file was
opened by a victim.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0753 to this issue.

During a security audit, Chris Evans discovered a stack and a heap overflow
in the XPM image decoder. An attacker could create a carefully crafted XPM
file which could cause an application linked with gtk2 to crash or possibly
execute arbitrary code when the file was opened by a victim.
(CAN-2004-0782, CAN-2004-0783)

Chris Evans also discovered an integer overflow in the ICO image decoder.
An attacker could create a carefully crafted ICO file which could cause an
application linked with gtk2 to crash when the file is opened by a victim.
(CAN-2004-0788)

These packages have also been updated to correct a bug which caused the xpm
loader to fail.

Users of gdk-pixbuf are advised to upgrade to these packages, which
contain backported patches and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

     http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed  (http://bugzilla.redhat.com/ for more info):

130455 - CAN-2004-0753 bmp image loader DOS
130711 - CAN-2004-0782/3/8 GTK XPM decoder issues

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/gdk-pixbuf-0.22.0-11.2.2E.src.rpm
fda43700c69af3535e9d3bc9e6b4f1b9  gdk-pixbuf-0.22.0-11.2.2E.src.rpm

i386:
8334282664dfc3f87a377fbf7b733d41  gdk-pixbuf-0.22.0-11.2.2E.i386.rpm
30dab937b29109544bcb0bf68d8b9fc0  gdk-pixbuf-devel-0.22.0-11.2.2E.i386.rpm
d1c6a6a7b4baa3219ac66040b684b133  gdk-pixbuf-gnome-0.22.0-11.2.2E.i386.rpm

ia64:
68926c28e87cbbea60ce8eacb163c98e  gdk-pixbuf-0.22.0-11.2.2E.ia64.rpm
f0100561fb5c22ce3bf71dc08e7a88b9  gdk-pixbuf-devel-0.22.0-11.2.2E.ia64.rpm
0fa01166e066f322a78fc8e3b97085e9  gdk-pixbuf-gnome-0.22.0-11.2.2E.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/gdk-pixbuf-0.22.0-11.2.2E.src.rpm
fda43700c69af3535e9d3bc9e6b4f1b9  gdk-pixbuf-0.22.0-11.2.2E.src.rpm

ia64:
68926c28e87cbbea60ce8eacb163c98e  gdk-pixbuf-0.22.0-11.2.2E.ia64.rpm
f0100561fb5c22ce3bf71dc08e7a88b9  gdk-pixbuf-devel-0.22.0-11.2.2E.ia64.rpm
0fa01166e066f322a78fc8e3b97085e9  gdk-pixbuf-gnome-0.22.0-11.2.2E.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/gdk-pixbuf-0.22.0-11.2.2E.src.rpm
fda43700c69af3535e9d3bc9e6b4f1b9  gdk-pixbuf-0.22.0-11.2.2E.src.rpm

i386:
8334282664dfc3f87a377fbf7b733d41  gdk-pixbuf-0.22.0-11.2.2E.i386.rpm
30dab937b29109544bcb0bf68d8b9fc0  gdk-pixbuf-devel-0.22.0-11.2.2E.i386.rpm
d1c6a6a7b4baa3219ac66040b684b133  gdk-pixbuf-gnome-0.22.0-11.2.2E.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/gdk-pixbuf-0.22.0-11.2.2E.src.rpm
fda43700c69af3535e9d3bc9e6b4f1b9  gdk-pixbuf-0.22.0-11.2.2E.src.rpm

i386:
8334282664dfc3f87a377fbf7b733d41  gdk-pixbuf-0.22.0-11.2.2E.i386.rpm
30dab937b29109544bcb0bf68d8b9fc0  gdk-pixbuf-devel-0.22.0-11.2.2E.i386.rpm
d1c6a6a7b4baa3219ac66040b684b133  gdk-pixbuf-gnome-0.22.0-11.2.2E.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gdk-pixbuf-0.22.0-11.3.3.src.rpm
adde2ead86237f92b7a346394dfb93bc  gdk-pixbuf-0.22.0-11.3.3.src.rpm

i386:
92fadd028df0850e6b61e01b440ade70  gdk-pixbuf-0.22.0-11.3.3.i386.rpm
4c80a32cb8573720bdcc06b39475754f  gdk-pixbuf-devel-0.22.0-11.3.3.i386.rpm
6e50dafb95a1efef5e3676663c38c0a0  gdk-pixbuf-gnome-0.22.0-11.3.3.i386.rpm

ia64:
c50021c89b9369377247cf69141361bb  gdk-pixbuf-0.22.0-11.3.3.ia64.rpm
d465a6ac9407dd1fc97f7336218b2350  gdk-pixbuf-devel-0.22.0-11.3.3.ia64.rpm
a925e983040b0cb85b7d3491d2928e1d  gdk-pixbuf-gnome-0.22.0-11.3.3.ia64.rpm

ppc:
3464b39ac9ccca779f3b8b77ba3086d7  gdk-pixbuf-0.22.0-11.3.3.ppc.rpm
742f21c2cf58a00d2e4aecfc54c1cde8  gdk-pixbuf-devel-0.22.0-11.3.3.ppc.rpm
600e801b22806cfbc11d3d5b9f175624  gdk-pixbuf-gnome-0.22.0-11.3.3.ppc.rpm

s390:
d9ad5bb3ef55ef9a4d453091ea53d414  gdk-pixbuf-0.22.0-11.3.3.s390.rpm
90e70ff542f9b859d7ca586ea6aba099  gdk-pixbuf-devel-0.22.0-11.3.3.s390.rpm
0722d84359e5b752ae811d7db557c473  gdk-pixbuf-gnome-0.22.0-11.3.3.s390.rpm

s390x:
d787c1c1cec4ed5135066a3930cd6d05  gdk-pixbuf-0.22.0-11.3.3.s390x.rpm
9f0c0dd1515ae16c5596b0c23288701f  gdk-pixbuf-devel-0.22.0-11.3.3.s390x.rpm
f73fb0a596c337e6e3b4e4033df84989  gdk-pixbuf-gnome-0.22.0-11.3.3.s390x.rpm

x86_64:
0678c0efeb2cceae8fee9dbb8797f2af  gdk-pixbuf-0.22.0-11.3.3.x86_64.rpm
160fa97f945efec1ce56ea494541c520  gdk-pixbuf-devel-0.22.0-11.3.3.x86_64.rpm
92b07889b33dc280fdb136b02325c53e  gdk-pixbuf-gnome-0.22.0-11.3.3.x86_64.rpm

Red Hat Desktop version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gdk-pixbuf-0.22.0-11.3.3.src.rpm
adde2ead86237f92b7a346394dfb93bc  gdk-pixbuf-0.22.0-11.3.3.src.rpm

i386:
92fadd028df0850e6b61e01b440ade70  gdk-pixbuf-0.22.0-11.3.3.i386.rpm
4c80a32cb8573720bdcc06b39475754f  gdk-pixbuf-devel-0.22.0-11.3.3.i386.rpm
6e50dafb95a1efef5e3676663c38c0a0  gdk-pixbuf-gnome-0.22.0-11.3.3.i386.rpm

x86_64:
0678c0efeb2cceae8fee9dbb8797f2af  gdk-pixbuf-0.22.0-11.3.3.x86_64.rpm
160fa97f945efec1ce56ea494541c520  gdk-pixbuf-devel-0.22.0-11.3.3.x86_64.rpm
92b07889b33dc280fdb136b02325c53e  gdk-pixbuf-gnome-0.22.0-11.3.3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gdk-pixbuf-0.22.0-11.3.3.src.rpm
adde2ead86237f92b7a346394dfb93bc  gdk-pixbuf-0.22.0-11.3.3.src.rpm

i386:
92fadd028df0850e6b61e01b440ade70  gdk-pixbuf-0.22.0-11.3.3.i386.rpm
4c80a32cb8573720bdcc06b39475754f  gdk-pixbuf-devel-0.22.0-11.3.3.i386.rpm
6e50dafb95a1efef5e3676663c38c0a0  gdk-pixbuf-gnome-0.22.0-11.3.3.i386.rpm

ia64:
c50021c89b9369377247cf69141361bb  gdk-pixbuf-0.22.0-11.3.3.ia64.rpm
d465a6ac9407dd1fc97f7336218b2350  gdk-pixbuf-devel-0.22.0-11.3.3.ia64.rpm
a925e983040b0cb85b7d3491d2928e1d  gdk-pixbuf-gnome-0.22.0-11.3.3.ia64.rpm

x86_64:
0678c0efeb2cceae8fee9dbb8797f2af  gdk-pixbuf-0.22.0-11.3.3.x86_64.rpm
160fa97f945efec1ce56ea494541c520  gdk-pixbuf-devel-0.22.0-11.3.3.x86_64.rpm
92b07889b33dc280fdb136b02325c53e  gdk-pixbuf-gnome-0.22.0-11.3.3.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gdk-pixbuf-0.22.0-11.3.3.src.rpm
adde2ead86237f92b7a346394dfb93bc  gdk-pixbuf-0.22.0-11.3.3.src.rpm

i386:
92fadd028df0850e6b61e01b440ade70  gdk-pixbuf-0.22.0-11.3.3.i386.rpm
4c80a32cb8573720bdcc06b39475754f  gdk-pixbuf-devel-0.22.0-11.3.3.i386.rpm
6e50dafb95a1efef5e3676663c38c0a0  gdk-pixbuf-gnome-0.22.0-11.3.3.i386.rpm

ia64:
c50021c89b9369377247cf69141361bb  gdk-pixbuf-0.22.0-11.3.3.ia64.rpm
d465a6ac9407dd1fc97f7336218b2350  gdk-pixbuf-devel-0.22.0-11.3.3.ia64.rpm
a925e983040b0cb85b7d3491d2928e1d  gdk-pixbuf-gnome-0.22.0-11.3.3.ia64.rpm

x86_64:
0678c0efeb2cceae8fee9dbb8797f2af  gdk-pixbuf-0.22.0-11.3.3.x86_64.rpm
160fa97f945efec1ce56ea494541c520  gdk-pixbuf-devel-0.22.0-11.3.3.x86_64.rpm
92b07889b33dc280fdb136b02325c53e  gdk-pixbuf-gnome-0.22.0-11.3.3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:
 
http://bugzilla.gnome.org/show_bug.cgi?id=150601 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hacker Halted 2014: Johnny Long Calls for Hackers for Charity Volunteers
RIPS – Static Source Code Analysis For PHP Vulnerabilities
Finding a Video Poker Bug Made These Guys Rich—Then Vegas Made Them Pay
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.