Date:         Tue, 27 Jul 2010 13:49:24 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      FASTBUGS for SL 5.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

The following FASTBUGS have been uploaded to



         i386:
glibc-2.5-49.el5_5.4.i386.rpm
glibc-2.5-49.el5_5.4.i686.rpm
glibc-common-2.5-49.el5_5.4.i386.rpm
glibc-devel-2.5-49.el5_5.4.i386.rpm
glibc-headers-2.5-49.el5_5.4.i386.rpm
glibc-utils-2.5-49.el5_5.4.i386.rpm
krb5-devel-1.6.1-36.el5_5.5.i386.rpm
krb5-libs-1.6.1-36.el5_5.5.i386.rpm
krb5-server-1.6.1-36.el5_5.5.i386.rpm
krb5-workstation-1.6.1-36.el5_5.5.i386.rpm
nscd-2.5-49.el5_5.4.i386.rpm
qffmpeg-devel-0.4.9-0.16.20080908.el5_5.i386.rpm
qffmpeg-libs-0.4.9-0.16.20080908.el5_5.i386.rpm
selinux-policy-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-devel-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-minimum-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-mls-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-strict-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-targeted-2.4.6-279.el5_5.1.noarch.rpm
sysstat-7.0.2-3.el5_5.1.i386.rpm
vnc-4.1.2-14.el5_5.4.i386.rpm
vnc-server-4.1.2-14.el5_5.4.i386.rpm
yum-aliases-1.1.16-14.sl5.1.noarch.rpm
yum-allowdowngrade-1.1.16-14.sl5.1.noarch.rpm
yum-changelog-1.1.16-14.sl5.1.noarch.rpm
yum-downloadonly-1.1.16-14.sl5.1.noarch.rpm
yum-fastestmirror-1.1.16-14.sl5.1.noarch.rpm
yum-filter-data-1.1.16-14.sl5.1.noarch.rpm
yum-kernel-module-1.1.16-14.sl5.1.noarch.rpm
yum-keys-1.1.16-14.sl5.1.noarch.rpm
yum-kmod-1.1.16-14.sl5.1.noarch.rpm
yum-list-data-1.1.16-14.sl5.1.noarch.rpm
yum-merge-conf-1.1.16-14.sl5.1.noarch.rpm
yum-NetworkManager-dispatcher-1.1.16-14.sl5.1.noarch.rpm
yum-priorities-1.1.16-14.sl5.1.noarch.rpm
yum-protectbase-1.1.16-14.sl5.1.noarch.rpm
yum-protect-packages-1.1.16-14.sl5.1.noarch.rpm
yum-refresh-updatesd-1.1.16-14.sl5.1.noarch.rpm
yum-security-1.1.16-14.sl5.1.noarch.rpm
yum-tmprepo-1.1.16-14.sl5.1.noarch.rpm
yum-tsflags-1.1.16-14.sl5.1.noarch.rpm
yum-updateonboot-1.1.16-14.sl5.1.noarch.rpm
yum-upgrade-helper-1.1.16-14.sl5.1.noarch.rpm
yum-utils-1.1.16-14.sl5.1.noarch.rpm
yum-verify-1.1.16-14.sl5.1.noarch.rpm
yum-versionlock-1.1.16-14.sl5.1.noarch.rpm

        x86_64:
glibc-2.5-49.el5_5.4.i686.rpm
glibc-2.5-49.el5_5.4.x86_64.rpm
glibc-common-2.5-49.el5_5.4.x86_64.rpm
glibc-devel-2.5-49.el5_5.4.i386.rpm
glibc-devel-2.5-49.el5_5.4.x86_64.rpm
glibc-headers-2.5-49.el5_5.4.x86_64.rpm
glibc-utils-2.5-49.el5_5.4.x86_64.rpm
krb5-devel-1.6.1-36.el5_5.5.i386.rpm
krb5-devel-1.6.1-36.el5_5.5.x86_64.rpm
krb5-libs-1.6.1-36.el5_5.5.i386.rpm
krb5-libs-1.6.1-36.el5_5.5.x86_64.rpm
krb5-server-1.6.1-36.el5_5.5.x86_64.rpm
krb5-workstation-1.6.1-36.el5_5.5.x86_64.rpm
nscd-2.5-49.el5_5.4.x86_64.rpm
qffmpeg-devel-0.4.9-0.16.20080908.el5_5.i386.rpm
qffmpeg-devel-0.4.9-0.16.20080908.el5_5.x86_64.rpm
qffmpeg-libs-0.4.9-0.16.20080908.el5_5.i386.rpm
qffmpeg-libs-0.4.9-0.16.20080908.el5_5.x86_64.rpm
selinux-policy-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-devel-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-minimum-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-mls-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-strict-2.4.6-279.el5_5.1.noarch.rpm
selinux-policy-targeted-2.4.6-279.el5_5.1.noarch.rpm
sysstat-7.0.2-3.el5_5.1.x86_64.rpm
vnc-4.1.2-14.el5_5.4.x86_64.rpm
vnc-server-4.1.2-14.el5_5.4.x86_64.rpm
yum-aliases-1.1.16-14.sl5.1.noarch.rpm
yum-allowdowngrade-1.1.16-14.sl5.1.noarch.rpm
yum-changelog-1.1.16-14.sl5.1.noarch.rpm
yum-downloadonly-1.1.16-14.sl5.1.noarch.rpm
yum-fastestmirror-1.1.16-14.sl5.1.noarch.rpm
yum-filter-data-1.1.16-14.sl5.1.noarch.rpm
yum-kernel-module-1.1.16-14.sl5.1.noarch.rpm
yum-keys-1.1.16-14.sl5.1.noarch.rpm
yum-kmod-1.1.16-14.sl5.1.noarch.rpm
yum-list-data-1.1.16-14.sl5.1.noarch.rpm
yum-merge-conf-1.1.16-14.sl5.1.noarch.rpm
yum-NetworkManager-dispatcher-1.1.16-14.sl5.1.noarch.rpm
yum-priorities-1.1.16-14.sl5.1.noarch.rpm
yum-protectbase-1.1.16-14.sl5.1.noarch.rpm
yum-protect-packages-1.1.16-14.sl5.1.noarch.rpm
yum-refresh-updatesd-1.1.16-14.sl5.1.noarch.rpm
yum-security-1.1.16-14.sl5.1.noarch.rpm
yum-tmprepo-1.1.16-14.sl5.1.noarch.rpm
yum-tsflags-1.1.16-14.sl5.1.noarch.rpm
yum-updateonboot-1.1.16-14.sl5.1.noarch.rpm
yum-upgrade-helper-1.1.16-14.sl5.1.noarch.rpm
yum-utils-1.1.16-14.sl5.1.noarch.rpm
yum-verify-1.1.16-14.sl5.1.noarch.rpm
yum-versionlock-1.1.16-14.sl5.1.noarch.rpm


-Connie Sieh
-Troy Dawson
Date:         Sat, 31 Jul 2010 23:14:54 -0500
Reply-To:     Connie Sieh 
Sender:       Security Errata for Scientific Linux
              
From:         Connie Sieh 
Subject:      Security ERRATA Important: freetype for SL4 , SL5
Comments: To: scientific 

Synopsis:          Important: freetype security update
Issue date:        2010-07-30
CVE Names:         CVE-2010-2498 CVE-2010-2499 CVE-2010-2500
                    CVE-2010-2519 CVE-2010-2527 CVE-2010-2541


An invalid memory management flaw was found in the way the FreeType font
engine processed font files. If a user loaded a carefully-crafted font file
with an application linked against FreeType, it could cause the application
to crash or, possibly, execute arbitrary code with the privileges of the
user running the application. (CVE-2010-2498)

An integer overflow flaw was found in the way the FreeType font engine
processed font files. If a user loaded a carefully-crafted font file with
an application linked against FreeType, it could cause the application to
crash or, possibly, execute arbitrary code with the privileges of the user
running the application. (CVE-2010-2500)

Several buffer overflow flaws were found in the way the FreeType font
engine processed font files. If a user loaded a carefully-crafted font file
with an application linked against FreeType, it could cause the application
to crash or, possibly, execute arbitrary code with the privileges of the
user running the application. (CVE-2010-2499, CVE-2010-2519)

Several buffer overflow flaws were found in the FreeType demo applications.
If a user loaded a carefully-crafted font file with a demo application, it
could cause the application to crash or, possibly, execute arbitrary code
with the privileges of the user running the application. (CVE-2010-2527,
CVE-2010-2541)

Note: All of the issues in this erratum only affect the FreeType 2 font
engine.

Users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.

File List

SL4:

SRPM
freetype-2.1.9-14.el4.8.src.rpm

i386:
freetype-2.1.9-14.el4.8.i386.rpm
freetype-debuginfo-2.1.9-14.el4.8.i386.rpm
freetype-demos-2.1.9-14.el4.8.i386.rpm
freetype-devel-2.1.9-14.el4.8.i386.rpm
freetype-utils-2.1.9-14.el4.8.i386.rpm


x86_64:
freetype-2.1.9-14.el4.8.i386.rpm
freetype-2.1.9-14.el4.8.x86_64.rpm
freetype-debuginfo-2.1.9-14.el4.8.i386.rpm
freetype-debuginfo-2.1.9-14.el4.8.x86_64.rpm
freetype-demos-2.1.9-14.el4.8.x86_64.rpm
freetype-devel-2.1.9-14.el4.8.x86_64.rpm
freetype-utils-2.1.9-14.el4.8.x86_64.rpm


SL5

Source:
freetype-2.2.1-25.el5_5.src.rpm

i386:
freetype-2.2.1-25.el5_5.i386.rpm
freetype-debuginfo-2.2.1-25.el5_5.i386.rpm
freetype-demos-2.2.1-25.el5_5.i386.rpm
freetype-debuginfo-2.2.1-25.el5_5.i386.rpm
freetype-devel-2.2.1-25.el5_5.i386.rpm

x86_64:
freetype-2.2.1-25.el5_5.i386.rpm
freetype-2.2.1-25.el5_5.x86_64.rpm
freetype-debuginfo-2.2.1-25.el5_5.i386.rpm
freetype-debuginfo-2.2.1-25.el5_5.x86_64.rpm
freetype-demos-2.2.1-25.el5_5.x86_64.rpm
freetype-devel-2.2.1-25.el5_5.i386.rpm
freetype-devel-2.2.1-25.el5_5.x86_64.rpm

-connie sieh
-Troy Dawson

SciLinux: CVE-2010-2498 Important: freetype SL4 , SL5

Important: freetype security update

Summary

An invalid memory management flaw was found in the way the FreeType fontengine processed font files. If a user loaded a carefully-crafted font filewith an application linked against FreeType, it could cause the applicationto crash or, possibly, execute arbitrary code with the privileges of theuser running the application. (CVE-2010-2498)An integer overflow flaw was found in the way the FreeType font engineprocessed font files. If a user loaded a carefully-crafted font file withan application linked against FreeType, it could cause the application tocrash or, possibly, execute arbitrary code with the privileges of the userrunning the application. (CVE-2010-2500)Several buffer overflow flaws were found in the way the FreeType fontengine processed font files. If a user loaded a carefully-crafted font filewith an application linked against FreeType, it could cause the applicationto crash or, possibly, execute arbitrary code with the privileges of theuser running the application. (CVE-2010-2499, CVE-2010-2519)Several buffer overflow flaws were found in the FreeType demo applications.If a user loaded a carefully-crafted font file with a demo application, itcould cause the application to crash or, possibly, execute arbitrary codewith the privileges of the user running the application. (CVE-2010-2527,CVE-2010-2541)Note: All of the issues in this erratum only affect the FreeType 2 fontengine.Users are advised to upgrade to these updated packages, which containbackported patches to correct these issues. The X server must be restarted(log out, then log back in) for this update to take effect.File ListSL4:SRPMfreetype-2.1.9-14.el4.8.src.rpmi386:freetype-2.1.9-14.el4.8.i386.rpmfreetype-debuginfo-2.1.9-14.el4.8.i386.rpmfreetype-demos-2.1.9-14.el4.8.i386.rpmfreetype-devel-2.1.9-14.el4.8.i386.rpmfreetype-utils-2.1.9-14.el4.8.i386.rpmx86_64:freetype-2.1.9-14.el4.8.i386.rpmfreetype-2.1.9-14.el4.8.x86_64.rpmfreetype-debuginfo-2.1.9-14.el4.8.i386.rpmfreetype-debuginfo-2.1.9-14.el4.8.x86_64.rpmfreetype-demos-2.1.9-14.el4.8.x86_64.rpmfreetype-devel-2.1.9-14.el4.8.x86_64.rpmfreetype-utils-2.1.9-14.el4.8.x86_64.rpmSL5Source:freetype-2.2.1-25.el5_5.src.rpmi386:freetype-2.2.1-25.el5_5.i386.rpmfreetype-debuginfo-2.2.1-25.el5_5.i386.rpmfreetype-demos-2.2.1-25.el5_5.i386.rpmfreetype-debuginfo-2.2.1-25.el5_5.i386.rpmfreetype-devel-2.2.1-25.el5_5.i386.rpmx86_64:freetype-2.2.1-25.el5_5.i386.rpmfreetype-2.2.1-25.el5_5.x86_64.rpmfreetype-debuginfo-2.2.1-25.el5_5.i386.rpmfreetype-debuginfo-2.2.1-25.el5_5.x86_64.rpmfreetype-demos-2.2.1-25.el5_5.x86_64.rpmfreetype-devel-2.2.1-25.el5_5.i386.rpmfreetype-devel-2.2.1-25.el5_5.x86_64.rpm-connie sieh-Troy Dawson



Security Fixes

Severity
Issued Date: : 2010-07-30
CVE Names: CVE-2010-2498 CVE-2010-2499 CVE-2010-2500
CVE-2010-2519 CVE-2010-2527 CVE-2010-2541

Related News