[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ MDVSA-2009:243 ] freetype2
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: [ MDVSA-2009:243 ] freetype2
- From: security@xxxxxxxxxxxx
- Date: Wed, 23 Sep 2009 03:00:00 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:243
http://www.mandriva.com/security/
_______________________________________________________________________
Package : freetype2
Date : September 22, 2009
Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote
attackers to execute arbitrary code via vectors related to large
values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c,
and (3) cff/cffload.c.
This update corrects the problem.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2008.1:
d5813fc6271ea7cd76ab738f271c1c6a
2008.1/i586/libfreetype6-2.3.5-2.2mdv2008.1.i586.rpm
c1d6a29ad9592d63362e224e2fa0ce9d
2008.1/i586/libfreetype6-devel-2.3.5-2.2mdv2008.1.i586.rpm
46672c2a86d0ac243b1388a1e39a7943
2008.1/i586/libfreetype6-static-devel-2.3.5-2.2mdv2008.1.i586.rpm
bd4f836f5d6f1a596b4fb50a06e426a5
2008.1/SRPMS/freetype2-2.3.5-2.2mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
fc6bd0f2a79571f953b02de4597b3ddf
2008.1/x86_64/lib64freetype6-2.3.5-2.2mdv2008.1.x86_64.rpm
6f6fcaf9581327d76471ce65cbb65ce3
2008.1/x86_64/lib64freetype6-devel-2.3.5-2.2mdv2008.1.x86_64.rpm
43dcd82a908ab2cd944f80f2dd498372
2008.1/x86_64/lib64freetype6-static-devel-2.3.5-2.2mdv2008.1.x86_64.rpm
bd4f836f5d6f1a596b4fb50a06e426a5
2008.1/SRPMS/freetype2-2.3.5-2.2mdv2008.1.src.rpm
Mandriva Linux 2009.0:
e675dac353da86d4b27d89f83d433d7c
2009.0/i586/libfreetype6-2.3.7-1.1mdv2009.0.i586.rpm
fc323957e95386422436340b4a79a12f
2009.0/i586/libfreetype6-devel-2.3.7-1.1mdv2009.0.i586.rpm
c7b9d6455335bb5bdd52134ddf077bfd
2009.0/i586/libfreetype6-static-devel-2.3.7-1.1mdv2009.0.i586.rpm
665da3ab3aa91a1305433eac968ac860
2009.0/SRPMS/freetype2-2.3.7-1.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64:
fe1d8dd6b394f7f9b01c2c182a02e3f5
2009.0/x86_64/lib64freetype6-2.3.7-1.1mdv2009.0.x86_64.rpm
49ba1b9ba70693d3d967cd4841bf511f
2009.0/x86_64/lib64freetype6-devel-2.3.7-1.1mdv2009.0.x86_64.rpm
7e94ab32121eead1da0ce0b2949ea78c
2009.0/x86_64/lib64freetype6-static-devel-2.3.7-1.1mdv2009.0.x86_64.rpm
665da3ab3aa91a1305433eac968ac860
2009.0/SRPMS/freetype2-2.3.7-1.1mdv2009.0.src.rpm
Mandriva Linux 2009.1:
e42b5e07235426f4e707648e8e4bf1d8
2009.1/i586/libfreetype6-2.3.9-1.1mdv2009.1.i586.rpm
bd6793892e643b323be785cd97d9c86f
2009.1/i586/libfreetype6-devel-2.3.9-1.1mdv2009.1.i586.rpm
475aa6ff9b332a3bd87da4de4b35cc7d
2009.1/i586/libfreetype6-static-devel-2.3.9-1.1mdv2009.1.i586.rpm
e63725b32587585dbe228f972e1e2380
2009.1/SRPMS/freetype2-2.3.9-1.1mdv2009.1.src.rpm
Mandriva Linux 2009.1/X86_64:
25b3e15ad48a854303030162b787db3a
2009.1/x86_64/lib64freetype6-2.3.9-1.1mdv2009.1.x86_64.rpm
8440c7b2ae4e4a086cefe1fe2e6ff570
2009.1/x86_64/lib64freetype6-devel-2.3.9-1.1mdv2009.1.x86_64.rpm
e27316a1f606abb8fc48777b8463ddb3
2009.1/x86_64/lib64freetype6-static-devel-2.3.9-1.1mdv2009.1.x86_64.rpm
e63725b32587585dbe228f972e1e2380
2009.1/SRPMS/freetype2-2.3.9-1.1mdv2009.1.src.rpm
Corporate 3.0:
f948c36866c4e88a57c2b86981cb0572
corporate/3.0/i586/libfreetype6-2.1.7-4.1mdk.i586.rpm
e13e1f739ad2d23a8650b84b7c8a835e
corporate/3.0/i586/libfreetype6-devel-2.1.7-4.1mdk.i586.rpm
3a51bd81a15f0ce1a8c9383cbb0f4303
corporate/3.0/i586/libfreetype6-static-devel-2.1.7-4.1mdk.i586.rpm
8a55e71067dec4650b2b87ced560df1f
corporate/3.0/SRPMS/freetype2-2.1.7-4.1mdk.src.rpm
Corporate 3.0/X86_64:
abb9d88c1a86f57a74de59ed7be92439
corporate/3.0/x86_64/lib64freetype6-2.1.7-4.1mdk.x86_64.rpm
406752a5824f847e2e79a7df364400b6
corporate/3.0/x86_64/lib64freetype6-devel-2.1.7-4.1mdk.x86_64.rpm
0a11ca2598811ea3682443ddc48516cf
corporate/3.0/x86_64/lib64freetype6-static-devel-2.1.7-4.1mdk.x86_64.rpm
8a55e71067dec4650b2b87ced560df1f
corporate/3.0/SRPMS/freetype2-2.1.7-4.1mdk.src.rpm
Corporate 4.0:
c7354faa30ceaf8ba7a4b9b1cc8ebac8
corporate/4.0/i586/libfreetype6-2.1.10-9.5.20060mdk.i586.rpm
2e372e7929e098a2252625a68f796021
corporate/4.0/i586/libfreetype6-devel-2.1.10-9.5.20060mdk.i586.rpm
700b134ae5e9be79d821d4fc1c3d4f62
corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.5.20060mdk.i586.rpm
851e39d15b46e39c0397843094404bec
corporate/4.0/SRPMS/freetype2-2.1.10-9.5.20060mdk.src.rpm
Corporate 4.0/X86_64:
2dac67bf3e415120ec46088c1f730cf6
corporate/4.0/x86_64/lib64freetype6-2.1.10-9.5.20060mdk.x86_64.rpm
a8fdded81e8d96ece2df2bf04c1023ac
corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.5.20060mdk.x86_64.rpm
4868760c912eb7328149351fbb49ee2c
corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.5.20060mdk.x86_64.rpm
851e39d15b46e39c0397843094404bec
corporate/4.0/SRPMS/freetype2-2.1.10-9.5.20060mdk.src.rpm
Mandriva Enterprise Server 5:
d4cb24a13958abfa18a879aa5b98172f
mes5/i586/libfreetype6-2.3.7-1.1mdvmes5.i586.rpm
9d43b837f18818f660a4d03c608418fe
mes5/i586/libfreetype6-devel-2.3.7-1.1mdvmes5.i586.rpm
400ba426ca88b7fbc408e3419b5d4881
mes5/i586/libfreetype6-static-devel-2.3.7-1.1mdvmes5.i586.rpm
ac2f712eef4f39dd3f0f755f6871bed8 mes5/SRPMS/freetype2-2.3.7-1.1mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64:
4d1ede220e16a886ac25133e77a65c38
mes5/x86_64/lib64freetype6-2.3.7-1.1mdvmes5.x86_64.rpm
56208bca0368645b8956454fa0ea137f
mes5/x86_64/lib64freetype6-devel-2.3.7-1.1mdvmes5.x86_64.rpm
7ff2a5b36638eb0891d92424f47263b4
mes5/x86_64/lib64freetype6-static-devel-2.3.7-1.1mdvmes5.x86_64.rpm
ac2f712eef4f39dd3f0f755f6871bed8 mes5/SRPMS/freetype2-2.3.7-1.1mdvmes5.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKuURymqjQ0CJFipgRAnkgAKCQ0Y8WEXGflapRGnPN6CRToCntXwCgpP/5
ObOaPsOaq04breeG9P/xixA=
=WbYT
-----END PGP SIGNATURE-----