Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2070-1: New freetype packages fix several vulnerabilities

    Date 14 Jul 2010
    Posted By LinuxSecurity Advisories
    Robert Swiecki discovered several vulnerabilities in the FreeType font library, which could lead to the execution of arbitrary code if a malformed font file is processed.
    Hash: SHA1
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2070-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
    July 14, 2010               
    - ------------------------------------------------------------------------
    Package        : freetype
    Vulnerability  : several
    Problem type   : local(remote)
    Debian-specific: no
    CVE Id(s)      : CVE-2010-2497 CVE-2010-2498 CVE-2010-2499 CVE-2010-2500 CVE-2010-2519 CVE-2010-2520 CVE-2010-2527
    Robert Swiecki discovered several vulnerabilities in the FreeType font 
    library, which could lead to the execution of arbitrary code if a
    malformed font file is processed.
    Also, several buffer overflows were found in the included demo programs.
    For the stable distribution (lenny), these problems have been fixed in
    version 2.3.7-2+lenny2.
    For the unstable distribution (sid), these problems have been fixed in
    version 2.4.0-1.
    We recommend that you upgrade your freetype packages.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    Source archives:
        Size/MD5 checksum:     1219 a5930e5dfa3757bed045a67b7ef0e3e2
        Size/MD5 checksum:  1567540 c1a9f44fde316470176fd6d66af3a0e8
        Size/MD5 checksum:    36156 f1cb13247588b40f8f6c9d232df7efde
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:   775180 d9d1a2680550113aab5a5aa23998458e
        Size/MD5 checksum:   411954 63d800f83bd77f18b9307cd77b5cfd1d
        Size/MD5 checksum:   253784 b95be0af80d58e4e0818dd9b66447d9e
        Size/MD5 checksum:   296564 6e080492ee03692588c5953b36bade6d
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:   269680 4c9e6efc6c36f0867c74dde033b97ac8
        Size/MD5 checksum:   223010 5b9c55fc8ef35251ccdc3c1d22b13edd
        Size/MD5 checksum:   713084 b5933f78399f7d690f786fb7f04d1eca
        Size/MD5 checksum:   385600 741877f101eef1dd6f77aead47ddbba1
    arm architecture (ARM)
        Size/MD5 checksum:   205134 624b8b38b6cea2d569c70a18a5f78934
        Size/MD5 checksum:   242180 d7c5020f9cb5417378b80571bc2eccd4
        Size/MD5 checksum:   686080 a12f9cb0b5f76071ed204cfdcc571cd5
        Size/MD5 checksum:   356996 ff79207089cce445fa6d0514156f12cf
    armel architecture (ARM EABI)
        Size/MD5 checksum:   684278 7654ae1ba45138f11c53da2acce6055c
        Size/MD5 checksum:   210040 2d05fa53273572a89c81c9085a291fee
        Size/MD5 checksum:   236524 727d731977efad369b51fdc28d42bade
        Size/MD5 checksum:   353412 0bd84857e81e20c777cfaa5cf75532f2
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:   390130 633e25d7f8c8c618d9bae093ccb82ce3
        Size/MD5 checksum:   226818 cddac3930a33e08d60652f33c9a74951
        Size/MD5 checksum:   724826 9b77d359086e5379ded04c10e2acd20e
        Size/MD5 checksum:   273756 4e144120db5dcbf29368b95a783e55ca
    i386 architecture (Intel ia32)
        Size/MD5 checksum:   198154 db88552ea82caf3939e7b0cf50aaacd6
        Size/MD5 checksum:   369100 303fa098f2a6ae9b96dda6911f0bd7fb
        Size/MD5 checksum:   681856 df21b1a3835e262d844f60f9da27b279
        Size/MD5 checksum:   254120 bfb155340e5d588d06f09901b508661b
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:   530172 3eb3af7df07000f3f77046c21476d336
        Size/MD5 checksum:   415500 a7790020bc8e89e29d22ba21de275386
        Size/MD5 checksum:   331586 c0c579a4f47c6239c33cf1b139850d1c
        Size/MD5 checksum:   876158 52006540c63793635d2dcac9f8179dbf
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:   716244 e62cde7460caa83b189326abbe6a5347
        Size/MD5 checksum:   370118 606f0b24f3694f40eb5331e8d74c4f3b
        Size/MD5 checksum:   215180 33b08b6b36a20501276e657c3613701e
        Size/MD5 checksum:   253874 fe4977d926f17b3cbc338ea9926fec40
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:   254212 58be71c203785b01889176e8b028afac
        Size/MD5 checksum:   215322 f376b04c5b8450a03b7299a86cc4a586
        Size/MD5 checksum:   369756 412a79e35817f664f76dcaab0df63a59
        Size/MD5 checksum:   716552 3bc89b0f776eaaf3fcd5ec8f6373b599
    powerpc architecture (PowerPC)
        Size/MD5 checksum:   379634 a6f5c6e8ff755639559e55973ec1074d
        Size/MD5 checksum:   708420 6596bcb33887463503ad0507b216e4ed
        Size/MD5 checksum:   233050 40ee5ec08547be283b808d3afd5f97ba
        Size/MD5 checksum:   262690 ed1fff07f9e2f763ca481b2f8599e4af
    s390 architecture (IBM S/390)
        Size/MD5 checksum:   383824 3fbd3dc038b0ac35b961a964cb1147e6
        Size/MD5 checksum:   225144 04291aff7589607427d175721aafe8c3
        Size/MD5 checksum:   268070 d565627ddbf45d36920a27b8f42c1f55
        Size/MD5 checksum:   698596 f161a20932cbdbb2ccf4d3a30a555231
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:   351162 9f308ff70921739fffbbfe9fca486a87
        Size/MD5 checksum:   679330 4bee549927cdfc3b52fc62a5f16b3d49
        Size/MD5 checksum:   235344 ed806b039d7d8868ae9f7c89fe794629
        Size/MD5 checksum:   200794 49a26fa64c57498279481a4786919055
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.