what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2007.121

Mandriva Linux Security Advisory 2007.121
Posted Jun 14, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - An integer overflow vulnerability was discovered in the way the FreeType font engine processed TTF files. If a user were to load a special font file with a program linked against freetype, it could cause the application to crash or possibly execute arbitrary code as the user running the program.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2007-2754
SHA-256 | 94960e6f55bc1b10bf6a19df85e9a6c69aa8b76672a3ba11ef83907969b799a6

Mandriva Linux Security Advisory 2007.121

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:121
http://www.mandriva.com/security/
_______________________________________________________________________

Package : freetype2
Date : June 13, 2007
Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

An integer overflow vulnerability was discovered in the way the
FreeType font engine processed TTF files. If a user were to load a
special font file with a program linked against freetype, it could
cause the application to crash or possibly execute arbitrary code as
the user running the program.

The updated packages have been patched to prevent this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
888adc26eb66e993d1c8256ebf72287e 2007.0/i586/libfreetype6-2.2.1-4.2mdv2007.0.i586.rpm
b10ff58273af4bfbf05bd1d6fabe5da8 2007.0/i586/libfreetype6-devel-2.2.1-4.2mdv2007.0.i586.rpm
84d7e5982cd6c7bb7b10e0960a943474 2007.0/i586/libfreetype6-static-devel-2.2.1-4.2mdv2007.0.i586.rpm
fbf5f1732c13a6f54f3e0214b48552c1 2007.0/SRPMS/freetype2-2.2.1-4.2mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
a93fb30f5a597fa89fc8cd85286b53ce 2007.0/x86_64/lib64freetype6-2.2.1-4.2mdv2007.0.x86_64.rpm
406806d503f5d355c8e77b989baf1f42 2007.0/x86_64/lib64freetype6-devel-2.2.1-4.2mdv2007.0.x86_64.rpm
f86a4e7e99da26c14d673c02cd4d4ba8 2007.0/x86_64/lib64freetype6-static-devel-2.2.1-4.2mdv2007.0.x86_64.rpm
fbf5f1732c13a6f54f3e0214b48552c1 2007.0/SRPMS/freetype2-2.2.1-4.2mdv2007.0.src.rpm

Mandriva Linux 2007.1:
6bafde7e6f952a0492765d461da32c97 2007.1/i586/libfreetype6-2.3.1-3.2mdv2007.1.i586.rpm
f34186eb65e04d416413cff4df8f9613 2007.1/i586/libfreetype6-devel-2.3.1-3.2mdv2007.1.i586.rpm
c111b1522e7825cc6ddf05b60e171aae 2007.1/i586/libfreetype6-static-devel-2.3.1-3.2mdv2007.1.i586.rpm
47d7d53f3e9b9b302b7398b46200e3bb 2007.1/SRPMS/freetype2-2.3.1-3.2mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
baa54ceaf4ba1525299cf6b0e859f933 2007.1/x86_64/lib64freetype6-2.3.1-3.2mdv2007.1.x86_64.rpm
ff16e366025be280a20e3d39ff0943d7 2007.1/x86_64/lib64freetype6-devel-2.3.1-3.2mdv2007.1.x86_64.rpm
7db139854e18a1d7f20438068bb22761 2007.1/x86_64/lib64freetype6-static-devel-2.3.1-3.2mdv2007.1.x86_64.rpm
47d7d53f3e9b9b302b7398b46200e3bb 2007.1/SRPMS/freetype2-2.3.1-3.2mdv2007.1.src.rpm

Corporate 3.0:
6a5823f891bb8dd9b34af5c194697151 corporate/3.0/i586/libfreetype6-2.1.7-4.5.C30mdk.i586.rpm
92a49443058dc76734007f42ea6ce992 corporate/3.0/i586/libfreetype6-devel-2.1.7-4.5.C30mdk.i586.rpm
ad0d74f4a3415f7ff808b1d50c6deda6 corporate/3.0/i586/libfreetype6-static-devel-2.1.7-4.5.C30mdk.i586.rpm
b13be6aab56c9c23f32e3da292d424c1 corporate/3.0/SRPMS/freetype2-2.1.7-4.5.C30mdk.src.rpm

Corporate 3.0/X86_64:
6a5823f891bb8dd9b34af5c194697151 corporate/3.0/x86_64/libfreetype6-2.1.7-4.5.C30mdk.i586.rpm
ae6a04d285558d7d58e82e40ac82d5f2 corporate/3.0/x86_64/lib64freetype6-2.1.7-4.5.C30mdk.x86_64.rpm
f03df050feb6e8ec2abe9c30e4386423 corporate/3.0/x86_64/lib64freetype6-devel-2.1.7-4.5.C30mdk.x86_64.rpm
40af8e12d5651ce2ee05c166e6d9f180 corporate/3.0/x86_64/lib64freetype6-static-devel-2.1.7-4.5.C30mdk.x86_64.rpm
b13be6aab56c9c23f32e3da292d424c1 corporate/3.0/SRPMS/freetype2-2.1.7-4.5.C30mdk.src.rpm

Corporate 4.0:
554afdf7c745ba4476df5860a25b05d4 corporate/4.0/i586/libfreetype6-2.1.10-9.6.20060mlcs4.i586.rpm
3b80645d0a25c3871268c7e2d0a378ac corporate/4.0/i586/libfreetype6-devel-2.1.10-9.6.20060mlcs4.i586.rpm
8017f06d616c226f00e8476f8583973f corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.6.20060mlcs4.i586.rpm
0e75c0ceca12cc7eeb93a32cb415effa corporate/4.0/SRPMS/freetype2-2.1.10-9.6.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
554afdf7c745ba4476df5860a25b05d4 corporate/4.0/x86_64/libfreetype6-2.1.10-9.6.20060mlcs4.i586.rpm
3b80645d0a25c3871268c7e2d0a378ac corporate/4.0/x86_64/libfreetype6-devel-2.1.10-9.6.20060mlcs4.i586.rpm
8017f06d616c226f00e8476f8583973f corporate/4.0/x86_64/libfreetype6-static-devel-2.1.10-9.6.20060mlcs4.i586.rpm
a8c75240e1c74eeddbb96b034157ce48 corporate/4.0/x86_64/lib64freetype6-2.1.10-9.6.20060mlcs4.x86_64.rpm
4ca744991bfb4260f45c9d2c48610287 corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.6.20060mlcs4.x86_64.rpm
79ad754685d97d2f58ddcc5ed218955c corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.6.20060mlcs4.x86_64.rpm
0e75c0ceca12cc7eeb93a32cb415effa corporate/4.0/SRPMS/freetype2-2.1.10-9.6.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
f80e2f5f4bc935846ee4daa624112574 mnf/2.0/i586/libfreetype6-2.1.7-4.5.M20mdk.i586.rpm
e3dc2d5b741f17859470c33d8ce604b3 mnf/2.0/SRPMS/freetype2-2.1.7-4.5.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGcHGEmqjQ0CJFipgRAh6gAJ49y7N+YB1EuLHOrYatxmwDGPodGACg7SR2
JTRfcDYDHaGNld+xLVHwqlc=
=thb1
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close