-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Trustix Secure Linux Security Advisory #2006-0052 Package names: freetype, gnutls, gzip Summary: Multiple vulnerabilities Date: 2006-09-22 Affected versions: Trustix Secure Linux 2.2 Trustix Secure Linux 3.0 Trustix Operating System - Enterprise Server 2 - -------------------------------------------------------------------------- Package description: freetype The FreeType engine is a free and portable TrueType font rendering engine, developed to provide TrueType support for a variety of platforms and environments. FreeType is a library which can open and manages font files as well as efficiently load, hint and render individual glyphs. FreeType is not a font server or a complete text-rendering library. gnutls GnuTLS is a project that aims to develop a library which provides a secure layer, over a reliable transport layer. Currently the GnuTLS library implements the proposed standards by the IETF's TLS working group. gzip The gzip package contains the popular GNU gzip data compression program. Gzipped files have a .gz extension. Problem description: freetype < TSL 3.0 > < TSL 2.2 > - New Upstream. - Enable bytecode hinting, Bug #1933. - SECURITY FIX: Chris Evans discovered several integer underflow and overflow flaws in the FreeType font engine. If a specially crafted font file that, when loaded by the target user's system, will trigger an integer underflow or integer overflow and crash the application or execute arbitrary code on the target system. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-3467 to this issue. gnutls < TSL 3.0 > - SECURITY Fix: A vulnerability has been reported in GnuTLS, caused due to an error in the verification of certain signatures. If a RSA key with exponent 3 is used, it may be possible to forge PKCS #1 v1.5 signatures signed with that key. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-4790 to this issue. gzip < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - SECURITY Fix: Tavis Ormandy, Google Security Team, has reported some vulnerabilities in gzip, which can be exploited by malicious people to cause a DoS and potentially compromise a vulnerable system. - Fix null pointer dereference that may lead to denial of service if gzip is used in an automated manner. - A boundary error within the "make_table()" function in unlzh.c can be used to modify certain stack data. This can be exploited to cause a DoS and potentially allows to execute arbitrary code. - A buffer underflow exists within the "build_tree()" function in unpack.c, which can be exploited to cause a DoS and potentially allows to execute arbitrary code. - A buffer overflow within the "make_table()" function of gzip's LZH support can be exploited to cause a DoS and potentially to compromise a vulnerable system by e.g. tricking a user or automated system into unpacking an archive containing a specially crafted decoding table. - unlzh.c in the LHZ component in gzip allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted GZIP archive. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2006-4334, CVE-2006-4335, CVE-2006-4336, CVE-2006-4337 and CVE-2006-4338 to these issues. Action: We recommend that all systems with this package installed be upgraded. Please note that if you do not need the functionality provided by this package, you may want to remove it from your system. Location: All Trustix Secure Linux updates are available from About Trustix Secure Linux: Trustix Secure Linux is a small Linux distribution for servers. With focus on security and stability, the system is painlessly kept safe and up to date from day one using swup, the automated software updater. Automatic updates: Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'. Questions? Check out our mailing lists: Verification: This advisory along with all Trustix packages are signed with the TSL sign key. This key is available from: The advisory itself is available from the errata pages at and or directly at MD5sums of the packages: - -------------------------------------------------------------------------- ce2058e75ca81dc44f29afdbf3082681 3.0/rpms/freetype-2.2.1-1tr.i586.rpm 8039bce6fc164a1bc3b7cf8ee681ba2d 3.0/rpms/freetype-devel-2.2.1-1tr.i586.rpm f1e92a14c9df6a1b3598885b88f0d70f 3.0/rpms/gnutls-1.2.4-4tr.i586.rpm 21fd545269725dc5fa617f4d7c2bfd0a 3.0/rpms/gnutls-devel-1.2.4-4tr.i586.rpm e3fd30ee23b80c8a8dd9e56e2645b251 3.0/rpms/gzip-1.3.5-7tr.i586.rpm a5202fec43fc873f1ed910bc38b9cf31 3.0/rpms/gzip-doc-1.3.5-7tr.i586.rpm 10ee8e7f85956a5290c314263f177fd5 2.2/rpms/freetype-2.2.1-1tr.i586.rpm fde86196c3f634031912964c87303cad 2.2/rpms/freetype-devel-2.2.1-1tr.i586.rpm 3062d3f81b8ed3545140f5b9008f6abe 2.2/rpms/gzip-1.3.5-1tr.i586.rpm 3892f7f5adc3a788dc5960c3c898e536 2.2/rpms/gzip-doc-1.3.5-1tr.i586.rpm - -------------------------------------------------------------------------- Trustix Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) iD8DBQFFE95Fi8CEzsK9IksRAiqoAJ4/DlKRqVI6HiA2iVX3rQHh/S/YsACfbZbz SYSB3IQjwutMZPShB/k9zW4= =PNZm -----END PGP SIGNATURE-----