-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                     ESB-2005.0923 -- RHSA-2005:811-01
                      Important: gtk2 security update
                             16 November 2005

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gtk2
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Desktop 4
                   Red Hat Enterprise Linux AS/ES/WS 4
                   Red Hat Desktop 3
                   Red Hat Enterprise Linux AS/ES/WS 3
                   Red Hat Linux Advanced Workstation 2.1
                   Red Hat Enterprise Linux AS/ES/WS 2.1
                   UNIX variants
Impact:            Execute Arbitrary Code/Commands
                   Denial of Service
Access:            Remote/Unauthenticated
CVE Names:         CVE-2005-3186 CVE-2005-2975

Ref:               ESB-2005.0922

Original Bulletin: https://rhn.redhat.com/errata/RHSA-2005-811.html

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Red Hat. It is recommended that administrators
         running gtk2 check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: gtk2 security update
Advisory ID:       RHSA-2005:811-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-811.html
Issue date:        2005-11-15
Updated on:        2005-11-15
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2005-3186 CVE-2005-2975
- - ---------------------------------------------------------------------

1. Summary:

Updated gtk2 packages that fix two security issues are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The gtk2 package contains the GIMP ToolKit (GTK+), a library for creating
graphical user interfaces for the X Window System.

A bug was found in the way gtk2 processes XPM images. An attacker could
create a carefully crafted XPM file in such a way that it could cause an
application linked with gtk2 to execute arbitrary code when the file was
opened by a victim. The Common Vulnerabilities and Exposures project has
assigned the name CVE-2005-3186 to this issue.

Ludwig Nussel discovered an infinite-loop denial of service bug in the way
gtk2 processes XPM images. An attacker could create a carefully crafted XPM
file in such a way that it could cause an application linked with gtk2 to
stop responding when the file was opened by a victim. The Common
Vulnerabilities and Exposures project has assigned the name CVE-2005-2975
to this issue.

Users of gtk2 are advised to upgrade to these updated packages, which
contain backported patches and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

171073 - CVE-2005-3186 XPM buffer overflow
171904 - CVE-2005-2975 gtk2 XPM DoS


6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gtk2-2.2.4-19.src.rpm
2beebc30bf5b45b0c2dc6d1261b67561  gtk2-2.2.4-19.src.rpm

i386:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
c7fd878b56e54635eb842eb2ff72840a  gtk2-devel-2.2.4-19.i386.rpm

ia64:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
e6e0623450c1ad48ecf4f8b145bcc3b7  gtk2-2.2.4-19.ia64.rpm
38510603379a0018f524f1d4f1fab979  gtk2-devel-2.2.4-19.ia64.rpm

ppc:
1ffb585f9a10954d9447c8fbcb580065  gtk2-2.2.4-19.ppc.rpm
4d4b6cc89f7721e088d31403cb250b2c  gtk2-2.2.4-19.ppc64.rpm
e89f8a6c2f59762d256a7f98db702345  gtk2-devel-2.2.4-19.ppc.rpm

s390:
0610f7c6ea96609ec70f042fe54f76d7  gtk2-2.2.4-19.s390.rpm
c3ea0a99a0e5dbe7727442cab31aa735  gtk2-devel-2.2.4-19.s390.rpm

s390x:
0610f7c6ea96609ec70f042fe54f76d7  gtk2-2.2.4-19.s390.rpm
4ef78cf2393365df26bce2e0690fe9ca  gtk2-2.2.4-19.s390x.rpm
5f30d8dc16ee803ad9b49465b592f738  gtk2-devel-2.2.4-19.s390x.rpm

x86_64:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
f60a3e69986ad825cba4aad1254863ce  gtk2-2.2.4-19.x86_64.rpm
5600f666987f01f84450c5afd5b4b755  gtk2-devel-2.2.4-19.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gtk2-2.2.4-19.src.rpm
2beebc30bf5b45b0c2dc6d1261b67561  gtk2-2.2.4-19.src.rpm

i386:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
c7fd878b56e54635eb842eb2ff72840a  gtk2-devel-2.2.4-19.i386.rpm

x86_64:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
f60a3e69986ad825cba4aad1254863ce  gtk2-2.2.4-19.x86_64.rpm
5600f666987f01f84450c5afd5b4b755  gtk2-devel-2.2.4-19.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gtk2-2.2.4-19.src.rpm
2beebc30bf5b45b0c2dc6d1261b67561  gtk2-2.2.4-19.src.rpm

i386:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
c7fd878b56e54635eb842eb2ff72840a  gtk2-devel-2.2.4-19.i386.rpm

ia64:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
e6e0623450c1ad48ecf4f8b145bcc3b7  gtk2-2.2.4-19.ia64.rpm
38510603379a0018f524f1d4f1fab979  gtk2-devel-2.2.4-19.ia64.rpm

x86_64:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
f60a3e69986ad825cba4aad1254863ce  gtk2-2.2.4-19.x86_64.rpm
5600f666987f01f84450c5afd5b4b755  gtk2-devel-2.2.4-19.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gtk2-2.2.4-19.src.rpm
2beebc30bf5b45b0c2dc6d1261b67561  gtk2-2.2.4-19.src.rpm

i386:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
c7fd878b56e54635eb842eb2ff72840a  gtk2-devel-2.2.4-19.i386.rpm

ia64:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
e6e0623450c1ad48ecf4f8b145bcc3b7  gtk2-2.2.4-19.ia64.rpm
38510603379a0018f524f1d4f1fab979  gtk2-devel-2.2.4-19.ia64.rpm

x86_64:
7c4100ec2705bdd6ce1c2e494e6d7295  gtk2-2.2.4-19.i386.rpm
f60a3e69986ad825cba4aad1254863ce  gtk2-2.2.4-19.x86_64.rpm
5600f666987f01f84450c5afd5b4b755  gtk2-devel-2.2.4-19.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gtk2-2.4.13-18.src.rpm
319e84b7ef7333e0fa701a82321f27d6  gtk2-2.4.13-18.src.rpm

i386:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
66f404a4f92b1d8edf4b7fe52efa7a95  gtk2-devel-2.4.13-18.i386.rpm

ia64:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
e28a842bdc3df5ad91a871e5bf37830b  gtk2-2.4.13-18.ia64.rpm
6253d039252a0e032535eaf0bc980c45  gtk2-devel-2.4.13-18.ia64.rpm

ppc:
b8c74bd45ff3029778dbb4dacf81cb77  gtk2-2.4.13-18.ppc.rpm
267defc507f889c498f9f79bfd062175  gtk2-2.4.13-18.ppc64.rpm
f0c599f36e0ac42b4f6c10c95b248833  gtk2-devel-2.4.13-18.ppc.rpm

s390:
7c83feddd2b894f7dc5dd0694c6ffb46  gtk2-2.4.13-18.s390.rpm
91f83cb635117c6600f025782f1ab59d  gtk2-devel-2.4.13-18.s390.rpm

s390x:
7c83feddd2b894f7dc5dd0694c6ffb46  gtk2-2.4.13-18.s390.rpm
23bf1c1628f0be7fb9efac948ad135be  gtk2-2.4.13-18.s390x.rpm
c4d4fb513d4ff47cae9dd4935bc3b3f0  gtk2-devel-2.4.13-18.s390x.rpm

x86_64:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
0e1c475684a72b6230eef4d1355bbeca  gtk2-2.4.13-18.x86_64.rpm
62fb0870357cd572bbdf2988005f388b  gtk2-devel-2.4.13-18.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gtk2-2.4.13-18.src.rpm
319e84b7ef7333e0fa701a82321f27d6  gtk2-2.4.13-18.src.rpm

i386:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
66f404a4f92b1d8edf4b7fe52efa7a95  gtk2-devel-2.4.13-18.i386.rpm

x86_64:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
0e1c475684a72b6230eef4d1355bbeca  gtk2-2.4.13-18.x86_64.rpm
62fb0870357cd572bbdf2988005f388b  gtk2-devel-2.4.13-18.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gtk2-2.4.13-18.src.rpm
319e84b7ef7333e0fa701a82321f27d6  gtk2-2.4.13-18.src.rpm

i386:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
66f404a4f92b1d8edf4b7fe52efa7a95  gtk2-devel-2.4.13-18.i386.rpm

ia64:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
e28a842bdc3df5ad91a871e5bf37830b  gtk2-2.4.13-18.ia64.rpm
6253d039252a0e032535eaf0bc980c45  gtk2-devel-2.4.13-18.ia64.rpm

x86_64:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
0e1c475684a72b6230eef4d1355bbeca  gtk2-2.4.13-18.x86_64.rpm
62fb0870357cd572bbdf2988005f388b  gtk2-devel-2.4.13-18.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gtk2-2.4.13-18.src.rpm
319e84b7ef7333e0fa701a82321f27d6  gtk2-2.4.13-18.src.rpm

i386:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
66f404a4f92b1d8edf4b7fe52efa7a95  gtk2-devel-2.4.13-18.i386.rpm

ia64:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
e28a842bdc3df5ad91a871e5bf37830b  gtk2-2.4.13-18.ia64.rpm
6253d039252a0e032535eaf0bc980c45  gtk2-devel-2.4.13-18.ia64.rpm

x86_64:
38fc94c08b8709088f1faa742c598d1e  gtk2-2.4.13-18.i386.rpm
0e1c475684a72b6230eef4d1355bbeca  gtk2-2.4.13-18.x86_64.rpm
62fb0870357cd572bbdf2988005f388b  gtk2-devel-2.4.13-18.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFDefTDXlSAg2UNWIIRAlYxAJwIIcBk9FfWOLP7+7v46Zct58INrQCfZE4B
kTFxVq5XySXMrwJglCWQTRY=
=gvN+
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQ3rCPyh9+71yA2DNAQK38AP+M1Nkh/ykUz33MsprWZngxYXCfKsqXI5H
Mb+qNITVkk82H+ZzFhrbyiprdpKQPj967Gmvtn/+5tbJ2JVPaZ6e5MqKxMbEHUaW
nMiGPYQjoBhNTWV3BGtcTrGvUECC2JhBMgExtMP3oHsMe1hI/g8AoKJDoUrSYbDY
qYZFvBO8yo8=
=rvem
-----END PGP SIGNATURE-----