[Security Announce] [ MDKSA-2007:121 ] - Updated freetype2 packages fix integer overflow vulnerability
Posted on: 06/14/2007 04:50 AM

The Mandriva Security Team published a new security update for Mandriva Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:121
http://www.mandriva.com/security/
_______________________________________________________________________

Package : freetype2
Date : June 13, 2007
Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

An integer overflow vulnerability was discovered in the way the
FreeType font engine processed TTF files. If a user were to load a
special font file with a program linked against freetype, it could
cause the application to crash or possibly execute arbitrary code as
the user running the program.

The updated packages have been patched to prevent this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
888adc26eb66e993d1c8256ebf72287e 2007.0/i586/libfreetype6-2.2.1-4.2mdv2007.0.i586.rpm
b10ff58273af4bfbf05bd1d6fabe5da8 2007.0/i586/libfreetype6-devel-2.2.1-4.2mdv2007.0.i586.rpm
84d7e5982cd6c7bb7b10e0960a943474 2007.0/i586/libfreetype6-static-devel-2.2.1-4.2mdv2007.0.i586.rpm
fbf5f1732c13a6f54f3e0214b48552c1 2007.0/SRPMS/freetype2-2.2.1-4.2mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
a93fb30f5a597fa89fc8cd85286b53ce 2007.0/x86_64/lib64freetype6-2.2.1-4.2mdv2007.0.x86_64.rpm
406806d503f5d355c8e77b989baf1f42 2007.0/x86_64/lib64freetype6-devel-2.2.1-4.2mdv2007.0.x86_64.rpm
f86a4e7e99da26c14d673c02cd4d4ba8 2007.0/x86_64/lib64freetype6-static-devel-2.2.1-4.2mdv2007.0.x86_64.rpm
fbf5f1732c13a6f54f3e0214b48552c1 2007.0/SRPMS/freetype2-2.2.1-4.2mdv2007.0.src.rpm

Mandriva Linux 2007.1:
6bafde7e6f952a0492765d461da32c97 2007.1/i586/libfreetype6-2.3.1-3.2mdv2007.1.i586.rpm
f34186eb65e04d416413cff4df8f9613 2007.1/i586/libfreetype6-devel-2.3.1-3.2mdv2007.1.i586.rpm
c111b1522e7825cc6ddf05b60e171aae 2007.1/i586/libfreetype6-static-devel-2.3.1-3.2mdv2007.1.i586.rpm
47d7d53f3e9b9b302b7398b46200e3bb 2007.1/SRPMS/freetype2-2.3.1-3.2mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
baa54ceaf4ba1525299cf6b0e859f933 2007.1/x86_64/lib64freetype6-2.3.1-3.2mdv2007.1.x86_64.rpm
ff16e366025be280a20e3d39ff0943d7 2007.1/x86_64/lib64freetype6-devel-2.3.1-3.2mdv2007.1.x86_64.rpm
7db139854e18a1d7f20438068bb22761 2007.1/x86_64/lib64freetype6-static-devel-2.3.1-3.2mdv2007.1.x86_64.rpm
47d7d53f3e9b9b302b7398b46200e3bb 2007.1/SRPMS/freetype2-2.3.1-3.2mdv2007.1.src.rpm

Corporate 3.0:
6a5823f891bb8dd9b34af5c194697151 corporate/3.0/i586/libfreetype6-2.1.7-4.5.C30mdk.i586.rpm
92a49443058dc76734007f42ea6ce992 corporate/3.0/i586/libfreetype6-devel-2.1.7-4.5.C30mdk.i586.rpm
ad0d74f4a3415f7ff808b1d50c6deda6 corporate/3.0/i586/libfreetype6-static-devel-2.1.7-4.5.C30mdk.i586.rpm
b13be6aab56c9c23f32e3da292d424c1 corporate/3.0/SRPMS/freetype2-2.1.7-4.5.C30mdk.src.rpm

Corporate 3.0/X86_64:
6a5823f891bb8dd9b34af5c194697151 corporate/3.0/x86_64/libfreetype6-2.1.7-4.5.C30mdk.i586.rpm
ae6a04d285558d7d58e82e40ac82d5f2 corporate/3.0/x86_64/lib64freetype6-2.1.7-4.5.C30mdk.x86_64.rpm
f03df050feb6e8ec2abe9c30e4386423 corporate/3.0/x86_64/lib64freetype6-devel-2.1.7-4.5.C30mdk.x86_64.rpm
40af8e12d5651ce2ee05c166e6d9f180 corporate/3.0/x86_64/lib64freetype6-static-devel-2.1.7-4.5.C30mdk.x86_64.rpm
b13be6aab56c9c23f32e3da292d424c1 corporate/3.0/SRPMS/freetype2-2.1.7-4.5.C30mdk.src.rpm

Corporate 4.0:
554afdf7c745ba4476df5860a25b05d4 corporate/4.0/i586/libfreetype6-2.1.10-9.6.20060mlcs4.i586.rpm
3b80645d0a25c3871268c7e2d0a378ac corporate/4.0/i586/libfreetype6-devel-2.1.10-9.6.20060mlcs4.i586.rpm
8017f06d616c226f00e8476f8583973f corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.6.20060mlcs4.i586.rpm
0e75c0ceca12cc7eeb93a32cb415effa corporate/4.0/SRPMS/freetype2-2.1.10-9.6.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
554afdf7c745ba4476df5860a25b05d4 corporate/4.0/x86_64/libfreetype6-2.1.10-9.6.20060mlcs4.i586.rpm
3b80645d0a25c3871268c7e2d0a378ac corporate/4.0/x86_64/libfreetype6-devel-2.1.10-9.6.20060mlcs4.i586.rpm
8017f06d616c226f00e8476f8583973f corporate/4.0/x86_64/libfreetype6-static-devel-2.1.10-9.6.20060mlcs4.i586.rpm
a8c75240e1c74eeddbb96b034157ce48 corporate/4.0/x86_64/lib64freetype6-2.1.10-9.6.20060mlcs4.x86_64.rpm
4ca744991bfb4260f45c9d2c48610287 corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.6.20060mlcs4.x86_64.rpm
79ad754685d97d2f58ddcc5ed218955c corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.6.20060mlcs4.x86_64.rpm
0e75c0ceca12cc7eeb93a32cb415effa corporate/4.0/SRPMS/freetype2-2.1.10-9.6.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
f80e2f5f4bc935846ee4daa624112574 mnf/2.0/i586/libfreetype6-2.1.7-4.5.M20mdk.i586.rpm
e3dc2d5b741f17859470c33d8ce604b3 mnf/2.0/SRPMS/freetype2-2.1.7-4.5.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
lt;security*mandriva.comgt;
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGcHGEmqjQ0CJFipgRAh6gAJ49y7N+YB1EuLHOrYatxmwDGPodGACg7SR2
JTRfcDYDHaGNld+xLVHwqlc=
=thb1
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/security_announce_mdksa_2007121__updated_freetype2_packages_fix_integer_overflow_vulnerability.html)