DSA 1635-1: New freetype packages fix multiple vulnerabilities
Posted on: 09/10/2008 09:10 PM

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1635-1 security@debian.org
http://www.debian.org/security/ Steve Kemp
September 10, 2008 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : freetype
Vulnerability : multiple
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2008-1806 CVE-2008-1807 CVE-2008-1808

Several local vulnerabilities have been discovered in freetype,
a FreeType 2 font engine, which could allow the execution of arbitrary
code.

The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2008-1806
An integer overflow allows context-dependent attackers to execute
arbitrary code via a crafted set of values within the Private
dictionary table in a Printer Font Binary (PFB) file.

CVE-2008-1807
The handling of an invalid "number of axes" field in the PFB file could
trigger the freeing of aribtrary memory locations, leading to
memory corruption.

CVE-2008-1808
Multiple off-by-one errors allowed the execution of arbitrary code
via malformed tables in PFB files, or invalid SHC instructions in
TTF files.


For the stable distribution (etch), these problems have been fixed in version
2.2.1-5+etch3.

For the unstable distribution (sid), these problems have been fixed in
version 2.3.6-1.

We recommend that you upgrade your freetype package.


Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

http://security.debian.org/pool/updates/main/f/freetype/freetype_2.2.1-5+etch3.diff.gz
Size/MD5 checksum: 33815 16f3a9f45c8ba0743fcce4db637b11bf
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.2.1-5+etch3.dsc
Size/MD5 checksum: 806 5a9af398d4749d9b1da47b6d9dbab821

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_alpha.deb
Size/MD5 checksum: 169018 c99046707c48ee95504b3584e3acaffa
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_alpha.deb
Size/MD5 checksum: 733276 3db91ded5b0de609d968ab8e53920289
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_alpha.deb
Size/MD5 checksum: 386320 bf7f4273b546ef4826416b2b33e4f94a
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_alpha.udeb
Size/MD5 checksum: 279290 57b6163945dcedbc6269f4a9779c0fd1

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_amd64.deb
Size/MD5 checksum: 673858 0501dce4dff1621ecee0e2ce3eaef4aa
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_amd64.udeb
Size/MD5 checksum: 248168 9b5d402a5937e847a5e950384421d86c
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_amd64.deb
Size/MD5 checksum: 151546 2a6ff47137700ff8730440ccd7f7d151
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_amd64.deb
Size/MD5 checksum: 355500 87b2fb3932e86863c46c74916c1a5dde

arm architecture (ARM)

http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_arm.deb
Size/MD5 checksum: 646720 cd1705ecfef442f90d80e1fb83db292c
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_arm.deb
Size/MD5 checksum: 333838 060a4e7f6977045c5d7f35a721edc041
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_arm.deb
Size/MD5 checksum: 134028 e6dcac8b5abd633c83547bd34515dd82
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_arm.udeb
Size/MD5 checksum: 227294 41c45c91535b5325ae06649a1e4a3b1c

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_hppa.deb
Size/MD5 checksum: 369068 3bcfc3bbe665b9aae3b3933b25a04661
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_hppa.udeb
Size/MD5 checksum: 260548 5cc41d234eea28201f11485b610fb046
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_hppa.deb
Size/MD5 checksum: 151538 3aa7946fc0b6efb9057d108b37389640
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_hppa.deb
Size/MD5 checksum: 685988 1220846ff1f3409afc9c3ad873954315

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_i386.deb
Size/MD5 checksum: 645534 ccaaafcb5eda1820727ddcf67550a9c6
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_i386.deb
Size/MD5 checksum: 342704 9b65398aaaf701879d4106fbc7c1b241
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_i386.udeb
Size/MD5 checksum: 235954 67dc56faf0a5683f42723ceaaff13617
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_i386.deb
Size/MD5 checksum: 134990 739490a353dbb1b5a09a7a88faa2d2c2

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_ia64.udeb
Size/MD5 checksum: 383448 0b7a52c014942c4f2b917a6bdb86c404
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_ia64.deb
Size/MD5 checksum: 222240 3f474395622187bb18adfc1a4bac738d
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_ia64.deb
Size/MD5 checksum: 489032 281a705970b8e5b5ba9a062c0634a8a7
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_ia64.deb
Size/MD5 checksum: 816978 bc2a62de056e47e5b133dcb5061abe00

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_mips.deb
Size/MD5 checksum: 152594 883cce401aa3f82a3e026d1d18233423
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_mips.udeb
Size/MD5 checksum: 241632 00a2987991c745e62d1c40af58eb66b0
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_mips.deb
Size/MD5 checksum: 348426 4512041f6ab7a4b12e621b6debe6b174
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_mips.deb
Size/MD5 checksum: 683056 a5da23b0a1908b1e06a7146b88c53fb8

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_mipsel.deb
Size/MD5 checksum: 346894 8aeaab27c7c5e54c00464b393902cf5f
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_mipsel.udeb
Size/MD5 checksum: 241206 94fe9bbb2605807b9f5fb96805714d3f
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_mipsel.deb
Size/MD5 checksum: 150988 843c3752782b11f40c05db4a74a69ba3
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_mipsel.deb
Size/MD5 checksum: 680682 d7d8ecf3635eebe469798fd6ed0ca87c

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_powerpc.deb
Size/MD5 checksum: 146704 7ae680812709d33cc21478b849a5409a
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_powerpc.udeb
Size/MD5 checksum: 240668 546180335aa2a6501ff2a00e14bb1800
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_powerpc.deb
Size/MD5 checksum: 346082 e65d273c9612ad86299b74aa740d82f6
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_powerpc.deb
Size/MD5 checksum: 661804 66ba32ce56915278025fd8b899cfe439

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_sparc.udeb
Size/MD5 checksum: 219748 5e31a4989029d70f77cca89b1c4eedff
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_sparc.deb
Size/MD5 checksum: 325308 67df6b1a3b1cf002998fd2d4bc0a4633
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_sparc.deb
Size/MD5 checksum: 635590 9a7f186818a8fc26f3706a5a1ff54793
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_sparc.deb
Size/MD5 checksum: 131042 f9252b689e2bd90c623d9b921c554e64


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show lt;pkggt;' and http://packages.debian.org/lt;pkggt;
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIyCOAwM/Gs81MDZ0RAsgTAJ4yTHekXk5Yw0g6TOa9s+TD9GzuHACeMs1L
OMLYQbks32coVa+nebxVSbw=
=BWMm
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/dsa_1635_1_new_freetype_packages_fix_multiple_vulnerabilities.html)