lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1RlOC0-0005CU-IM@titan.mandriva.com>
Date: Thu, 12 Jan 2012 18:12:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2012:004 ] t1lib

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:004
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : t1lib
 Date    : January 12, 2012
 Affected: 2010.1, 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in t1lib:
 
 A heap-based buffer overflow flaw was found in the way AFM font file
 parser, used for rendering of DVI files, in GNOME evince document
 viewer and other products, processed line tokens from the given input
 stream. A remote attacker could provide a DVI file, with embedded
 specially-crafted font file, and trick the local user to open it with
 an application using the AFM font parser, leading to that particular
 application crash or, potentially, arbitrary code execution with the
 privileges of the user running the application. Different vulnerability
 than CVE-2010-2642 (CVE-2011-0433).
 
 t1lib 5.1.2 and earlier reads from invalid memory locations, which
 allows remote attackers to cause a denial of service (application
 crash) via a crafted Type 1 font in a PDF document, a different
 vulnerability than CVE-2011-0764 (CVE-2011-1552).
 
 Use-after-free vulnerability in t1lib 5.1.2 and earlier allows
 remote attackers to cause a denial of service (application crash)
 via a PDF document containing a crafted Type 1 font that triggers an
 invalid memory write, a different vulnerability than CVE-2011-0764
 (CVE-2011-1553).
 
 Off-by-one error in t1lib 5.1.2 and earlier allows remote attackers
 to cause a denial of service (application crash) via a PDF document
 containing a crafted Type 1 font that triggers an invalid memory
 read, integer overflow, and invalid pointer dereference, a different
 vulnerability than CVE-2011-0764 (CVE-2011-1554).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554
 https://bugzilla.redhat.com/show_bug.cgi?id=679732
 http://www.toucan-system.com/advisories/tssa-2011-01.txt
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2010.1:
 906e9b289b52af0b8cd8876cea5a662a  2010.1/i586/libt1lib5-5.1.2-8.3mdv2010.2.i586.rpm
 7e2588f8d40dde88a76762c655561cd4  2010.1/i586/libt1lib-devel-5.1.2-8.3mdv2010.2.i586.rpm
 3f52b411430b7c121f3f5c3e6208fa35  2010.1/i586/libt1lib-static-devel-5.1.2-8.3mdv2010.2.i586.rpm
 0819703d1a566dbb89ef2a20aac7eab3  2010.1/i586/t1lib-config-5.1.2-8.3mdv2010.2.i586.rpm
 0a27570fe99a3c8b0060658e80fa31a9  2010.1/i586/t1lib-progs-5.1.2-8.3mdv2010.2.i586.rpm 
 1330f9cde66d30a4e0b6adfea3ed627c  2010.1/SRPMS/t1lib-5.1.2-8.3mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 4a750fd24b6023d30a40b86146c7c3cf  2010.1/x86_64/lib64t1lib5-5.1.2-8.3mdv2010.2.x86_64.rpm
 33d849053852d299235845f5d6f89d31  2010.1/x86_64/lib64t1lib-devel-5.1.2-8.3mdv2010.2.x86_64.rpm
 49c35baf2d21c037d3c418970d76f7fc  2010.1/x86_64/lib64t1lib-static-devel-5.1.2-8.3mdv2010.2.x86_64.rpm
 289fd06ba3966e353e0ddee95f9d482f  2010.1/x86_64/t1lib-config-5.1.2-8.3mdv2010.2.x86_64.rpm
 df7434fc99f8ddabe69dfb094e37f807  2010.1/x86_64/t1lib-progs-5.1.2-8.3mdv2010.2.x86_64.rpm 
 1330f9cde66d30a4e0b6adfea3ed627c  2010.1/SRPMS/t1lib-5.1.2-8.3mdv2010.2.src.rpm

 Mandriva Linux 2011:
 4f34e6057ce31346d38e9fc9001d61c2  2011/i586/libt1lib5-5.1.2-11.2-mdv2011.0.i586.rpm
 77aa1a06d09601db56f3fc05bf9faa7e  2011/i586/libt1lib-devel-5.1.2-11.2-mdv2011.0.i586.rpm
 222228ade6add3fd7125ed8bb36d27da  2011/i586/libt1lib-static-devel-5.1.2-11.2-mdv2011.0.i586.rpm
 9b7b97c247969ee2d19168b8292e2421  2011/i586/t1lib-config-5.1.2-11.2-mdv2011.0.i586.rpm
 ed73e55ca60889ce0b2be65d963c08ce  2011/i586/t1lib-progs-5.1.2-11.2-mdv2011.0.i586.rpm 
 94fd5bc64f8e01f1687b5c58c99c5b35  2011/SRPMS/t1lib-5.1.2-11.2.src.rpm

 Mandriva Linux 2011/X86_64:
 d670c2d035cabd66078503e9fb975919  2011/x86_64/lib64t1lib5-5.1.2-11.2-mdv2011.0.x86_64.rpm
 173579a5a2e2be525e6f0f18216a15d8  2011/x86_64/lib64t1lib-devel-5.1.2-11.2-mdv2011.0.x86_64.rpm
 7c591e3e11d340923fbb3c5285fc9365  2011/x86_64/lib64t1lib-static-devel-5.1.2-11.2-mdv2011.0.x86_64.rpm
 b3d85f999794d5ced9dda7e1ebd44bd0  2011/x86_64/t1lib-config-5.1.2-11.2-mdv2011.0.x86_64.rpm
 430daefeed13b85e4df03de1e2ba6b73  2011/x86_64/t1lib-progs-5.1.2-11.2-mdv2011.0.x86_64.rpm 
 94fd5bc64f8e01f1687b5c58c99c5b35  2011/SRPMS/t1lib-5.1.2-11.2.src.rpm

 Mandriva Enterprise Server 5:
 617329fd6d27f015da5063d4122d7414  mes5/i586/libt1lib5-5.1.2-4.3mdvmes5.2.i586.rpm
 cd261ce6f85f3830c90145637e8189b3  mes5/i586/libt1lib-devel-5.1.2-4.3mdvmes5.2.i586.rpm
 d544329a165b971a0aea3fce24dd2084  mes5/i586/libt1lib-static-devel-5.1.2-4.3mdvmes5.2.i586.rpm
 3f287590d1eeeec0758fc9b41b814b80  mes5/i586/t1lib-config-5.1.2-4.3mdvmes5.2.i586.rpm
 ae2a57893d1daa1b21c798181d87e8c0  mes5/i586/t1lib-progs-5.1.2-4.3mdvmes5.2.i586.rpm 
 00d9c9fe6fdea354b2ae5829ad69186d  mes5/SRPMS/t1lib-5.1.2-4.3mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 a5834c68430fa0983aa5f86eb30d548d  mes5/x86_64/lib64t1lib5-5.1.2-4.3mdvmes5.2.x86_64.rpm
 de4489f06460799dd96a16c59961a7d7  mes5/x86_64/lib64t1lib-devel-5.1.2-4.3mdvmes5.2.x86_64.rpm
 6ee693bfba9b31dacb6d63e3be6a7278  mes5/x86_64/lib64t1lib-static-devel-5.1.2-4.3mdvmes5.2.x86_64.rpm
 5b653b672c557f8ac0b24f7d9bacc182  mes5/x86_64/t1lib-config-5.1.2-4.3mdvmes5.2.x86_64.rpm
 405cb3191a475b026d146782c3c236fb  mes5/x86_64/t1lib-progs-5.1.2-4.3mdvmes5.2.x86_64.rpm 
 00d9c9fe6fdea354b2ae5829ad69186d  mes5/SRPMS/t1lib-5.1.2-4.3mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPDuaZmqjQ0CJFipgRAnPJAJ9mYAnw85yoh9c9tBFnvAiPQyMqwACfXTY2
KbTRllp+EhE/rMY4I4zgqoo=
=mYB5
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ