Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVSA-2008:121-1 ] freetype2

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1225480812-14940-1817

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Security Advisory MDVSA-2008:121-1

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : freetype2

Date : October 31, 2008

Affected: Corporate 3.0, Corporate 4.0, Multi Network Firewall 2.0

_______________________________________________________________________

 

Problem Description:

 

Multiple vulnerabilities were discovered in FreeType's Printer

Font Binary (PFB) font-file format parser. If a user were to load a

carefully crafted font file with a program linked against FreeType, it

could cause the application to crash or potentially execute arbitrary

code (CVE-2008-1806, CVE-2008-1807, CVE-2008-1808).

 

The updated packages have been patched to prevent this issue.

 

Update:

 

The patches used to correct the problem on Corporate Server 4.0 and

Corporate 3.0 contained a problem where certain fonts would not be

displayed and would cause applications, such as drakfont, to crash.

This update corrects the regression.

_______________________________________________________________________

 

References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808

https://qa.mandriva.com/45350

_______________________________________________________________________

 

Updated Packages:

 

Corporate 3.0:

10bc65d19c7ffb41cc0a942743f2024f corporate/3.0/i586/libfreetype6-2.1.7-4.7.C30mdk.i586.rpm

9f001f0e2f90e8ce736f1c9394c880dc corporate/3.0/i586/libfreetype6-devel-2.1.7-4.7.C30mdk.i586.rpm

547f573b07d7c440523d3e0b9b80862f corporate/3.0/i586/libfreetype6-static-devel-2.1.7-4.7.C30mdk.i586.rpm

6145881addf92048de2d974499dfa744 corporate/3.0/SRPMS/freetype2-2.1.7-4.7.C30mdk.src.rpm

 

Corporate 3.0/X86_64:

1fd7ce0fc7ecaae5372d0c48d571c4c3 corporate/3.0/x86_64/lib64freetype6-2.1.7-4.7.C30mdk.x86_64.rpm

536cf56aa4d1cda0ba57efc20f1d6d82 corporate/3.0/x86_64/lib64freetype6-devel-2.1.7-4.7.C30mdk.x86_64.rpm

3ae4115db4b418291a4847efa2981225 corporate/3.0/x86_64/lib64freetype6-static-devel-2.1.7-4.7.C30mdk.x86_64.rpm

6145881addf92048de2d974499dfa744 corporate/3.0/SRPMS/freetype2-2.1.7-4.7.C30mdk.src.rpm

 

Corporate 4.0:

31c49be01e2eea8244eae4713af3e655 corporate/4.0/i586/libfreetype6-2.1.10-9.8.20060mlcs4.i586.rpm

b173159062c74e26ba2ad9c1e4c61cd9 corporate/4.0/i586/libfreetype6-devel-2.1.10-9.8.20060mlcs4.i586.rpm

e5a90208d2a5643f3884d1b3f0fa15ec corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.8.20060mlcs4.i586.rpm

6bf2a907f843cf288527fc9119e9278c corporate/4.0/SRPMS/freetype2-2.1.10-9.8.20060mlcs4.src.rpm

 

Corporate 4.0/X86_64:

73f26c9a34918a8bf0f401a2cc10b791 corporate/4.0/x86_64/lib64freetype6-2.1.10-9.8.20060mlcs4.x86_64.rpm

147185a6093063ec016bd7415c24c68c corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.8.20060mlcs4.x86_64.rpm

8d4565b5c527bc168e7261845d707b38 corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.8.20060mlcs4.x86_64.rpm

6bf2a907f843cf288527fc9119e9278c corporate/4.0/SRPMS/freetype2-2.1.10-9.8.20060mlcs4.src.rpm

 

Multi Network Firewall 2.0:

10bc65d19c7ffb41cc0a942743f2024f mnf/2.0/i586/libfreetype6-2.1.7-4.7.C30mdk.i586.rpm

6145881addf92048de2d974499dfa744 mnf/2.0/SRPMS/freetype2-2.1.7-4.7.C30mdk.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFJCy++mqjQ0CJFipgRAqXlAJ99lrbUzZ1lnnLnmAIhepN/E7c2FgCgvkxn

l5l2p09pFUWPyhsZDhZ6/lI=

=lwOI

-----END PGP SIGNATURE-----

 

 

------------=_1225480812-14940-1817

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1225480812-14940-1817--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×