Linux Security
Linux Security
Linux Security

Debian: DSA-2070-1: New freetype packages fix several vulnerabilities

Date 14 Jul 2010
Posted By LinuxSecurity Advisories
Robert Swiecki discovered several vulnerabilities in the FreeType font library, which could lead to the execution of arbitrary code if a malformed font file is processed.
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2070-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
July 14, 2010               
- ------------------------------------------------------------------------

Package        : freetype
Vulnerability  : several
Problem type   : local(remote)
Debian-specific: no
CVE Id(s)      : CVE-2010-2497 CVE-2010-2498 CVE-2010-2499 CVE-2010-2500 CVE-2010-2519 CVE-2010-2520 CVE-2010-2527

Robert Swiecki discovered several vulnerabilities in the FreeType font 
library, which could lead to the execution of arbitrary code if a
malformed font file is processed.

Also, several buffer overflows were found in the included demo programs.

For the stable distribution (lenny), these problems have been fixed in
version 2.3.7-2+lenny2.

For the unstable distribution (sid), these problems have been fixed in
version 2.4.0-1.

We recommend that you upgrade your freetype packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum:     1219 a5930e5dfa3757bed045a67b7ef0e3e2
    Size/MD5 checksum:  1567540 c1a9f44fde316470176fd6d66af3a0e8
    Size/MD5 checksum:    36156 f1cb13247588b40f8f6c9d232df7efde

alpha architecture (DEC Alpha)
    Size/MD5 checksum:   775180 d9d1a2680550113aab5a5aa23998458e
    Size/MD5 checksum:   411954 63d800f83bd77f18b9307cd77b5cfd1d
    Size/MD5 checksum:   253784 b95be0af80d58e4e0818dd9b66447d9e
    Size/MD5 checksum:   296564 6e080492ee03692588c5953b36bade6d

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:   269680 4c9e6efc6c36f0867c74dde033b97ac8
    Size/MD5 checksum:   223010 5b9c55fc8ef35251ccdc3c1d22b13edd
    Size/MD5 checksum:   713084 b5933f78399f7d690f786fb7f04d1eca
    Size/MD5 checksum:   385600 741877f101eef1dd6f77aead47ddbba1

arm architecture (ARM)
    Size/MD5 checksum:   205134 624b8b38b6cea2d569c70a18a5f78934
    Size/MD5 checksum:   242180 d7c5020f9cb5417378b80571bc2eccd4
    Size/MD5 checksum:   686080 a12f9cb0b5f76071ed204cfdcc571cd5
    Size/MD5 checksum:   356996 ff79207089cce445fa6d0514156f12cf

armel architecture (ARM EABI)
    Size/MD5 checksum:   684278 7654ae1ba45138f11c53da2acce6055c
    Size/MD5 checksum:   210040 2d05fa53273572a89c81c9085a291fee
    Size/MD5 checksum:   236524 727d731977efad369b51fdc28d42bade
    Size/MD5 checksum:   353412 0bd84857e81e20c777cfaa5cf75532f2

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   390130 633e25d7f8c8c618d9bae093ccb82ce3
    Size/MD5 checksum:   226818 cddac3930a33e08d60652f33c9a74951
    Size/MD5 checksum:   724826 9b77d359086e5379ded04c10e2acd20e
    Size/MD5 checksum:   273756 4e144120db5dcbf29368b95a783e55ca

i386 architecture (Intel ia32)
    Size/MD5 checksum:   198154 db88552ea82caf3939e7b0cf50aaacd6
    Size/MD5 checksum:   369100 303fa098f2a6ae9b96dda6911f0bd7fb
    Size/MD5 checksum:   681856 df21b1a3835e262d844f60f9da27b279
    Size/MD5 checksum:   254120 bfb155340e5d588d06f09901b508661b

ia64 architecture (Intel ia64)
    Size/MD5 checksum:   530172 3eb3af7df07000f3f77046c21476d336
    Size/MD5 checksum:   415500 a7790020bc8e89e29d22ba21de275386
    Size/MD5 checksum:   331586 c0c579a4f47c6239c33cf1b139850d1c
    Size/MD5 checksum:   876158 52006540c63793635d2dcac9f8179dbf

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:   716244 e62cde7460caa83b189326abbe6a5347
    Size/MD5 checksum:   370118 606f0b24f3694f40eb5331e8d74c4f3b
    Size/MD5 checksum:   215180 33b08b6b36a20501276e657c3613701e
    Size/MD5 checksum:   253874 fe4977d926f17b3cbc338ea9926fec40

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:   254212 58be71c203785b01889176e8b028afac
    Size/MD5 checksum:   215322 f376b04c5b8450a03b7299a86cc4a586
    Size/MD5 checksum:   369756 412a79e35817f664f76dcaab0df63a59
    Size/MD5 checksum:   716552 3bc89b0f776eaaf3fcd5ec8f6373b599

powerpc architecture (PowerPC)
    Size/MD5 checksum:   379634 a6f5c6e8ff755639559e55973ec1074d
    Size/MD5 checksum:   708420 6596bcb33887463503ad0507b216e4ed
    Size/MD5 checksum:   233050 40ee5ec08547be283b808d3afd5f97ba
    Size/MD5 checksum:   262690 ed1fff07f9e2f763ca481b2f8599e4af

s390 architecture (IBM S/390)
    Size/MD5 checksum:   383824 3fbd3dc038b0ac35b961a964cb1147e6
    Size/MD5 checksum:   225144 04291aff7589607427d175721aafe8c3
    Size/MD5 checksum:   268070 d565627ddbf45d36920a27b8f42c1f55
    Size/MD5 checksum:   698596 f161a20932cbdbb2ccf4d3a30a555231

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:   351162 9f308ff70921739fffbbfe9fca486a87
    Size/MD5 checksum:   679330 4bee549927cdfc3b52fc62a5f16b3d49
    Size/MD5 checksum:   235344 ed806b039d7d8868ae9f7c89fe794629
    Size/MD5 checksum:   200794 49a26fa64c57498279481a4786919055

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"47","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.86,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.47,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.