Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

[SECURITY] [DSA 1635-1] New freetype packages fix multiple vulnerabilities
From: Steve Kemp <skx () debian org>
Date: Wed, 10 Sep 2008 20:45:14 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1635-1                  security () debian org
http://www.debian.org/security/                               Steve Kemp
September 10, 2008                   http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : freetype
Vulnerability  : multiple
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2008-1806 CVE-2008-1807 CVE-2008-1808

Several local vulnerabilities have been discovered in freetype,
a FreeType 2 font engine, which could allow the execution of arbitrary
code.

The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2008-1806
    An integer overflow allows context-dependent attackers to execute
    arbitrary code via a crafted set of values within the Private
    dictionary table in a Printer Font Binary (PFB) file.

CVE-2008-1807
    The handling of an invalid "number of axes" field in the PFB file could
    trigger the freeing of aribtrary memory locations, leading to 
    memory corruption.

CVE-2008-1808
    Multiple off-by-one errors allowed the execution of arbitrary code
    via malformed tables in PFB files, or invalid SHC instructions in
    TTF files.


For the stable distribution (etch), these problems have been fixed in version
2.2.1-5+etch3.

For the unstable distribution (sid), these problems have been fixed in
version 2.3.6-1.

We recommend that you upgrade your freetype package.


Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/f/freetype/freetype_2.2.1-5+etch3.diff.gz
    Size/MD5 checksum:    33815 16f3a9f45c8ba0743fcce4db637b11bf
  http://security.debian.org/pool/updates/main/f/freetype/freetype_2.2.1-5+etch3.dsc
    Size/MD5 checksum:      806 5a9af398d4749d9b1da47b6d9dbab821

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_alpha.deb
    Size/MD5 checksum:   169018 c99046707c48ee95504b3584e3acaffa
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_alpha.deb
    Size/MD5 checksum:   733276 3db91ded5b0de609d968ab8e53920289
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_alpha.deb
    Size/MD5 checksum:   386320 bf7f4273b546ef4826416b2b33e4f94a
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_alpha.udeb
    Size/MD5 checksum:   279290 57b6163945dcedbc6269f4a9779c0fd1

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_amd64.deb
    Size/MD5 checksum:   673858 0501dce4dff1621ecee0e2ce3eaef4aa
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_amd64.udeb
    Size/MD5 checksum:   248168 9b5d402a5937e847a5e950384421d86c
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_amd64.deb
    Size/MD5 checksum:   151546 2a6ff47137700ff8730440ccd7f7d151
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_amd64.deb
    Size/MD5 checksum:   355500 87b2fb3932e86863c46c74916c1a5dde

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_arm.deb
    Size/MD5 checksum:   646720 cd1705ecfef442f90d80e1fb83db292c
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_arm.deb
    Size/MD5 checksum:   333838 060a4e7f6977045c5d7f35a721edc041
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_arm.deb
    Size/MD5 checksum:   134028 e6dcac8b5abd633c83547bd34515dd82
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_arm.udeb
    Size/MD5 checksum:   227294 41c45c91535b5325ae06649a1e4a3b1c

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_hppa.deb
    Size/MD5 checksum:   369068 3bcfc3bbe665b9aae3b3933b25a04661
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_hppa.udeb
    Size/MD5 checksum:   260548 5cc41d234eea28201f11485b610fb046
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_hppa.deb
    Size/MD5 checksum:   151538 3aa7946fc0b6efb9057d108b37389640
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_hppa.deb
    Size/MD5 checksum:   685988 1220846ff1f3409afc9c3ad873954315

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_i386.deb
    Size/MD5 checksum:   645534 ccaaafcb5eda1820727ddcf67550a9c6
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_i386.deb
    Size/MD5 checksum:   342704 9b65398aaaf701879d4106fbc7c1b241
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_i386.udeb
    Size/MD5 checksum:   235954 67dc56faf0a5683f42723ceaaff13617
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_i386.deb
    Size/MD5 checksum:   134990 739490a353dbb1b5a09a7a88faa2d2c2

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_ia64.udeb
    Size/MD5 checksum:   383448 0b7a52c014942c4f2b917a6bdb86c404
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_ia64.deb
    Size/MD5 checksum:   222240 3f474395622187bb18adfc1a4bac738d
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_ia64.deb
    Size/MD5 checksum:   489032 281a705970b8e5b5ba9a062c0634a8a7
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_ia64.deb
    Size/MD5 checksum:   816978 bc2a62de056e47e5b133dcb5061abe00

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_mips.deb
    Size/MD5 checksum:   152594 883cce401aa3f82a3e026d1d18233423
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_mips.udeb
    Size/MD5 checksum:   241632 00a2987991c745e62d1c40af58eb66b0
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_mips.deb
    Size/MD5 checksum:   348426 4512041f6ab7a4b12e621b6debe6b174
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_mips.deb
    Size/MD5 checksum:   683056 a5da23b0a1908b1e06a7146b88c53fb8

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_mipsel.deb
    Size/MD5 checksum:   346894 8aeaab27c7c5e54c00464b393902cf5f
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_mipsel.udeb
    Size/MD5 checksum:   241206 94fe9bbb2605807b9f5fb96805714d3f
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_mipsel.deb
    Size/MD5 checksum:   150988 843c3752782b11f40c05db4a74a69ba3
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_mipsel.deb
    Size/MD5 checksum:   680682 d7d8ecf3635eebe469798fd6ed0ca87c

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_powerpc.deb
    Size/MD5 checksum:   146704 7ae680812709d33cc21478b849a5409a
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_powerpc.udeb
    Size/MD5 checksum:   240668 546180335aa2a6501ff2a00e14bb1800
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_powerpc.deb
    Size/MD5 checksum:   346082 e65d273c9612ad86299b74aa740d82f6
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_powerpc.deb
    Size/MD5 checksum:   661804 66ba32ce56915278025fd8b899cfe439

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_sparc.udeb
    Size/MD5 checksum:   219748 5e31a4989029d70f77cca89b1c4eedff
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_sparc.deb
    Size/MD5 checksum:   325308 67df6b1a3b1cf002998fd2d4bc0a4633
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_sparc.deb
    Size/MD5 checksum:   635590 9a7f186818a8fc26f3706a5a1ff54793
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_sparc.deb
    Size/MD5 checksum:   131042 f9252b689e2bd90c623d9b921c554e64


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce () lists debian org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIyCOAwM/Gs81MDZ0RAsgTAJ4yTHekXk5Yw0g6TOa9s+TD9GzuHACeMs1L
OMLYQbks32coVa+nebxVSbw=
=BWMm
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
  • [SECURITY] [DSA 1635-1] New freetype packages fix multiple vulnerabilities Steve Kemp (Sep 10)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault