[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060922131929.GA4640@tsunami.trustix.net>
Date: Fri, 22 Sep 2006 14:19:29 +0100
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2006-0052 - multi
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0052
Package names: freetype, gnutls, gzip
Summary: Multiple vulnerabilities
Date: 2006-09-22
Affected versions: Trustix Secure Linux 2.2
Trustix Secure Linux 3.0
Trustix Operating System - Enterprise Server 2
- --------------------------------------------------------------------------
Package description:
freetype
The FreeType engine is a free and portable TrueType font rendering
engine, developed to provide TrueType support for a variety of
platforms and environments. FreeType is a library which can open and
manages font files as well as efficiently load, hint and render
individual glyphs. FreeType is not a font server or a complete
text-rendering library.
gnutls
GnuTLS is a project that aims to develop a library which provides a
secure layer, over a reliable transport layer. Currently the GnuTLS
library implements the proposed standards by the IETF's TLS working
group.
gzip
The gzip package contains the popular GNU gzip data compression
program. Gzipped files have a .gz extension.
Problem description:
freetype < TSL 3.0 > < TSL 2.2 >
- New Upstream.
- Enable bytecode hinting, Bug #1933.
- SECURITY FIX: Chris Evans discovered several integer underflow
and overflow flaws in the FreeType font engine. If a specially
crafted font file that, when loaded by the target user's system,
will trigger an integer underflow or integer overflow and crash
the application or execute arbitrary code on the target system.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2006-3467 to this issue.
gnutls < TSL 3.0 >
- SECURITY Fix: A vulnerability has been reported in GnuTLS, caused
due to an error in the verification of certain signatures. If a
RSA key with exponent 3 is used, it may be possible to forge PKCS
#1 v1.5 signatures signed with that key.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2006-4790 to this issue.
gzip < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: Tavis Ormandy, Google Security Team, has reported
some vulnerabilities in gzip, which can be exploited by malicious
people to cause a DoS and potentially compromise a vulnerable system.
- Fix null pointer dereference that may lead to denial of service if
gzip is used in an automated manner.
- A boundary error within the "make_table()" function in unlzh.c can be
used to modify certain stack data. This can be exploited to cause a
DoS and potentially allows to execute arbitrary code.
- A buffer underflow exists within the "build_tree()" function in
unpack.c, which can be exploited to cause a DoS and potentially
allows to execute arbitrary code.
- A buffer overflow within the "make_table()" function of gzip's LZH
support can be exploited to cause a DoS and potentially to compromise
a vulnerable system by e.g. tricking a user or automated system into
unpacking an archive containing a specially crafted decoding table.
- unlzh.c in the LHZ component in gzip allows context-dependent
attackers to cause a denial of service (infinite loop) via a crafted
GZIP archive.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2006-4334, CVE-2006-4335, CVE-2006-4336,
CVE-2006-4337 and CVE-2006-4338 to these issues.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.2/> and
<URI:http://www.trustix.org/errata/trustix-3.0/>
or directly at
<URI:http://www.trustix.org/errata/2006/0052/>
MD5sums of the packages:
- --------------------------------------------------------------------------
ce2058e75ca81dc44f29afdbf3082681 3.0/rpms/freetype-2.2.1-1tr.i586.rpm
8039bce6fc164a1bc3b7cf8ee681ba2d 3.0/rpms/freetype-devel-2.2.1-1tr.i586.rpm
f1e92a14c9df6a1b3598885b88f0d70f 3.0/rpms/gnutls-1.2.4-4tr.i586.rpm
21fd545269725dc5fa617f4d7c2bfd0a 3.0/rpms/gnutls-devel-1.2.4-4tr.i586.rpm
e3fd30ee23b80c8a8dd9e56e2645b251 3.0/rpms/gzip-1.3.5-7tr.i586.rpm
a5202fec43fc873f1ed910bc38b9cf31 3.0/rpms/gzip-doc-1.3.5-7tr.i586.rpm
10ee8e7f85956a5290c314263f177fd5 2.2/rpms/freetype-2.2.1-1tr.i586.rpm
fde86196c3f634031912964c87303cad 2.2/rpms/freetype-devel-2.2.1-1tr.i586.rpm
3062d3f81b8ed3545140f5b9008f6abe 2.2/rpms/gzip-1.3.5-1tr.i586.rpm
3892f7f5adc3a788dc5960c3c898e536 2.2/rpms/gzip-doc-1.3.5-1tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
iD8DBQFFE95Fi8CEzsK9IksRAiqoAJ4/DlKRqVI6HiA2iVX3rQHh/S/YsACfbZbz
SYSB3IQjwutMZPShB/k9zW4=
=PNZm
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists