Linux Security
    Linux Security
    Linux Security

    Debian: New freetype packages fix integer overflow

    Date 10 Jun 2007
    Posted By LinuxSecurity Advisories
    A problem was discovered with freetype, a FreeTyp2 font engine, which could allow the execution of arbitary code via an integer overflow in specially crafted TTF files.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1302-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                               Steve Kemp
    June 10, 2007
    - ------------------------------------------------------------------------
    Package        : freetype (2.2.1-5+etch1)
    Vulnerability  : integer overflow
    Problem type   : local
    Debian-specific: no
    CVE Id(s)      : CVE-2007-2754
    Debian Bug     : 425625
    A problem was discovered with freetype, a FreeTyp2 font engine, which
    could allow the execution of arbitary code via an integer overflow in
    specially crafted TTF files.
    For the stable distribution (etch), this problem has been fixed in 
    version 2.2.1-5+etch1.
    For the unstable distribution (sid), this problem has been fixed in
    version 2.2.1-6.
    We recommend that you upgrade your freetype (2.2.1-5+etch1) package.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian (stable)
    - ---------------
    Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    Source archives:
        Size/MD5 checksum:      798 187a09fa137f44644a826cc561851023
        Size/MD5 checksum:  1451392 a584e84d617c6e7919b4aef9b5106cf4
        Size/MD5 checksum:    30963 83f454db44bdb8929e0f0381143dc5db
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:   385008 7d52ba8722e4b357f68abb578b60a52a
        Size/MD5 checksum:   170448 7f2728c29efd7ca024531d8ebf88addc
        Size/MD5 checksum:   732032 116feac33169db3e45c3dc53e4f3157b
        Size/MD5 checksum:   279204 e62e7644d9d1e22b23e81c6fda87b6d1
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:   353436 afa12b9f6f0e6bda42de60aa1e019b50
        Size/MD5 checksum:   150526 825c996331a2c0cd274e2b15a8fee7d4
        Size/MD5 checksum:   248150 f8b87164256e2c6670ab72c07700dbd8
        Size/MD5 checksum:   668724 77394a0182401d64247d41e5877cbe9b
    arm architecture (ARM)
        Size/MD5 checksum:   333364 0d7346c0579975150072ce120d99c304
        Size/MD5 checksum:   641304 4bb19236147b7dcc902d12ca757d6473
        Size/MD5 checksum:   134424 6ea68e623f447fddc5f8cb70a24d6859
        Size/MD5 checksum:   227222 ecc5609d412cf0c093ff11ad678bd5b8
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:   680184 7e3cb9e8883b4d1f867ca4a540ce809f
        Size/MD5 checksum:   150926 461bcc2b91d791e5f53d0ad9e7f9dbec
        Size/MD5 checksum:   260406 058fbb02c754707bd01a37bbb0de5a35
        Size/MD5 checksum:   366546 5a6c3b19844f9b1d0275ffae21c87871
    i386 architecture (Intel ia32)
        Size/MD5 checksum:   341778 f800ba2ee94137591a764136ec71cbd9
        Size/MD5 checksum:   641566 d15f9a17fe9b5756026779a9e6639305
        Size/MD5 checksum:   235858 9c5125cd256d1e645470d08d7c73bba5
        Size/MD5 checksum:   135254 7fb03ee21e372b7a4602debe961f764a
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:   383460 4dcbb0bed034da7c74017e1c730eaae2
        Size/MD5 checksum:   222228 866793358e59a55e71f695b69c4aef1c
        Size/MD5 checksum:   816932 cb592b3c7237b4839c9e540d835a8274
        Size/MD5 checksum:   488868 24c1e3da83b09e14defe70685d7d7545
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:   241570 e9b99262edabeb26811cd4f9ca17e525
        Size/MD5 checksum:   151484 28b16a6cf6eeee76ceec5938ac8a7cda
        Size/MD5 checksum:   680518 d7184dbbb1bdc6ad293eef5dc4d98605
        Size/MD5 checksum:   346636 36abaf52ed32b64c8cd06c2439da8966
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:   680624 5b7516edcd0b4921beb2ee0c02290102
        Size/MD5 checksum:   150970 c40f00fb7346ceb5029b77d55a62ac28
        Size/MD5 checksum:   241106 8dbbab1f29502133535bcdbd6a8cf388
        Size/MD5 checksum:   346540 7bfcd60a4ea3f5d5580c2da350358276
    powerpc architecture (PowerPC)
        Size/MD5 checksum:   146690 6c928f9d35183e6e6873a52b620aa0b1
        Size/MD5 checksum:   240630 5315a8e1b86e7a93ebbcb30f984305fc
        Size/MD5 checksum:   661790 283a5c1adff5dc1404bf08c7a6126390
        Size/MD5 checksum:   345788 4948fad03c1ad9d8fea1a825aa1b605a
    s390 architecture (IBM S/390)
        Size/MD5 checksum:   355626 5825341b2d4a6cb694ead2c287210934
        Size/MD5 checksum:   657010 4169a5f32365bb6c19b31812c82a0bf6
        Size/MD5 checksum:   151344 f52143c9d070f6351313358931dc3a98
        Size/MD5 checksum:   249874 65ab48d5fd81670dfd2915db2a2e00c6
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:   219654 d1b7c3045b9d86955813bd79398bafdf
        Size/MD5 checksum:   635506 3620350015da5a2b3f99c57c2cdb6b67
        Size/MD5 checksum:   131006 c46976177e1dc1b6b5ef803eb78d8b12
        Size/MD5 checksum:   324968 5a8a7eb0d05cd4c26c1fe26075117c05
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.