DSA 1178-1: New freetype packages fix execution of arbitrary code
Posted on: 09/16/2006 08:55 PM

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1178-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
September 16th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : freetype
Vulnerability : integer overflow
Problem-Type : local(remote)
Debian-specific: no
CVE ID : CVE-2006-3467
Debian Bug : 379920

It was discovered that an integer overflow in freetype's PCF font code
may lead to denial of service and potential execution of arbitrary code.

For the stable distribution (sarge) this problem has been fixed in
version 2.1.7-6.

For the unstable distribution (sid) this problem has been fixed in
version 2.2.1-5.

We recommend that you upgrade your freetype package.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/f/freetype/freetype_2.1.7-6.dsc
Size/MD5 checksum: 754 76dbe18b57a53fac328a1f8e00f54bd0
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.1.7-6.diff.gz
Size/MD5 checksum: 57568 860e9383bba7d853ce6f758c239e89ed
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.1.7.orig.tar.gz
Size/MD5 checksum: 1245623 991ff86e88b075ba363e876f4ea58680

Alpha architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_alpha.deb
Size/MD5 checksum: 88180 697811d9160b950b3d73682701f14e3c
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_alpha.deb
Size/MD5 checksum: 422838 635b31efebdb8fb192f7ee717a5e79f1
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_alpha.deb
Size/MD5 checksum: 784368 3d90ddefa034bae14101e1f9057efda7

AMD64 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_amd64.deb
Size/MD5 checksum: 76242 73b70a41effc140791d6b58cf8d3a103
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_amd64.deb
Size/MD5 checksum: 390236 6b1c46c525b13bf78e6aa6adfe876300
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_amd64.deb
Size/MD5 checksum: 723742 e8cfab359664bd05c9606e21b632c9d6

ARM architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_arm.deb
Size/MD5 checksum: 58734 5535bb49abfbdb3a9add023c2f21fe07
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_arm.deb
Size/MD5 checksum: 352880 7dcc3438f6e69b8956244f3946038897
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_arm.deb
Size/MD5 checksum: 714518 6cae07f317c33b3f2f5de4e6209b3154

HP Precision architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_hppa.deb
Size/MD5 checksum: 80772 94c00e9be0020ec69779bb2961dedcc2
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_hppa.deb
Size/MD5 checksum: 407420 32967b0b193f09fdbfcf1a0f55cff736
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_hppa.deb
Size/MD5 checksum: 734434 7cb208545154507cf3462af986575e35

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_i386.deb
Size/MD5 checksum: 63190 5c65822f534a53c3f88c72cc32253f37
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_i386.deb
Size/MD5 checksum: 364858 555ba61fec5d41a3759f08bc330b9dff
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_i386.deb
Size/MD5 checksum: 695074 81249aa29df653e228162b59f55da8a3

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_ia64.deb
Size/MD5 checksum: 102616 8cfcca90b20054ab717d669c1109166c
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_ia64.deb
Size/MD5 checksum: 493792 eea2110b00ae876e0621365278628865
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_ia64.deb
Size/MD5 checksum: 844018 2351fd3f7be66cea09bb68ae99407805

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_m68k.deb
Size/MD5 checksum: 43862 a0ad63b48cef0fcd6d620e9eea56dcfd
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_m68k.deb
Size/MD5 checksum: 359672 e66cdcceff0149866934d8330a10be7f
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_m68k.deb
Size/MD5 checksum: 678786 2c12367dd397823d71c58ecc4db0f4a5

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_mips.deb
Size/MD5 checksum: 91804 d14ecf530fa28216f71937d98baaaab6
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_mips.deb
Size/MD5 checksum: 384572 5dde54f093153caa592e20757e478199
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_mips.deb
Size/MD5 checksum: 742438 d0bcd379d23db5f38f7718f4337d3227

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_mipsel.deb
Size/MD5 checksum: 91522 9c36563692b17dcfc1a98c3e8d7e97ab
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_mipsel.deb
Size/MD5 checksum: 376512 ceed1298a93acb941d3c0af2c282764e
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_mipsel.deb
Size/MD5 checksum: 735774 fd948760267718e195c78dd2e24215f2

PowerPC architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_powerpc.deb
Size/MD5 checksum: 81976 8fcc45ef341f6c9eb0e62f0b33f0b00a
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_powerpc.deb
Size/MD5 checksum: 379578 eaf219ba8b48fcce91c5118188c0b418
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_powerpc.deb
Size/MD5 checksum: 730094 a6d4471fdd1f7ad1f5f625b35d1f79ed

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_s390.deb
Size/MD5 checksum: 76228 ac7a5773d28f83d09d0e0918916e8ddf
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_s390.deb
Size/MD5 checksum: 400188 d93224537dea195ad6d642d6b1bd0cfd
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_s390.deb
Size/MD5 checksum: 752482 ca8df04a75ef0a814b5cad469b9ad024

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.1.7-6_sparc.deb
Size/MD5 checksum: 68420 1cd0b5cc3fcb62ac0ef639467fba9ebc
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.1.7-6_sparc.deb
Size/MD5 checksum: 364098 95e28187528ecd25b87a6ad7475c056b
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.1.7-6_sparc.deb
Size/MD5 checksum: 699966 8cf12c5209c6ff1d703166a638e5775d


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show lt;pkggt;' and http://packages.debian.org/lt;pkggt;
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFDDlMXm3vHE4uyloRAuthAJ9YZbJIK4/ruLghkkoMHynhq7b6zQCgi5Xl
mX6Ivl37xopeoCK7vEPyAk4=
=9zWQ
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/dsa_1178_1_new_freetype_packages_fix_execution_of_arbitrary_code.html)