Users login

Create an account »


Users login

Home » Hacking News » MDKSA-2002:071 - kdegraphics update

MDKSA-2002:071 - kdegraphics update

by Nikola Strahija on October 25th, 2002 A vulnerability exists in KGhostview, part of the kdegraphics package. It includes a DSC 3.0 parser from GSview then is vulnerable to a buffer overflow while parsing a specially crafted .ps file. It also contains code from gv which is vulnerable to a similar buffer overflow triggered by malformed PostScript and PDF files. This has been fixed in KDE 3.0.4 and patches have been applied to correct these packages.


Updated Packages:

Mandrake Linux 8.1:
c2d0b75d57ed7141f05de798b8ac0d13 8.1/RPMS/kdegraphics-2.2.1-2.1mdk.i586.rpm
14efec4821690276d3509813f7ccb249 8.1/RPMS/kdegraphics-static-devel-2.2.1-2.1mdk.i586.rpm
3c2b3e2f938ae89e068e481a193e709e 8.1/SRPMS/kdegraphics-2.2.1-2.1mdk.src.rpm

Mandrake Linux 8.1/ia64:
e9541d890bdf42c950340d62093188a1 ia64/8.1/RPMS/kdegraphics-2.2.1-2.1mdk.ia64.rpm
0c3488384c0bde4aab5bbdce9418f943 ia64/8.1/RPMS/kdegraphics-static-devel-2.2.1-2.1mdk.ia64.rpm
3c2b3e2f938ae89e068e481a193e709e ia64/8.1/SRPMS/kdegraphics-2.2.1-2.1mdk.src.rpm

Mandrake Linux 8.2:
d96f35aa8104d6cfe342a7eec7547a77 8.2/RPMS/kdegraphics-2.2.2-15.1mdk.i586.rpm
4b4649c446fd2651902c01381f96b9d9 8.2/RPMS/kdegraphics-devel-2.2.2-15.1mdk.i586.rpm
35b7738189dde8b53c62552ec3b45d97 8.2/SRPMS/kdegraphics-2.2.2-15.1mdk.src.rpm

Mandrake Linux 8.2/ppc:
f3d930e65d3bca29219862e19854c4b6 ppc/8.2/RPMS/kdegraphics-2.2.2-15.1mdk.ppc.rpm
10a3a083e4f346adf831bb15a26c9b70 ppc/8.2/RPMS/kdegraphics-devel-2.2.2-15.1mdk.ppc.rpm
35b7738189dde8b53c62552ec3b45d97 ppc/8.2/SRPMS/kdegraphics-2.2.2-15.1mdk.src.rpm

Mandrake Linux 9.0:
f7d812383316839aa45b51ac3787f8c1 9.0/RPMS/kdegraphics-3.0.3-11.1mdk.i586.rpm
b9f0e8cd614063f430d6885b0b60dad3 9.0/RPMS/kdegraphics-devel-3.0.3-11.1mdk.i586.rpm
8026d73141a3fc47ebc875fd3bccc297 9.0/SRPMS/kdegraphics-3.0.3-11.1mdk.src.rpm

Bug IDs fixed (see for more information):


To upgrade automatically, use MandrakeUpdate. The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of
FTP mirrors can be obtained from:

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:

rpm --checksig

All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team from:

Please be aware that sometimes it takes the mirrors a few hours to

You can view other update advisories for Mandrake Linux at:

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by

If you want to report vulnerabilities, please contact

[email protected]

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »