Linux Security
Linux Security
Linux Security

Debian: New freetype packages fix execution of arbitrary code

Date 16 Sep 2006
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1178-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                         Moritz Muehlenhoff
September 16th, 2006          
- --------------------------------------------------------------------------

Package        : freetype
Vulnerability  : integer overflow
Problem-Type   : local(remote)
Debian-specific: no
CVE ID         : CVE-2006-3467
Debian Bug     : 379920

It was discovered that an integer overflow in freetype's PCF font code
may lead to denial of service and potential execution of arbitrary code.

For the stable distribution (sarge) this problem has been fixed in
version 2.1.7-6.

For the unstable distribution (sid) this problem has been fixed in
version 2.2.1-5.

We recommend that you upgrade your freetype package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      754 76dbe18b57a53fac328a1f8e00f54bd0
      Size/MD5 checksum:    57568 860e9383bba7d853ce6f758c239e89ed
      Size/MD5 checksum:  1245623 991ff86e88b075ba363e876f4ea58680

  Alpha architecture:
      Size/MD5 checksum:    88180 697811d9160b950b3d73682701f14e3c
      Size/MD5 checksum:   422838 635b31efebdb8fb192f7ee717a5e79f1
      Size/MD5 checksum:   784368 3d90ddefa034bae14101e1f9057efda7

  AMD64 architecture:
      Size/MD5 checksum:    76242 73b70a41effc140791d6b58cf8d3a103
      Size/MD5 checksum:   390236 6b1c46c525b13bf78e6aa6adfe876300
      Size/MD5 checksum:   723742 e8cfab359664bd05c9606e21b632c9d6

  ARM architecture:
      Size/MD5 checksum:    58734 5535bb49abfbdb3a9add023c2f21fe07
      Size/MD5 checksum:   352880 7dcc3438f6e69b8956244f3946038897
      Size/MD5 checksum:   714518 6cae07f317c33b3f2f5de4e6209b3154

  HP Precision architecture:
      Size/MD5 checksum:    80772 94c00e9be0020ec69779bb2961dedcc2
      Size/MD5 checksum:   407420 32967b0b193f09fdbfcf1a0f55cff736
      Size/MD5 checksum:   734434 7cb208545154507cf3462af986575e35

  Intel IA-32 architecture:
      Size/MD5 checksum:    63190 5c65822f534a53c3f88c72cc32253f37
      Size/MD5 checksum:   364858 555ba61fec5d41a3759f08bc330b9dff
      Size/MD5 checksum:   695074 81249aa29df653e228162b59f55da8a3

  Intel IA-64 architecture:
      Size/MD5 checksum:   102616 8cfcca90b20054ab717d669c1109166c
      Size/MD5 checksum:   493792 eea2110b00ae876e0621365278628865
      Size/MD5 checksum:   844018 2351fd3f7be66cea09bb68ae99407805

  Motorola 680x0 architecture:
      Size/MD5 checksum:    43862 a0ad63b48cef0fcd6d620e9eea56dcfd
      Size/MD5 checksum:   359672 e66cdcceff0149866934d8330a10be7f
      Size/MD5 checksum:   678786 2c12367dd397823d71c58ecc4db0f4a5

  Big endian MIPS architecture:
      Size/MD5 checksum:    91804 d14ecf530fa28216f71937d98baaaab6
      Size/MD5 checksum:   384572 5dde54f093153caa592e20757e478199
      Size/MD5 checksum:   742438 d0bcd379d23db5f38f7718f4337d3227

  Little endian MIPS architecture:
      Size/MD5 checksum:    91522 9c36563692b17dcfc1a98c3e8d7e97ab
      Size/MD5 checksum:   376512 ceed1298a93acb941d3c0af2c282764e
      Size/MD5 checksum:   735774 fd948760267718e195c78dd2e24215f2

  PowerPC architecture:
      Size/MD5 checksum:    81976 8fcc45ef341f6c9eb0e62f0b33f0b00a
      Size/MD5 checksum:   379578 eaf219ba8b48fcce91c5118188c0b418
      Size/MD5 checksum:   730094 a6d4471fdd1f7ad1f5f625b35d1f79ed

  IBM S/390 architecture:
      Size/MD5 checksum:    76228 ac7a5773d28f83d09d0e0918916e8ddf
      Size/MD5 checksum:   400188 d93224537dea195ad6d642d6b1bd0cfd
      Size/MD5 checksum:   752482 ca8df04a75ef0a814b5cad469b9ad024

  Sun Sparc architecture:
      Size/MD5 checksum:    68420 1cd0b5cc3fcb62ac0ef639467fba9ebc
      Size/MD5 checksum:   364098 95e28187528ecd25b87a6ad7475c056b
      Size/MD5 checksum:   699966 8cf12c5209c6ff1d703166a638e5775d

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"45","type":"x","order":"1","pct":81.82,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"5","type":"x","order":"2","pct":9.09,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":9.09,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.