lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 22 Sep 2006 14:19:29 +0100
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2006-0052 - multi

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0052

Package names:	   freetype, gnutls, gzip
Summary:           Multiple vulnerabilities
Date:              2006-09-22
Affected versions: Trustix Secure Linux 2.2
                   Trustix Secure Linux 3.0
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  freetype
  The FreeType engine is a free and portable TrueType font rendering
  engine, developed to provide TrueType support for a variety of
  platforms and environments. FreeType is a library which can open and
  manages font files as well as efficiently load, hint and render
  individual glyphs. FreeType is not a font server or a complete
  text-rendering library.

  gnutls
  GnuTLS is a project that aims to develop a library which provides a
  secure layer, over a reliable transport layer. Currently the GnuTLS
  library implements the proposed standards by the IETF's TLS working
  group.

  gzip
  The gzip package contains the popular GNU gzip data compression
  program. Gzipped files have a .gz extension.

Problem description:
  freetype < TSL 3.0 > < TSL 2.2 >
  - New Upstream.
  - Enable bytecode hinting, Bug #1933.
  - SECURITY FIX: Chris Evans discovered several integer underflow
    and overflow flaws in the FreeType font engine. If a specially
    crafted font file that, when loaded by the target user's system,
    will trigger an integer underflow or integer overflow and crash
    the application or execute arbitrary code on the target system.
                                                                                                                           
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2006-3467 to this issue.

  gnutls < TSL 3.0 >
  - SECURITY Fix: A vulnerability has been reported in GnuTLS, caused
    due to an error in the verification of certain signatures. If a 
    RSA key with exponent 3 is used, it may be possible to forge PKCS
    #1 v1.5 signatures signed with that key.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2006-4790 to this issue.

  gzip < TSL 3.0 > < TSL 2.2 > < TSEL 2 > 
  - SECURITY Fix: Tavis Ormandy, Google Security Team,  has reported
    some vulnerabilities in gzip, which can be exploited by malicious
    people to cause a DoS and potentially compromise a vulnerable system.
  - Fix null pointer dereference that may lead to denial of service if
    gzip is used in an automated manner.
  - A boundary error within the "make_table()" function in unlzh.c can be
    used to modify certain stack data. This can be exploited to cause a
    DoS and potentially allows to execute arbitrary code.
  - A buffer underflow exists within the "build_tree()" function in
    unpack.c, which can be exploited to cause a DoS and potentially
    allows to execute arbitrary code.
  - A buffer overflow within the "make_table()" function of gzip's LZH
    support can be exploited to cause a DoS and potentially to compromise
    a vulnerable system by e.g. tricking a user or automated system into
    unpacking an archive containing a specially crafted decoding table.
  - unlzh.c in the LHZ component in gzip allows context-dependent 
    attackers to cause a denial of service (infinite loop) via a crafted
    GZIP archive.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2006-4334, CVE-2006-4335, CVE-2006-4336,
    CVE-2006-4337 and CVE-2006-4338 to these issues.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/> and
  <URI:http://www.trustix.org/errata/trustix-3.0/>
  or directly at
  <URI:http://www.trustix.org/errata/2006/0052/>


MD5sums of the packages:
- --------------------------------------------------------------------------
ce2058e75ca81dc44f29afdbf3082681  3.0/rpms/freetype-2.2.1-1tr.i586.rpm
8039bce6fc164a1bc3b7cf8ee681ba2d  3.0/rpms/freetype-devel-2.2.1-1tr.i586.rpm
f1e92a14c9df6a1b3598885b88f0d70f  3.0/rpms/gnutls-1.2.4-4tr.i586.rpm
21fd545269725dc5fa617f4d7c2bfd0a  3.0/rpms/gnutls-devel-1.2.4-4tr.i586.rpm
e3fd30ee23b80c8a8dd9e56e2645b251  3.0/rpms/gzip-1.3.5-7tr.i586.rpm
a5202fec43fc873f1ed910bc38b9cf31  3.0/rpms/gzip-doc-1.3.5-7tr.i586.rpm

10ee8e7f85956a5290c314263f177fd5  2.2/rpms/freetype-2.2.1-1tr.i586.rpm
fde86196c3f634031912964c87303cad  2.2/rpms/freetype-devel-2.2.1-1tr.i586.rpm
3062d3f81b8ed3545140f5b9008f6abe  2.2/rpms/gzip-1.3.5-1tr.i586.rpm
3892f7f5adc3a788dc5960c3c898e536  2.2/rpms/gzip-doc-1.3.5-1tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFFE95Fi8CEzsK9IksRAiqoAJ4/DlKRqVI6HiA2iVX3rQHh/S/YsACfbZbz
SYSB3IQjwutMZPShB/k9zW4=
=PNZm
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ