exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-243

Mandriva Linux Security Advisory 2009-243
Posted Sep 24, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-243 - Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. This update corrects the problem.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-0946
SHA-256 | 695b6fd644397cb522d47bb5edcc04a4bbd7791fdbfd16e4d26337f53f47e910

Mandriva Linux Security Advisory 2009-243

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:243
http://www.mandriva.com/security/
_______________________________________________________________________

Package : freetype2
Date : September 22, 2009
Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple integer overflows in FreeType 2.3.9 and earlier allow remote
attackers to execute arbitrary code via vectors related to large
values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c,
and (3) cff/cffload.c.

This update corrects the problem.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.1:
d5813fc6271ea7cd76ab738f271c1c6a 2008.1/i586/libfreetype6-2.3.5-2.2mdv2008.1.i586.rpm
c1d6a29ad9592d63362e224e2fa0ce9d 2008.1/i586/libfreetype6-devel-2.3.5-2.2mdv2008.1.i586.rpm
46672c2a86d0ac243b1388a1e39a7943 2008.1/i586/libfreetype6-static-devel-2.3.5-2.2mdv2008.1.i586.rpm
bd4f836f5d6f1a596b4fb50a06e426a5 2008.1/SRPMS/freetype2-2.3.5-2.2mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
fc6bd0f2a79571f953b02de4597b3ddf 2008.1/x86_64/lib64freetype6-2.3.5-2.2mdv2008.1.x86_64.rpm
6f6fcaf9581327d76471ce65cbb65ce3 2008.1/x86_64/lib64freetype6-devel-2.3.5-2.2mdv2008.1.x86_64.rpm
43dcd82a908ab2cd944f80f2dd498372 2008.1/x86_64/lib64freetype6-static-devel-2.3.5-2.2mdv2008.1.x86_64.rpm
bd4f836f5d6f1a596b4fb50a06e426a5 2008.1/SRPMS/freetype2-2.3.5-2.2mdv2008.1.src.rpm

Mandriva Linux 2009.0:
e675dac353da86d4b27d89f83d433d7c 2009.0/i586/libfreetype6-2.3.7-1.1mdv2009.0.i586.rpm
fc323957e95386422436340b4a79a12f 2009.0/i586/libfreetype6-devel-2.3.7-1.1mdv2009.0.i586.rpm
c7b9d6455335bb5bdd52134ddf077bfd 2009.0/i586/libfreetype6-static-devel-2.3.7-1.1mdv2009.0.i586.rpm
665da3ab3aa91a1305433eac968ac860 2009.0/SRPMS/freetype2-2.3.7-1.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
fe1d8dd6b394f7f9b01c2c182a02e3f5 2009.0/x86_64/lib64freetype6-2.3.7-1.1mdv2009.0.x86_64.rpm
49ba1b9ba70693d3d967cd4841bf511f 2009.0/x86_64/lib64freetype6-devel-2.3.7-1.1mdv2009.0.x86_64.rpm
7e94ab32121eead1da0ce0b2949ea78c 2009.0/x86_64/lib64freetype6-static-devel-2.3.7-1.1mdv2009.0.x86_64.rpm
665da3ab3aa91a1305433eac968ac860 2009.0/SRPMS/freetype2-2.3.7-1.1mdv2009.0.src.rpm

Mandriva Linux 2009.1:
e42b5e07235426f4e707648e8e4bf1d8 2009.1/i586/libfreetype6-2.3.9-1.1mdv2009.1.i586.rpm
bd6793892e643b323be785cd97d9c86f 2009.1/i586/libfreetype6-devel-2.3.9-1.1mdv2009.1.i586.rpm
475aa6ff9b332a3bd87da4de4b35cc7d 2009.1/i586/libfreetype6-static-devel-2.3.9-1.1mdv2009.1.i586.rpm
e63725b32587585dbe228f972e1e2380 2009.1/SRPMS/freetype2-2.3.9-1.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
25b3e15ad48a854303030162b787db3a 2009.1/x86_64/lib64freetype6-2.3.9-1.1mdv2009.1.x86_64.rpm
8440c7b2ae4e4a086cefe1fe2e6ff570 2009.1/x86_64/lib64freetype6-devel-2.3.9-1.1mdv2009.1.x86_64.rpm
e27316a1f606abb8fc48777b8463ddb3 2009.1/x86_64/lib64freetype6-static-devel-2.3.9-1.1mdv2009.1.x86_64.rpm
e63725b32587585dbe228f972e1e2380 2009.1/SRPMS/freetype2-2.3.9-1.1mdv2009.1.src.rpm

Corporate 3.0:
f948c36866c4e88a57c2b86981cb0572 corporate/3.0/i586/libfreetype6-2.1.7-4.1mdk.i586.rpm
e13e1f739ad2d23a8650b84b7c8a835e corporate/3.0/i586/libfreetype6-devel-2.1.7-4.1mdk.i586.rpm
3a51bd81a15f0ce1a8c9383cbb0f4303 corporate/3.0/i586/libfreetype6-static-devel-2.1.7-4.1mdk.i586.rpm
8a55e71067dec4650b2b87ced560df1f corporate/3.0/SRPMS/freetype2-2.1.7-4.1mdk.src.rpm

Corporate 3.0/X86_64:
abb9d88c1a86f57a74de59ed7be92439 corporate/3.0/x86_64/lib64freetype6-2.1.7-4.1mdk.x86_64.rpm
406752a5824f847e2e79a7df364400b6 corporate/3.0/x86_64/lib64freetype6-devel-2.1.7-4.1mdk.x86_64.rpm
0a11ca2598811ea3682443ddc48516cf corporate/3.0/x86_64/lib64freetype6-static-devel-2.1.7-4.1mdk.x86_64.rpm
8a55e71067dec4650b2b87ced560df1f corporate/3.0/SRPMS/freetype2-2.1.7-4.1mdk.src.rpm

Corporate 4.0:
c7354faa30ceaf8ba7a4b9b1cc8ebac8 corporate/4.0/i586/libfreetype6-2.1.10-9.5.20060mdk.i586.rpm
2e372e7929e098a2252625a68f796021 corporate/4.0/i586/libfreetype6-devel-2.1.10-9.5.20060mdk.i586.rpm
700b134ae5e9be79d821d4fc1c3d4f62 corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.5.20060mdk.i586.rpm
851e39d15b46e39c0397843094404bec corporate/4.0/SRPMS/freetype2-2.1.10-9.5.20060mdk.src.rpm

Corporate 4.0/X86_64:
2dac67bf3e415120ec46088c1f730cf6 corporate/4.0/x86_64/lib64freetype6-2.1.10-9.5.20060mdk.x86_64.rpm
a8fdded81e8d96ece2df2bf04c1023ac corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.5.20060mdk.x86_64.rpm
4868760c912eb7328149351fbb49ee2c corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.5.20060mdk.x86_64.rpm
851e39d15b46e39c0397843094404bec corporate/4.0/SRPMS/freetype2-2.1.10-9.5.20060mdk.src.rpm

Mandriva Enterprise Server 5:
d4cb24a13958abfa18a879aa5b98172f mes5/i586/libfreetype6-2.3.7-1.1mdvmes5.i586.rpm
9d43b837f18818f660a4d03c608418fe mes5/i586/libfreetype6-devel-2.3.7-1.1mdvmes5.i586.rpm
400ba426ca88b7fbc408e3419b5d4881 mes5/i586/libfreetype6-static-devel-2.3.7-1.1mdvmes5.i586.rpm
ac2f712eef4f39dd3f0f755f6871bed8 mes5/SRPMS/freetype2-2.3.7-1.1mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
4d1ede220e16a886ac25133e77a65c38 mes5/x86_64/lib64freetype6-2.3.7-1.1mdvmes5.x86_64.rpm
56208bca0368645b8956454fa0ea137f mes5/x86_64/lib64freetype6-devel-2.3.7-1.1mdvmes5.x86_64.rpm
7ff2a5b36638eb0891d92424f47263b4 mes5/x86_64/lib64freetype6-static-devel-2.3.7-1.1mdvmes5.x86_64.rpm
ac2f712eef4f39dd3f0f755f6871bed8 mes5/SRPMS/freetype2-2.3.7-1.1mdvmes5.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKuURymqjQ0CJFipgRAnkgAKCQ0Y8WEXGflapRGnPN6CRToCntXwCgpP/5
ObOaPsOaq04breeG9P/xixA=
=WbYT
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close