lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 13 Jun 2007 19:24:07 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:121 ] - Updated freetype2 packages fix integer overflow
 vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:121
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : freetype2
 Date    : June 13, 2007
 Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 An integer overflow vulnerability was discovered in the way the
 FreeType font engine processed TTF files.  If a user were to load a
 special font file with a program linked against freetype, it could
 cause the application to crash or possibly execute arbitrary code as
 the user running the program.
 
 The updated packages have been patched to prevent this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 888adc26eb66e993d1c8256ebf72287e  2007.0/i586/libfreetype6-2.2.1-4.2mdv2007.0.i586.rpm
 b10ff58273af4bfbf05bd1d6fabe5da8  2007.0/i586/libfreetype6-devel-2.2.1-4.2mdv2007.0.i586.rpm
 84d7e5982cd6c7bb7b10e0960a943474  2007.0/i586/libfreetype6-static-devel-2.2.1-4.2mdv2007.0.i586.rpm 
 fbf5f1732c13a6f54f3e0214b48552c1  2007.0/SRPMS/freetype2-2.2.1-4.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 a93fb30f5a597fa89fc8cd85286b53ce  2007.0/x86_64/lib64freetype6-2.2.1-4.2mdv2007.0.x86_64.rpm
 406806d503f5d355c8e77b989baf1f42  2007.0/x86_64/lib64freetype6-devel-2.2.1-4.2mdv2007.0.x86_64.rpm
 f86a4e7e99da26c14d673c02cd4d4ba8  2007.0/x86_64/lib64freetype6-static-devel-2.2.1-4.2mdv2007.0.x86_64.rpm 
 fbf5f1732c13a6f54f3e0214b48552c1  2007.0/SRPMS/freetype2-2.2.1-4.2mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 6bafde7e6f952a0492765d461da32c97  2007.1/i586/libfreetype6-2.3.1-3.2mdv2007.1.i586.rpm
 f34186eb65e04d416413cff4df8f9613  2007.1/i586/libfreetype6-devel-2.3.1-3.2mdv2007.1.i586.rpm
 c111b1522e7825cc6ddf05b60e171aae  2007.1/i586/libfreetype6-static-devel-2.3.1-3.2mdv2007.1.i586.rpm 
 47d7d53f3e9b9b302b7398b46200e3bb  2007.1/SRPMS/freetype2-2.3.1-3.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 baa54ceaf4ba1525299cf6b0e859f933  2007.1/x86_64/lib64freetype6-2.3.1-3.2mdv2007.1.x86_64.rpm
 ff16e366025be280a20e3d39ff0943d7  2007.1/x86_64/lib64freetype6-devel-2.3.1-3.2mdv2007.1.x86_64.rpm
 7db139854e18a1d7f20438068bb22761  2007.1/x86_64/lib64freetype6-static-devel-2.3.1-3.2mdv2007.1.x86_64.rpm 
 47d7d53f3e9b9b302b7398b46200e3bb  2007.1/SRPMS/freetype2-2.3.1-3.2mdv2007.1.src.rpm

 Corporate 3.0:
 6a5823f891bb8dd9b34af5c194697151  corporate/3.0/i586/libfreetype6-2.1.7-4.5.C30mdk.i586.rpm
 92a49443058dc76734007f42ea6ce992  corporate/3.0/i586/libfreetype6-devel-2.1.7-4.5.C30mdk.i586.rpm
 ad0d74f4a3415f7ff808b1d50c6deda6  corporate/3.0/i586/libfreetype6-static-devel-2.1.7-4.5.C30mdk.i586.rpm 
 b13be6aab56c9c23f32e3da292d424c1  corporate/3.0/SRPMS/freetype2-2.1.7-4.5.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 6a5823f891bb8dd9b34af5c194697151  corporate/3.0/x86_64/libfreetype6-2.1.7-4.5.C30mdk.i586.rpm
 ae6a04d285558d7d58e82e40ac82d5f2  corporate/3.0/x86_64/lib64freetype6-2.1.7-4.5.C30mdk.x86_64.rpm
 f03df050feb6e8ec2abe9c30e4386423  corporate/3.0/x86_64/lib64freetype6-devel-2.1.7-4.5.C30mdk.x86_64.rpm
 40af8e12d5651ce2ee05c166e6d9f180  corporate/3.0/x86_64/lib64freetype6-static-devel-2.1.7-4.5.C30mdk.x86_64.rpm 
 b13be6aab56c9c23f32e3da292d424c1  corporate/3.0/SRPMS/freetype2-2.1.7-4.5.C30mdk.src.rpm

 Corporate 4.0:
 554afdf7c745ba4476df5860a25b05d4  corporate/4.0/i586/libfreetype6-2.1.10-9.6.20060mlcs4.i586.rpm
 3b80645d0a25c3871268c7e2d0a378ac  corporate/4.0/i586/libfreetype6-devel-2.1.10-9.6.20060mlcs4.i586.rpm
 8017f06d616c226f00e8476f8583973f  corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.6.20060mlcs4.i586.rpm 
 0e75c0ceca12cc7eeb93a32cb415effa  corporate/4.0/SRPMS/freetype2-2.1.10-9.6.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 554afdf7c745ba4476df5860a25b05d4  corporate/4.0/x86_64/libfreetype6-2.1.10-9.6.20060mlcs4.i586.rpm
 3b80645d0a25c3871268c7e2d0a378ac  corporate/4.0/x86_64/libfreetype6-devel-2.1.10-9.6.20060mlcs4.i586.rpm
 8017f06d616c226f00e8476f8583973f  corporate/4.0/x86_64/libfreetype6-static-devel-2.1.10-9.6.20060mlcs4.i586.rpm
 a8c75240e1c74eeddbb96b034157ce48  corporate/4.0/x86_64/lib64freetype6-2.1.10-9.6.20060mlcs4.x86_64.rpm
 4ca744991bfb4260f45c9d2c48610287  corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.6.20060mlcs4.x86_64.rpm
 79ad754685d97d2f58ddcc5ed218955c  corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.6.20060mlcs4.x86_64.rpm 
 0e75c0ceca12cc7eeb93a32cb415effa  corporate/4.0/SRPMS/freetype2-2.1.10-9.6.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 f80e2f5f4bc935846ee4daa624112574  mnf/2.0/i586/libfreetype6-2.1.7-4.5.M20mdk.i586.rpm 
 e3dc2d5b741f17859470c33d8ce604b3  mnf/2.0/SRPMS/freetype2-2.1.7-4.5.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGcHGEmqjQ0CJFipgRAh6gAJ49y7N+YB1EuLHOrYatxmwDGPodGACg7SR2
JTRfcDYDHaGNld+xLVHwqlc=
=thb1
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ