lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1RhnFk-0000zS-Jr@titan.mandriva.com>
Date: Mon, 02 Jan 2012 20:09:00 +0100
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2012:002 ] t1lib

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:002
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : t1lib
 Date    : January 2, 2012
 Affected: 2010.1, 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in t1lib:
 
 t1lib 5.1.2 and earlier uses an invalid pointer in conjunction with
 a dereference operation, which allows remote attackers to execute
 arbitrary code via a specially crafted Type 1 font in a PDF document
 (CVE-2011-0764).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2010.1:
 736337c41d7a950e14295f328745fd27  2010.1/i586/libt1lib5-5.1.2-8.2mdv2010.2.i586.rpm
 813152c5481cf07cd8d99c2f0869a59a  2010.1/i586/libt1lib-devel-5.1.2-8.2mdv2010.2.i586.rpm
 c06988fef2ca8807fa5f4cf93f7c6028  2010.1/i586/libt1lib-static-devel-5.1.2-8.2mdv2010.2.i586.rpm
 6cf4ba79e30bd53541a4f07a39084911  2010.1/i586/t1lib-config-5.1.2-8.2mdv2010.2.i586.rpm
 60d961c0411c0c98b547c623c03541b1  2010.1/i586/t1lib-progs-5.1.2-8.2mdv2010.2.i586.rpm 
 f03a530d559e867382eb6019c9d72271  2010.1/SRPMS/t1lib-5.1.2-8.2mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 ebdf62d8fcc239056b321add6f465d14  2010.1/x86_64/lib64t1lib5-5.1.2-8.2mdv2010.2.x86_64.rpm
 211d1f28995b631a524f484ffc0bf6f1  2010.1/x86_64/lib64t1lib-devel-5.1.2-8.2mdv2010.2.x86_64.rpm
 d23e081377659e1052bb938373159aa2  2010.1/x86_64/lib64t1lib-static-devel-5.1.2-8.2mdv2010.2.x86_64.rpm
 dce8a152687348ae926c16eb8149409c  2010.1/x86_64/t1lib-config-5.1.2-8.2mdv2010.2.x86_64.rpm
 d757fde4ed8a3211143e1e5c22a65cc0  2010.1/x86_64/t1lib-progs-5.1.2-8.2mdv2010.2.x86_64.rpm 
 f03a530d559e867382eb6019c9d72271  2010.1/SRPMS/t1lib-5.1.2-8.2mdv2010.2.src.rpm

 Mandriva Linux 2011:
 b1d91af6ae3ad03f3b3328aabef3491a  2011/i586/libt1lib5-5.1.2-11.1-mdv2011.0.i586.rpm
 236e2c32254f8a57352ac083e5bbd207  2011/i586/libt1lib-devel-5.1.2-11.1-mdv2011.0.i586.rpm
 945a94f1f6e1da103be813fe567503e3  2011/i586/libt1lib-static-devel-5.1.2-11.1-mdv2011.0.i586.rpm
 a88e481bd9e7dd898cfbd44e7419708d  2011/i586/t1lib-config-5.1.2-11.1-mdv2011.0.i586.rpm
 c9c78d2627b7851b5a9580258316c1a2  2011/i586/t1lib-progs-5.1.2-11.1-mdv2011.0.i586.rpm 
 7eaa61424b8c70df589144ac4f94f0e8  2011/SRPMS/t1lib-5.1.2-11.1.src.rpm

 Mandriva Linux 2011/X86_64:
 c614966e22c3e938b1d6b281198d8c65  2011/x86_64/lib64t1lib5-5.1.2-11.1-mdv2011.0.x86_64.rpm
 58302f9a21cd083b07bb4d11d2f33025  2011/x86_64/lib64t1lib-devel-5.1.2-11.1-mdv2011.0.x86_64.rpm
 f02a3ba5f9b92975d3e8f57ce5e1c9bc  2011/x86_64/lib64t1lib-static-devel-5.1.2-11.1-mdv2011.0.x86_64.rpm
 6031e97c0a98a94bf02676fb55a25bc3  2011/x86_64/t1lib-config-5.1.2-11.1-mdv2011.0.x86_64.rpm
 a4823d7fa62693b958075f6636b2d80a  2011/x86_64/t1lib-progs-5.1.2-11.1-mdv2011.0.x86_64.rpm 
 7eaa61424b8c70df589144ac4f94f0e8  2011/SRPMS/t1lib-5.1.2-11.1.src.rpm

 Mandriva Enterprise Server 5:
 3dc617bc21b08591bc6d0bce378e932e  mes5/i586/libt1lib5-5.1.2-4.2mdvmes5.2.i586.rpm
 725ec350e47e98781c1878e8319c6816  mes5/i586/libt1lib-devel-5.1.2-4.2mdvmes5.2.i586.rpm
 c65f8176917dcc140925ba003314790b  mes5/i586/libt1lib-static-devel-5.1.2-4.2mdvmes5.2.i586.rpm
 f2d805d204260d1337b76165f85facaf  mes5/i586/t1lib-config-5.1.2-4.2mdvmes5.2.i586.rpm
 6724eaf4fe88225bd7efc8a2fb4729aa  mes5/i586/t1lib-progs-5.1.2-4.2mdvmes5.2.i586.rpm 
 4ad34410ac6ced36e2ead5bf4d6c901a  mes5/SRPMS/t1lib-5.1.2-4.2mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 ddff1845d1c1c7e910f177c6ec5db490  mes5/x86_64/lib64t1lib5-5.1.2-4.2mdvmes5.2.x86_64.rpm
 eb7f4ca434bd133e0e5fb4f87f25d775  mes5/x86_64/lib64t1lib-devel-5.1.2-4.2mdvmes5.2.x86_64.rpm
 8732ecfba47434c69b44aed240ca3f13  mes5/x86_64/lib64t1lib-static-devel-5.1.2-4.2mdvmes5.2.x86_64.rpm
 105a1b571853b1958f788a27d8717566  mes5/x86_64/t1lib-config-5.1.2-4.2mdvmes5.2.x86_64.rpm
 6ce1bfcbf6edbca9e4110bf9b3118907  mes5/x86_64/t1lib-progs-5.1.2-4.2mdvmes5.2.x86_64.rpm 
 4ad34410ac6ced36e2ead5bf4d6c901a  mes5/SRPMS/t1lib-5.1.2-4.2mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPAdMwmqjQ0CJFipgRAmZMAJ47lFJRJE8OtRkY+vlJtwEwIMHVHACg0LlP
ROT/onXPZhr3Y8R2Z1Iqcus=
=Q9Q6
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ