Linux Security
    Linux Security
    Linux Security

    Debian: New freetype packages fix execution of arbitrary code

    Date 16 Sep 2006
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1178-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                         Moritz Muehlenhoff
    September 16th, 2006          
    - --------------------------------------------------------------------------
    Package        : freetype
    Vulnerability  : integer overflow
    Problem-Type   : local(remote)
    Debian-specific: no
    CVE ID         : CVE-2006-3467
    Debian Bug     : 379920
    It was discovered that an integer overflow in freetype's PCF font code
    may lead to denial of service and potential execution of arbitrary code.
    For the stable distribution (sarge) this problem has been fixed in
    version 2.1.7-6.
    For the unstable distribution (sid) this problem has been fixed in
    version 2.2.1-5.
    We recommend that you upgrade your freetype package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      754 76dbe18b57a53fac328a1f8e00f54bd0
          Size/MD5 checksum:    57568 860e9383bba7d853ce6f758c239e89ed
          Size/MD5 checksum:  1245623 991ff86e88b075ba363e876f4ea58680
      Alpha architecture:
          Size/MD5 checksum:    88180 697811d9160b950b3d73682701f14e3c
          Size/MD5 checksum:   422838 635b31efebdb8fb192f7ee717a5e79f1
          Size/MD5 checksum:   784368 3d90ddefa034bae14101e1f9057efda7
      AMD64 architecture:
          Size/MD5 checksum:    76242 73b70a41effc140791d6b58cf8d3a103
          Size/MD5 checksum:   390236 6b1c46c525b13bf78e6aa6adfe876300
          Size/MD5 checksum:   723742 e8cfab359664bd05c9606e21b632c9d6
      ARM architecture:
          Size/MD5 checksum:    58734 5535bb49abfbdb3a9add023c2f21fe07
          Size/MD5 checksum:   352880 7dcc3438f6e69b8956244f3946038897
          Size/MD5 checksum:   714518 6cae07f317c33b3f2f5de4e6209b3154
      HP Precision architecture:
          Size/MD5 checksum:    80772 94c00e9be0020ec69779bb2961dedcc2
          Size/MD5 checksum:   407420 32967b0b193f09fdbfcf1a0f55cff736
          Size/MD5 checksum:   734434 7cb208545154507cf3462af986575e35
      Intel IA-32 architecture:
          Size/MD5 checksum:    63190 5c65822f534a53c3f88c72cc32253f37
          Size/MD5 checksum:   364858 555ba61fec5d41a3759f08bc330b9dff
          Size/MD5 checksum:   695074 81249aa29df653e228162b59f55da8a3
      Intel IA-64 architecture:
          Size/MD5 checksum:   102616 8cfcca90b20054ab717d669c1109166c
          Size/MD5 checksum:   493792 eea2110b00ae876e0621365278628865
          Size/MD5 checksum:   844018 2351fd3f7be66cea09bb68ae99407805
      Motorola 680x0 architecture:
          Size/MD5 checksum:    43862 a0ad63b48cef0fcd6d620e9eea56dcfd
          Size/MD5 checksum:   359672 e66cdcceff0149866934d8330a10be7f
          Size/MD5 checksum:   678786 2c12367dd397823d71c58ecc4db0f4a5
      Big endian MIPS architecture:
          Size/MD5 checksum:    91804 d14ecf530fa28216f71937d98baaaab6
          Size/MD5 checksum:   384572 5dde54f093153caa592e20757e478199
          Size/MD5 checksum:   742438 d0bcd379d23db5f38f7718f4337d3227
      Little endian MIPS architecture:
          Size/MD5 checksum:    91522 9c36563692b17dcfc1a98c3e8d7e97ab
          Size/MD5 checksum:   376512 ceed1298a93acb941d3c0af2c282764e
          Size/MD5 checksum:   735774 fd948760267718e195c78dd2e24215f2
      PowerPC architecture:
          Size/MD5 checksum:    81976 8fcc45ef341f6c9eb0e62f0b33f0b00a
          Size/MD5 checksum:   379578 eaf219ba8b48fcce91c5118188c0b418
          Size/MD5 checksum:   730094 a6d4471fdd1f7ad1f5f625b35d1f79ed
      IBM S/390 architecture:
          Size/MD5 checksum:    76228 ac7a5773d28f83d09d0e0918916e8ddf
          Size/MD5 checksum:   400188 d93224537dea195ad6d642d6b1bd0cfd
          Size/MD5 checksum:   752482 ca8df04a75ef0a814b5cad469b9ad024
      Sun Sparc architecture:
          Size/MD5 checksum:    68420 1cd0b5cc3fcb62ac0ef639467fba9ebc
          Size/MD5 checksum:   364098 95e28187528ecd25b87a6ad7475c056b
          Size/MD5 checksum:   699966 8cf12c5209c6ff1d703166a638e5775d
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.