kdegraphics-3.5.5-3.5AXS3

エラータID: AXSA:2009-416:01

Release date: 
Thursday, October 22, 2009 - 13:41
Subject: 
kdegraphics-3.5.5-3.5AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

The KDE Graphics is a metapackage of graphics related applications and libraries for use with the K Desktop Environment.
Security bugs fixed with this release:
CVE-2009-0146
Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.
CVE-2009-0147
Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
CVE-2009-0166
The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.
CVE-2009-0195
Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments.
CVE-2009-0791
Multiple integer overflows in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.
CVE-2009-0799
The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
CVE-2009-0800
Multiple input validation flaws in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
CVE-2009-1179
Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
CVE-2009-1180
The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
CVE-2009-1181
The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
CVE-2009-1182
Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
CVE-2009-1183
The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
CVE-2009-1188
Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to SplashBitmap (splash/SplashBitmap.cc).
CVE-2009-3604
CVE-2009-3606
CVE-2009-3608
CVE-2009-3609
No description available at the time of writing. Please refer to the CVE links below.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kdegraphics-3.5.5-3.5AXS3.src.rpm
    MD5: f0ece147c094cd06382c89577528030d
    SHA-256: c61d6c7ac601b151a137724f9472faf6c6e48238ba3f68f9dd01b4365fcfc67a
    Size: 8.69 MB

Asianux Server 3 for x86
  1. kdegraphics-kghostview-3.5.5-3.5AXS3.i386.rpm
    MD5: 8813ef81bbf147dcbcdb1c01d1a0efb7
    SHA-256: 57bf00a1468b213d8132d933f1d28937712c2a99aee304533db4bf0f8fd8ac4c
    Size: 56.79 kB
  2. kdegraphics-kghostviewparts-3.5.5-3.5AXS3.i386.rpm
    MD5: 63c5f41115fcf632af4f4a12c1a234c8
    SHA-256: 68943d80db78cf26f474c9ba4ff332e10471a7983e5ecaa96e263556dbeb8b47
    Size: 157.18 kB
  3. kdegraphics-kolourpaint-3.5.5-3.5AXS3.i386.rpm
    MD5: a9d20ba2436945768c66179d254ed37e
    SHA-256: 00a270b4e75e84febaba736f4e30374df5629ad8b1565aded8a6cd9c60a0b023
    Size: 1.02 MB
  4. kdegraphics-kpdf-3.5.5-3.5AXS3.i386.rpm
    MD5: 363996e5c865accddc2bd96fb9b1aa89
    SHA-256: 61b38e421b8ed55b8b534c083d35d8b6d68be0720aec90836112b042a9855e34
    Size: 2.08 MB
  5. kdegraphics-ksnapshot-3.5.5-3.5AXS3.i386.rpm
    MD5: f7eda47905dc0183644f9bb61d342ed1
    SHA-256: 40a03f6b53f1db0638dd780d8a680a215a320ef92fc0c978312b6d64c43eafb7
    Size: 149.49 kB

Asianux Server 3 for x86_64
  1. kdegraphics-kghostview-3.5.5-3.5AXS3.x86_64.rpm
    MD5: a4f98433705932cdba6ec2e11a06e4d5
    SHA-256: a98b3516280132ee04d4064a222a6ebed6683df4653927d35f694512b310a579
    Size: 57.38 kB
  2. kdegraphics-kghostviewparts-3.5.5-3.5AXS3.x86_64.rpm
    MD5: 52007f407f3c245cb8d1c80f29001075
    SHA-256: 1125e79be1fdd87004e07d80fedf5d6ec001bc3f67eb2829beeb9a0e51d468c9
    Size: 168.86 kB
  3. kdegraphics-kolourpaint-3.5.5-3.5AXS3.x86_64.rpm
    MD5: 6b49a3b2356dccfbc5397aac6b3503dd
    SHA-256: 3077fd2f37ed2a19e338cfbeb91ceac65a67da961a7f42827e4d0c43e78a3534
    Size: 1.06 MB
  4. kdegraphics-kpdf-3.5.5-3.5AXS3.x86_64.rpm
    MD5: 6ff28e1cc70a58c1c0128bd39ff0ccf9
    SHA-256: c3c403ea4abf9e9775b81a685ec547c11e40f5de4916b7b46125698970291fa5
    Size: 2.15 MB
  5. kdegraphics-ksnapshot-3.5.5-3.5AXS3.x86_64.rpm
    MD5: d866bf9d891119f66014037c3510a17c
    SHA-256: d110f997cc0f4c6a7728cdf427658428db232deb72f71ea06e74a36f7243891e
    Size: 153.76 kB