______________________________________________________________________________
SuSE Security Announcement
Package: imlib
Announcement-ID: SuSE-SA:2002:015
Date: Tuesday, May 7th 2002 11:30 MEST
Affected products: 6.4, 7.0, 7.1, 7.2, 7.3, 8.0
Vulnerability Type: remote privilege escalation
Severity (1-10): 3
SuSE default package: yes
Other affected systems: all systems/applications using imlib
Content of this advisory:
1) security vulnerability resolved: imlib fallback and Denial-of-Service
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The imlib library can be used by X11 applications to handle various
kinds of image data.
Imlib could, under certain circumstances, revert to using a netpbm
library which is well known to have security problems and should not
be used for handling untrusted data. Furthermore a heap corruption
could occur in the imlib code.
An attacker could send a maliciously formated image file to trigger
a Denial-of-Service attack or even execute arbitrary code on the
victim's machine.
Thanks go to Al Viro and Alan Cox who discovered these bugs.
The imlib RPM package is installed by default and affects all applications
linked against imlib, like imager viewers, browsers, mail clients and
so on.
About 140 applications shipped with the SuSE Linux distribution depend
on imlib. You need to update your system, as no temporary workaround is
possbible.
Please run ldconfig(8) as root after updating imlib and restart all
applications using imlib.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
i386 Intel Platform:
SuSE-8.0
9137d95a9205a335871a71341c2c70b4
SuSE-8.0
4abd84a67aacb2c2fa21582e228e6a1d
SuSE-8.0
43103d0ff1e60f008499a69519d722d3
SuSE-8.0
02df11424f082e4aed1c93527f7bab69
SuSE-8.0
7680c38f5fef811bc96ff2fc00baafad
SuSE-8.0
bb449e5db3bf0827168b78d7636accac
source rpm:
d7cb0ddd0e18d645191f967b5b6e8109
SuSE-7.3
b114e4ea9babf4ac8bd241674b0be0fd
SuSE-7.3
7b3cd1c19161ed500bc4a0306eb66d0c
SuSE-7.3
41af6a469645a4ce4399935604cbf4c0
source rpm:
1839a719883e4aa5e543ee1bd22dc780
SuSE-7.2
9ec9fb90418a6ba76432334cb7e15bb8
SuSE-7.2
584e88a451341910524740cc54ca9c64
SuSE-7.2
c8c25f5396d565f75f68d48d7911813b
source rpm:
a5691ba54118a52454d394e346a6b8b4
SuSE-7.1
dc9d57492cd4faa497e23e14fcf5e57b
SuSE-7.1
58f03af3039c42db5b5a9d1a6acd9c27
SuSE-7.1
b82aa8abda460e45094fb4a0d683971f
source rpm:
f16db540325f4626aa5fda6ab5aa196b
SuSE-7.0
c089d699c31addadba09fd967677e535
SuSE-7.0
ee3c4bf8ab5e7068afcfb7160c38653f
SuSE-7.0
253759ffd47eb19831e61c52673ebc6f
source rpm:
2bb8b096627c72e25949d4e22fc26c3a
SuSE-6.4
b3175095dade1c545822b42707a99820
SuSE-6.4
a54bfa0d5b6333c20497dfd6ae1c65f6
SuSE-6.4
6d5815e9cfc1e9020dd758fcf3e15f0b
source rpm:
ce83d062fb32cf34ed6921490c732a51
Sparc Platform:
SuSE-7.3
58f0df8b16d05b7b28d919c53b20ddfd
SuSE-7.3
92c1e1a5a67b0a73197f793101af5955
SuSE-7.3
744db88a54bcff79068a7b2392e34fc2
source rpm:
fa4c576fea3185bc7624e50620dbaaf5
SuSE-7.1
dc3336004bc77ceca74035cb05b050f9
SuSE-7.1
a27820491016c5ff1fac5706b7042158
SuSE-7.1
b8b28901c088bc6763f462753ca58b7c
source rpm:
7605166c8ee6fa6439ade68e0d67c5c6
SuSE-7.0
8b1e28d9aa91061aed4569015e058fac
SuSE-7.0
01c5dae090bfe25d641d3389a11c16c2
SuSE-7.0
3be7654afc64fb5a10c145f67dce9ba3
source rpm:
6531693204e86106ceee748758038a07
AXP Alpha Platform:
SuSE-7.1
a84242de9afeec0b77f9d85b54f51f5b
SuSE-7.1
a2829f4eba557fbc3160b6b4ffec0ac5
SuSE-7.1
691b3d75dab0a3487b9f57c9b3501b17
source rpm:
58697086bf51f5231a1708765db8312c
SuSE-7.0
fbbf3f167844f0b046aafc14fed3b50e
SuSE-7.0
e5a8c05ca99ce4b38de47b35258423d7
SuSE-7.0
26cc11948b4d61d6e4c0aa35472d2d7d
source rpm:
90df4b7a6860281ad6130b09e7e634e3
SuSE-6.4
2b231d47fed0f5ac88299abbb6abb1cd
SuSE-6.4
99b4a22d820a3d846fc1bf0ca94843e4
SuSE-6.4
a7e9b77c92c28fe6bd07d4d8634a5253
source rpm:
11a996b48ee33c34b34acffad3a2a56c
PPC Power PC Platform:
SuSE-7.3
f9c093c06636b62507846c6679e1e86d
SuSE-7.3
973e484ba78847b5c47d5d6ef3972f56
SuSE-7.3
e06812ab04e4cbdc781d8e8d29dc3372
source rpm:
8f85b9a40d36d328deb20b3255ddc05c
SuSE-7.1
4a22c12194b6f1b80123a3466fe944c3
SuSE-7.1
85139eb233c567783c053f110baadb66
SuSE-7.1
ae31194e59d40267b36e38344b1ad139
source rpm:
6558c6ca5bee620485fd52a9a7ec316d
SuSE-7.0
e34ddef90edd1effb95771b5d7f6f935
SuSE-7.0
13eb42a163f919c9a4c097d8dc55a4a3
SuSE-7.0
9e73db46c744ee38118c9cd4b97bda7a
source rpm:
d321ee18493970c45b232362653dc447
SuSE-6.4
3d255a622cd006656a662b0e7a5efb87
SuSE-6.4
311ac75ac7622c6b453c5d6ed5ef9c28
SuSE-6.4
c5a86e6598a9fc801f56533e060dcc61
source rpm:
294626d55b89e1a5b940b4441172b578
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- screen
A security report about a locally exploitable bug in screen's braile code
was published on Bugtraq. SuSE ships screen without this code enabled.
On SuSE version 8.0 screen isn't even running with higher privileges
anymore.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
after you downloaded the file from a SuSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security@suse.de),
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.
2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig
to verify the signature of the package, where is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an uninstalled rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SuSE in rpm packages for SuSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SuSE Linux distributions version 7.1 and thereafter install the
key "build@suse.de" upon installation or upgrade, provided that
the package gpg is installed. The file containing the public key
is placed at the toplevel directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .
- SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security@suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
.
suse-security-announce@suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
.
For general information or the frequently asked questions (faq)
send mail to:
or
respectively.
==================================================================== SuSE's security contact is or .
The public key is listed below.
====================================================================______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the cleartext signature shows proof of the
authenticity of the text.
SuSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org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LRKC
-----END PGP PUBLIC KEY BLOCK-----