LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Important: kdegraphics security update Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux Updated kdegraphics packages that resolve security issues in kpdf are now available. This update has been rated as having important security impact by the Red Hat Security Response Team.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: kdegraphics security update
Advisory ID:       RHSA-2005:066-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-066.html
Issue date:        2005-02-15
Updated on:        2005-02-15
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2004-0888 CAN-2004-1125 CAN-2005-0064
- ---------------------------------------------------------------------

1. Summary:

Updated kdegraphics packages that resolve security issues in kpdf are now
available.

This update has been rated as having important security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The kdegraphics packages contain applications for the K Desktop Environment
including kpdf, a pdf file viewer. 

A buffer overflow flaw was found in the Gfx::doImage function of Xpdf that
also affects kpdf due to a shared codebase. An attacker could construct a
carefully crafted PDF file that could cause kpdf to crash or possibly
execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-1125 to
this issue.

A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of
Xpdf which also affects kpdf due to a shared codebase. An attacker could
construct a carefully crafted PDF file that could cause kpdf to crash or
possibly execute arbitrary code when opened. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-0064 to
this issue.

During a source code audit, Chris Evans and others discovered a number of
integer overflow bugs that affected all versions of Xpdf which also affects
kpdf due to a shared codebase. An attacker could construct a carefully
crafted PDF file that could cause kpdf to crash or possibly execute
arbitrary code when opened. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-0888 to this issue.

Users should update to these erratum packages which contain backported
patches to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

144231 - CAN-2004-1125 kpdf buffer overflows (CAN-2005-0064)
147517 - CAN-2004-0888 xpdf integer overflows

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kdegraphics-3.3.1-3.3.src.rpm
fd1d7060c8cca799483a27173d5bc7b6  kdegraphics-3.3.1-3.3.src.rpm

i386:
4a2e830f82d3aa0e05dd95426d5a109b  kdegraphics-3.3.1-3.3.i386.rpm
5937d9c3e8c5f7175f71078ffb7f717e  kdegraphics-devel-3.3.1-3.3.i386.rpm

ia64:
e2fd3f531b80d5bb50c3ae080639f4f8  kdegraphics-3.3.1-3.3.ia64.rpm
b383cbe0daccb73a4fe053d156a73164  kdegraphics-devel-3.3.1-3.3.ia64.rpm

ppc:
331f2f1866dbe6eae83af3c2724f6fa7  kdegraphics-3.3.1-3.3.ppc.rpm
640fe6bd9af17924905c7039e3638dff  kdegraphics-devel-3.3.1-3.3.ppc.rpm

s390:
b09f34cabeb4bfde4bd32aa829fd5976  kdegraphics-3.3.1-3.3.s390.rpm
5b94414dc45320387c924fd2ecc5877c  kdegraphics-devel-3.3.1-3.3.s390.rpm

s390x:
af43161748d3a158d954aeab1175fdba  kdegraphics-3.3.1-3.3.s390x.rpm
c43192a518f3ee03420c4d29aedc12f0  kdegraphics-devel-3.3.1-3.3.s390x.rpm

x86_64:
a4e5fd8221c93b22a601abcdfb310886  kdegraphics-3.3.1-3.3.x86_64.rpm
7e462597879404f94abb47e742fc1851  kdegraphics-devel-3.3.1-3.3.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kdegraphics-3.3.1-3.3.src.rpm
fd1d7060c8cca799483a27173d5bc7b6  kdegraphics-3.3.1-3.3.src.rpm

i386:
4a2e830f82d3aa0e05dd95426d5a109b  kdegraphics-3.3.1-3.3.i386.rpm
5937d9c3e8c5f7175f71078ffb7f717e  kdegraphics-devel-3.3.1-3.3.i386.rpm

x86_64:
a4e5fd8221c93b22a601abcdfb310886  kdegraphics-3.3.1-3.3.x86_64.rpm
7e462597879404f94abb47e742fc1851  kdegraphics-devel-3.3.1-3.3.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kdegraphics-3.3.1-3.3.src.rpm
fd1d7060c8cca799483a27173d5bc7b6  kdegraphics-3.3.1-3.3.src.rpm

i386:
4a2e830f82d3aa0e05dd95426d5a109b  kdegraphics-3.3.1-3.3.i386.rpm
5937d9c3e8c5f7175f71078ffb7f717e  kdegraphics-devel-3.3.1-3.3.i386.rpm

ia64:
e2fd3f531b80d5bb50c3ae080639f4f8  kdegraphics-3.3.1-3.3.ia64.rpm
b383cbe0daccb73a4fe053d156a73164  kdegraphics-devel-3.3.1-3.3.ia64.rpm

x86_64:
a4e5fd8221c93b22a601abcdfb310886  kdegraphics-3.3.1-3.3.x86_64.rpm
7e462597879404f94abb47e742fc1851  kdegraphics-devel-3.3.1-3.3.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kdegraphics-3.3.1-3.3.src.rpm
fd1d7060c8cca799483a27173d5bc7b6  kdegraphics-3.3.1-3.3.src.rpm

i386:
4a2e830f82d3aa0e05dd95426d5a109b  kdegraphics-3.3.1-3.3.i386.rpm
5937d9c3e8c5f7175f71078ffb7f717e  kdegraphics-devel-3.3.1-3.3.i386.rpm

ia64:
e2fd3f531b80d5bb50c3ae080639f4f8  kdegraphics-3.3.1-3.3.ia64.rpm
b383cbe0daccb73a4fe053d156a73164  kdegraphics-devel-3.3.1-3.3.ia64.rpm

x86_64:
a4e5fd8221c93b22a601abcdfb310886  kdegraphics-3.3.1-3.3.x86_64.rpm
7e462597879404f94abb47e742fc1851  kdegraphics-devel-3.3.1-3.3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://www.kde.org/info/security/advisory-20041223-1.txt
http://www.kde.org/info/security/advisory-20050119-1.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Heartbleed: Security experts reality-check the 3 most hysterical fears
Open source trounces proprietary software for code defects, Coverity analysis finds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.