Security Advisory Important: kdegraphics security update

Advisory: RHSA-2009:1502-1
Type: Security Advisory
Severity: Important
Issued on: 2009-10-15
Last updated on: 2009-10-15
Affected Products: RHEL Desktop Workstation (v. 5 client)
RHEL Optional Productivity Applications (v. 5 server)
RHEL Optional Productivity Applications EUS (v. 5.4.z server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2009-0791
CVE-2009-1188
CVE-2009-3604
CVE-2009-3606
CVE-2009-3608
CVE-2009-3609

Details

Updated kdegraphics packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kdegraphics packages contain applications for the K Desktop
Environment, including KPDF, a viewer for Portable Document Format (PDF)
files.

Multiple integer overflow flaws were found in KPDF. An attacker could
create a malicious PDF file that would cause KPDF to crash or, potentially,
execute arbitrary code when opened. (CVE-2009-0791, CVE-2009-1188,
CVE-2009-3604, CVE-2009-3606, CVE-2009-3608, CVE-2009-3609)

Red Hat would like to thank Adam Zabrocki for reporting the CVE-2009-3604
issue, and Chris Rohlf for reporting the CVE-2009-3608 issue.

Users are advised to upgrade to these updated packages, which contain a
backported patch to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

IA-32:
kdegraphics-devel-3.5.4-15.el5_4.2.i386.rpm
File outdated by:  RHSA-2010:0753
    MD5: 1910c740290904c277cefa7ad7960110
 
x86_64:
kdegraphics-devel-3.5.4-15.el5_4.2.i386.rpm
File outdated by:  RHSA-2010:0753
    MD5: 1910c740290904c277cefa7ad7960110
kdegraphics-devel-3.5.4-15.el5_4.2.x86_64.rpm
File outdated by:  RHSA-2010:0753
    MD5: 4fe2a6e245e1f37bdc7da75c58eb932e
 
RHEL Optional Productivity Applications (v. 5 server)

IA-32:
kdegraphics-3.5.4-15.el5_4.2.i386.rpm
File outdated by:  RHSA-2010:0753
    MD5: 868b0a6e8ef08d30acbebdf3e3c3a53e
kdegraphics-devel-3.5.4-15.el5_4.2.i386.rpm
File outdated by:  RHSA-2010:0753
    MD5: 1910c740290904c277cefa7ad7960110
 
x86_64:
kdegraphics-3.5.4-15.el5_4.2.x86_64.rpm
File outdated by:  RHSA-2010:0753
    MD5: bc4d25b0b8b8aa4eaa526599147497d1
kdegraphics-devel-3.5.4-15.el5_4.2.i386.rpm
File outdated by:  RHSA-2010:0753
    MD5: 1910c740290904c277cefa7ad7960110
kdegraphics-devel-3.5.4-15.el5_4.2.x86_64.rpm
File outdated by:  RHSA-2010:0753
    MD5: 4fe2a6e245e1f37bdc7da75c58eb932e
 
RHEL Optional Productivity Applications EUS (v. 5.4.z server)

IA-32:
kdegraphics-3.5.4-15.el5_4.2.i386.rpm     MD5: 868b0a6e8ef08d30acbebdf3e3c3a53e
kdegraphics-devel-3.5.4-15.el5_4.2.i386.rpm     MD5: 1910c740290904c277cefa7ad7960110
 
x86_64:
kdegraphics-3.5.4-15.el5_4.2.x86_64.rpm     MD5: bc4d25b0b8b8aa4eaa526599147497d1
kdegraphics-devel-3.5.4-15.el5_4.2.i386.rpm     MD5: 1910c740290904c277cefa7ad7960110
kdegraphics-devel-3.5.4-15.el5_4.2.x86_64.rpm     MD5: 4fe2a6e245e1f37bdc7da75c58eb932e
 
Red Hat Enterprise Linux Desktop (v. 5 client)

IA-32:
kdegraphics-3.5.4-15.el5_4.2.i386.rpm
File outdated by:  RHSA-2010:0753
    MD5: 868b0a6e8ef08d30acbebdf3e3c3a53e
 
x86_64:
kdegraphics-3.5.4-15.el5_4.2.x86_64.rpm
File outdated by:  RHSA-2010:0753
    MD5: bc4d25b0b8b8aa4eaa526599147497d1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

491840 - CVE-2009-0791 xpdf: multiple integer overflows
495907 - CVE-2009-1188 xpdf/poppler: SplashBitmap integer overflow
526637 - CVE-2009-3608 xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016)
526877 - CVE-2009-3606 xpdf/poppler: PSOutputDev::doImageL1Sep integer overflow
526893 - CVE-2009-3609 xpdf/poppler: ImageStream::ImageStream integer overflow
526911 - CVE-2009-3604 xpdf/poppler: Splash::drawImage integer overflow and missing allocation return value check


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/