SUSE Security Announcement: qt3 (SUSE-SA:2004:027)
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: qt3/qt3-non-mt/qt3-32bit/qt3-static
Announcement-ID: SUSE-SA:2004:027
Date: Thursday, Aug 19th 2004 15:00 MEST
Affected products: 8.1, 8.2, 9.0, 9.1
SUSE Linux Database Server,
SUSE eMail Server III, 3.1
SUSE Linux Enterprise Server 8, 9
SUSE Linux Firewall on CD/Admin host
SUSE Linux Connectivity Server
SUSE Linux Office Server
Vulnerability Type: remote system compromise
Severity (1-10): 7
SUSE default package: yes
Cross References: CAN-2004-0691
CAN-2004-0692
CAN-2004-0693
Content of this advisory:
1) security vulnerability resolved:
- buffer overflow in image handling code
problem description
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
- opera
- acroread
6) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion
The QT-library is an environment for GUI-programming and is used in
various well-known projects, like KDE.
Chris Evans found a heap overflow in the BMP image format parser
(CAN-2004-0691) which can probably be abused by remote attackers to
execute arbitrary code with the privileges of the user using a
malformed image as input for a vulnerable QT-based application.
Additionally a NULL dereference in the GIF parser (CAN-2004-0693)
was found.
This lead to more research by other people and revealed another NULL
dereference in the XPM parser (CAN-2004-0692) found by Marcus Meissner,
SuSE Security-Team.
The last two bugs can be used to trigger a remote denial-of-service
attack against QT-based applications.
2) solution/workaround
A temporary workaround for this issue is not known.
3) special instructions and notes
After applying the update make sure all QT-based applications are
restarted. It would be best to re-login if you use KDE.
4) package location and checksums
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
x86 Platform:
SUSE Linux 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/qt3-3.3.1-36.16.i586.rpm
ee1026d5b6a4a554d95ce9d3626d6bf7
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/qt3-non-mt-3.3.1-41.14.i586.rpm
ea6c27890eb69d47b54786a727cb782f
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/qt3-static-3.3.1-41.14.i586.rpm
b965364531163627f34b9a66e6d0b07e
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/qt3-3.3.1-36.16.i586.patch.rpm
e698670506097dff0f9e61b594bcfeb9
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/qt3-non-mt-3.3.1-41.14.i586.patch.rpm
e64be5421ff6f1451c2b2dc926f8f081
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/qt3-static-3.3.1-41.14.i586.patch.rpm
b891c79e3a96538b69417e1aba6e85c4
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/qt3-3.3.1-36.16.src.rpm
7d3b4859cca3548004d4dc0e2cb431a8
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/qt3-non-mt-3.3.1-41.14.src.rpm
1ebff5e543d7d36cd13670189fe50443
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/qt3-static-3.3.1-41.14.src.rpm
a14a20c83eedde899af40a88cf60a14a
SUSE Linux 9.0:
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/qt3-3.2.1-68.i586.rpm
975f35315d69a283355a9734edb323b1
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/qt3-non-mt-3.2.1-70.i586.rpm
2256aa7e05a0d6f3a055dc915c6823a9
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/qt3-static-3.2.1-70.i586.rpm
df61777b0ce9dc097c794bcf3d236981
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/qt3-3.2.1-68.i586.patch.rpm
26cb661048adf99b3633d633347043a7
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/qt3-non-mt-3.2.1-70.i586.patch.rpm
f36dcd428c96ff5126817d0dfb130816
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/qt3-static-3.2.1-70.i586.patch.rpm
2bb28c8adac1b2db9a5c024c66095254
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/qt3-3.2.1-68.src.rpm
79e218f9442f1d466d962c1a8c192f6d
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/qt3-non-mt-3.2.1-70.src.rpm
df6ad6d300013d65cce5907bc4db2cce
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/qt3-static-3.2.1-70.src.rpm
55a6d43b4e9cb67e3cff9efa6948e28d
SUSE Linux 8.2:
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/qt3-3.1.1-118.i586.rpm
cdd76473d916801409c2076b5d8cb46a
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/qt3-non-mt-3.1.1-125.i586.rpm
2cd5ce43cd92a32ad398c951678bfdd4
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/qt3-static-3.1.1-124.i586.rpm
ec1dd1ddd3386ff6928c6fd865efcf31
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/qt3-3.1.1-118.i586.patch.rpm
cc95b4f40c3cafb77ecedbd99c820cad
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/qt3-non-mt-3.1.1-125.i586.patch.rpm
a114f7060501d6b5eab88ed7b97f5da1
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/qt3-static-3.1.1-124.i586.patch.rpm
7da86919fd126713bb45fc30c8689b0b
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/qt3-3.1.1-118.src.rpm
843966bca098ac9c4e14f07c4cbdfc31
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/qt3-non-mt-3.1.1-125.src.rpm
ce74982f20ab42826681e6839a6c8985
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/qt3-static-3.1.1-124.src.rpm
31125b894ab4554760941b92d74d7b24
SUSE Linux 8.1:
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/qt3-3.0.5-167.i586.rpm
c9d7dc3a5670751d223c64b7e9fb9268
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/qt3-non-mt-3.0.5-231.i586.rpm
fbab1881ad8cbbb9631a61592a86c271
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/qt3-static-3.0.5-159.i586.rpm
0e4950eebe57d7fa9994320c74382049
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/qt3-3.0.5-167.i586.patch.rpm
5925050be240253a7c084ce981c85bc7
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/qt3-non-mt-3.0.5-231.i586.patch.rpm
62e78b9496aeb0d0840f6a13d7e59785
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/qt3-static-3.0.5-159.i586.patch.rpm
456b459f8c2ca4faaa0fabe3b334e570
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/qt3-non-mt-3.0.5-231.nosrc.rpm
53c739863f94725f0f9fb5f0a1b9e4fd
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/qt3-static-3.0.5-159.nosrc.rpm
fe6b13ab4a056648b75597f2727e25d7
x86-64 Platform:
SUSE Linux 9.1:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/qt3-3.3.1-36.16.x86_64.rpm
3524b344918baf5355c7c2e0725db323
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/qt3-non-mt-3.3.1-41.14.x86_64.rpm
6b0e942470d01229251e574dd9d4f96d
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/qt3-static-3.3.1-41.14.x86_64.rpm
e9d953b5d043b290b3b1cff662f86946
patch rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/qt3-3.3.1-36.16.x86_64.patch.rpm
d4ad80cb52efb2d135f398e209c52632
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/qt3-non-mt-3.3.1-41.14.x86_64.patch.rpm
b84ad3c425ba10a37faa9bbba6a060c7
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/qt3-static-3.3.1-41.14.x86_64.patch.rpm
d53a5b337037a74589b11da4729bfa14
source rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/qt3-3.3.1-36.16.src.rpm
68a890f08853c1cdc08788a9241d0cbf
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/qt3-non-mt-3.3.1-41.14.src.rpm
937ee28b2e943d0c8dc0ffe618afb5b1
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/qt3-static-3.3.1-41.14.src.rpm
95b1ba6fe5ef947376570de538578081
SUSE Linux 9.0:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/qt3-3.2.1-68.x86_64.rpm
b2110cb13ee350d616f6558fa719089e
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/qt3-non-mt-3.2.1-70.x86_64.rpm
2e43ea64c00a319d734dcba439a8b08e
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/qt3-static-3.2.1-70.x86_64.rpm
1856dbb6ac0a1936766f45bf4de4d1c3
patch rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/qt3-3.2.1-68.x86_64.patch.rpm
e358d84c5b3cb6633cc932d25f4ab7bf
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/qt3-non-mt-3.2.1-70.x86_64.patch.rpm
6d7f993e6148b60eaa40dadc5c2b9919
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/qt3-static-3.2.1-70.x86_64.patch.rpm
0717ffc7d31766e3cba63b5af84b338a
source rpm(s):
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/qt3-3.2.1-68.src.rpm
5091d4b48d52dae0efc4c50e1dffad19
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/qt3-non-mt-3.2.1-70.src.rpm
24524c12c4315715a925e2d4dee12235
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/qt3-static-3.2.1-70.src.rpm
c0987ba79b084d5782441890a2a0dacf
______________________________________________________________________________
5) Pending vulnerabilities in SUSE Distributions and Workarounds:
- opera
The web-browser opera is affected by several security bugs. Due to
the nature of this package we are not able to provide security updates
in a timely manner and have to wait for binary packages to be published
by "Opera Software".
- acroread
iDEFENSE reported a buffer overflow and insecure handling of shell
meta-chars in acroread code.
We depend on the release of a new binary package by Adobe.
An update will be available as soon as possible.
______________________________________________________________________________
6) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
participants (1)
-
Thomas Biege