|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] xpdf/poppler/koffice/kdegraphics (SSA:2007-316-01)
Date: Mon, 12 Nov 2007 01:06:02 -0800 (PST) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] xpdf/poppler/koffice/kdegraphics (SSA:2007-316-01)
New xpdf packages are available for Slackware 9.1, 10.0, 10.1, 10.2, 11.0,
12.0, and -current. New poppler packages are available for Slackware 12.0
and -current. New koffice packages are available for Slackware 11.0, 12.0,
and -current. New kdegraphics packages are available for Slackware 10.2,
11.0, 12.0, and -current.
These updated packages address similar bugs which could be used to crash
applications linked with poppler or that use code from xpdf through the
use of a malformed PDF document. It is possible that a maliciously
crafted document could cause code to be executed in the context of the
user running the application processing the PDF.
These advisories and CVE entries cover the bugs:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
http://www.kde.org/info/security/advisory-20071107-1.txt
Here are the details from the Slackware 12.0 ChangeLog:
+--------------------------+
patches/packages/kdegraphics-3.5.7-i486-2_slack12.0.tgz:
Patched xpdf related bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
(* Security fix *)
patches/packages/koffice-1.6.3-i486-2_slack12.0.tgz:
Patched xpdf related bugs.
For more information, see:
http://www.kde.org/info/security/advisory-20071107-1.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
(* Security fix *)
patches/packages/poppler-0.6.2-i486-1_slack12.0.tgz:
Upgraded to poppler-0.6.2.
This release fixes xpdf related bugs.
For more information, see:
http://poppler.freedesktop.org/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
(* Security fix *)
patches/packages/xpdf-3.02pl2-i486-1_slack12.0.tgz:
Upgraded to xpdf-3.02pl2.
The pl2 patch fixes a crash in xpdf.
Some theorize that this could be used to execute arbitrary code if an
untrusted PDF file is opened, but no real-world examples are known (yet).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/xpdf-3.02pl2-i486-1_slack9.1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/xpdf-3.02pl2-i486-1_slack10.0.tgz
Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/xpdf-3.02pl2-i486-1_slack10.1.tgz
Updated packages for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/kdegraphics-3.4.2-i486-3_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/xpdf-3.02pl2-i486-1_slack10.2.tgz
Updated packages for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/kdegraphics-3.5.4-i486-2_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/koffice-1.5.2-i486-5_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/xpdf-3.02pl2-i486-1_slack11.0.tgz
Updated packages for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kdegraphics-3.5.7-i486-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/poppler-0.6.2-i486-1_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/koffice-1.6.3-i486-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/xpdf-3.02pl2-i486-1_slack12.0.tgz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/kde/kdegraphics-3.5.8-i486-2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/kde/koffice-1.6.3-i486-2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/poppler-0.6.2-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/xpdf-3.02pl2-i486-1.tgz
MD5 signatures:
+-------------+
Slackware 9.1 package:
aa3d6b221c07a384baa6a0eba1a1efdb xpdf-3.02pl2-i486-1_slack9.1.tgz
Slackware 10.0 package:
599858ff8356b0e8880136cb3b55e25c xpdf-3.02pl2-i486-1_slack10.0.tgz
Slackware 10.1 package:
255da766ecacfc63e911c18a61e5752d xpdf-3.02pl2-i486-1_slack10.1.tgz
Slackware 10.2 packages:
f7b37b4cb655b521bd9c5ab6307ac270 kdegraphics-3.4.2-i486-3_slack10.2.tgz
2f4ed5c83e8c5be32be96357507c330a xpdf-3.02pl2-i486-1_slack10.2.tgz
Slackware 11.0 packages:
25578c530a3f2ec13bec0357d65bae2c kdegraphics-3.5.4-i486-2_slack11.0.tgz
4acf5abe10c5f3945cbc07055257a542 koffice-1.5.2-i486-5_slack11.0.tgz
8a7b799c24c390afb4772caa1436265d xpdf-3.02pl2-i486-1_slack11.0.tgz
Slackware 12.0 packages:
11baa1865cc585fdd7675841b451ea9b kdegraphics-3.5.7-i486-2_slack12.0.tgz
59e52a5e1e275fc014d90617ecb3e5dd poppler-0.6.2-i486-1_slack12.0.tgz
5e44ffce08846b5fe97084d40c2c8546 koffice-1.6.3-i486-2_slack12.0.tgz
f2664010681ae7d7b448a8fa0c81ab74 xpdf-3.02pl2-i486-1_slack12.0.tgz
Slackware -current packages:
d23a28d7dee50891a33c9ded57c68044 kdegraphics-3.5.8-i486-2.tgz
6e65e3b07e7ff2ed0dda65d18dab6900 koffice-1.6.3-i486-2.tgz
98135c77e0401bbf222e0eb56c085d17 poppler-0.6.2-i486-1.tgz
6ef32871b16ff093354daaf7f390ba0c xpdf-3.02pl1-i486-1.tgz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg kdegraphics-3.5.7-i486-2_slack12.0.tgz poppler-0.6.2-i486-1_slack12.0.tgz koffice-1.6.3-i486-2_slack12.0.tgz xpdf-3.02pl2-i486-1_slack12.0.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFHOAy5akRjwEAQIjMRAhi8AJ9Zv8+7ZJtQ/+8qdFlAQvrTIZz5WwCfWFra
F89h38DyryUoJzkyRj+aczU=
=+W1J
-----END PGP SIGNATURE-----
|
| |