[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1RSY1F-0002LA-CK@titan.mandriva.com>
Date: Mon, 21 Nov 2011 18:51:01 +0100
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2011:177 ] freetype2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2011:177
http://www.mandriva.com/security/
_______________________________________________________________________
Package : freetype2
Date : November 21, 2011
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been discovered and corrected in freetype2:
FreeType allows remote attackers to execute arbitrary code or cause a
denial of service (memory corruption) via a crafted font in a document
(CVE-2011-3439).
The updated packages have been patched to correct these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2010.1:
ae0f53491bcf584d4654b07553141a52 2010.1/i586/libfreetype6-2.3.12-1.8mdv2010.2.i586.rpm
6475e532d3fd4392959e47e9ee363510 2010.1/i586/libfreetype6-devel-2.3.12-1.8mdv2010.2.i586.rpm
f611c34743c08421b28201ec14d4a7f3 2010.1/i586/libfreetype6-static-devel-2.3.12-1.8mdv2010.2.i586.rpm
f3de152e4ddb62342d2cb1fcea834303 2010.1/SRPMS/freetype2-2.3.12-1.8mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64:
698cbd16590fc808eb9472a9c044faf4 2010.1/x86_64/lib64freetype6-2.3.12-1.8mdv2010.2.x86_64.rpm
11c4c173faa05524566af100c6ebe41b 2010.1/x86_64/lib64freetype6-devel-2.3.12-1.8mdv2010.2.x86_64.rpm
73eadaf1dd762f3c8c9f10f34c2a67de 2010.1/x86_64/lib64freetype6-static-devel-2.3.12-1.8mdv2010.2.x86_64.rpm
f3de152e4ddb62342d2cb1fcea834303 2010.1/SRPMS/freetype2-2.3.12-1.8mdv2010.2.src.rpm
Mandriva Linux 2011:
e0adff2d732e1771e1921d72169ca4b7 2011/i586/freetype2-demos-2.4.5-2.2-mdv2011.0.i586.rpm
bf25705a35f331d9a53a537bdeb79fdb 2011/i586/libfreetype6-2.4.5-2.2-mdv2011.0.i586.rpm
bbe1ce316eba76d6e4a8a5847ae44dc5 2011/i586/libfreetype6-devel-2.4.5-2.2-mdv2011.0.i586.rpm
7cc8ef092ccf50fdcf5e973b1c907b9f 2011/i586/libfreetype6-static-devel-2.4.5-2.2-mdv2011.0.i586.rpm
50fef33dbe18888528e8e61471777df6 2011/SRPMS/freetype2-2.4.5-2.2.src.rpm
Mandriva Linux 2011/X86_64:
39e263d8b04c5f4e97a73ba51f3fc200 2011/x86_64/freetype2-demos-2.4.5-2.2-mdv2011.0.x86_64.rpm
628964be9f606d92a0880624d208c184 2011/x86_64/lib64freetype6-2.4.5-2.2-mdv2011.0.x86_64.rpm
2f8d19012d12a07e8d5bf35145d13f4d 2011/x86_64/lib64freetype6-devel-2.4.5-2.2-mdv2011.0.x86_64.rpm
57ae10111448bc9cb648c541e5dbd196 2011/x86_64/lib64freetype6-static-devel-2.4.5-2.2-mdv2011.0.x86_64.rpm
50fef33dbe18888528e8e61471777df6 2011/SRPMS/freetype2-2.4.5-2.2.src.rpm
Mandriva Enterprise Server 5:
b9b8ee42885918af3f77332c48b05936 mes5/i586/libfreetype6-2.3.7-1.9mdvmes5.2.i586.rpm
146a3977f324b1a54c28abfc94c18a91 mes5/i586/libfreetype6-devel-2.3.7-1.9mdvmes5.2.i586.rpm
25683658ff4e5716b60456dbfe11224b mes5/i586/libfreetype6-static-devel-2.3.7-1.9mdvmes5.2.i586.rpm
66fb94dddbc6df45e5b1ec5d726458ec mes5/SRPMS/freetype2-2.3.7-1.9mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
5624556f88a090c359cd805efa13385f mes5/x86_64/lib64freetype6-2.3.7-1.9mdvmes5.2.x86_64.rpm
cc6788b438137432858e8e753ced9fc3 mes5/x86_64/lib64freetype6-devel-2.3.7-1.9mdvmes5.2.x86_64.rpm
a4e5f4430dc1a74d02fb1574a7fd2b9e mes5/x86_64/lib64freetype6-static-devel-2.3.7-1.9mdvmes5.2.x86_64.rpm
66fb94dddbc6df45e5b1ec5d726458ec mes5/SRPMS/freetype2-2.3.7-1.9mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFOymJJmqjQ0CJFipgRArgbAKCe/NiGUsXrmR+Q5XLa3QcTTms7CgCgrgxI
HenoG428VcBeYFhd5EhHmLM=
=V3c9
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists