TUCoPS :: Linux :: Mandrake/Mandriva :: bt-21687.htm

freetype2
freetype2
freetype2




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:243
http://www.mandriva.com/security/ 
 _______________________________________________________________________

 Package : freetype2
 Date    : September 22, 2009
 Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
           Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple integer overflows in FreeType 2.3.9 and earlier allow remote
 attackers to execute arbitrary code via vectors related to large
 values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c,
 and (3) cff/cffload.c.
 
 This update corrects the problem.
 _______________________________________________________________________

 References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946 
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 d5813fc6271ea7cd76ab738f271c1c6a  2008.1/i586/libfreetype6-2.3.5-2.2mdv2008.1.i586.rpm
 c1d6a29ad9592d63362e224e2fa0ce9d  2008.1/i586/libfreetype6-devel-2.3.5-2.2mdv2008.1.i586.rpm
 46672c2a86d0ac243b1388a1e39a7943  2008.1/i586/libfreetype6-static-devel-2.3.5-2.2mdv2008.1.i586.rpm 
 bd4f836f5d6f1a596b4fb50a06e426a5  2008.1/SRPMS/freetype2-2.3.5-2.2mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 fc6bd0f2a79571f953b02de4597b3ddf  2008.1/x86_64/lib64freetype6-2.3.5-2.2mdv2008.1.x86_64.rpm
 6f6fcaf9581327d76471ce65cbb65ce3  2008.1/x86_64/lib64freetype6-devel-2.3.5-2.2mdv2008.1.x86_64.rpm
 43dcd82a908ab2cd944f80f2dd498372  2008.1/x86_64/lib64freetype6-static-devel-2.3.5-2.2mdv2008.1.x86_64.rpm 
 bd4f836f5d6f1a596b4fb50a06e426a5  2008.1/SRPMS/freetype2-2.3.5-2.2mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 e675dac353da86d4b27d89f83d433d7c  2009.0/i586/libfreetype6-2.3.7-1.1mdv2009.0.i586.rpm
 fc323957e95386422436340b4a79a12f  2009.0/i586/libfreetype6-devel-2.3.7-1.1mdv2009.0.i586.rpm
 c7b9d6455335bb5bdd52134ddf077bfd  2009.0/i586/libfreetype6-static-devel-2.3.7-1.1mdv2009.0.i586.rpm 
 665da3ab3aa91a1305433eac968ac860  2009.0/SRPMS/freetype2-2.3.7-1.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 fe1d8dd6b394f7f9b01c2c182a02e3f5  2009.0/x86_64/lib64freetype6-2.3.7-1.1mdv2009.0.x86_64.rpm
 49ba1b9ba70693d3d967cd4841bf511f  2009.0/x86_64/lib64freetype6-devel-2.3.7-1.1mdv2009.0.x86_64.rpm
 7e94ab32121eead1da0ce0b2949ea78c  2009.0/x86_64/lib64freetype6-static-devel-2.3.7-1.1mdv2009.0.x86_64.rpm 
 665da3ab3aa91a1305433eac968ac860  2009.0/SRPMS/freetype2-2.3.7-1.1mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 e42b5e07235426f4e707648e8e4bf1d8  2009.1/i586/libfreetype6-2.3.9-1.1mdv2009.1.i586.rpm
 bd6793892e643b323be785cd97d9c86f  2009.1/i586/libfreetype6-devel-2.3.9-1.1mdv2009.1.i586.rpm
 475aa6ff9b332a3bd87da4de4b35cc7d  2009.1/i586/libfreetype6-static-devel-2.3.9-1.1mdv2009.1.i586.rpm 
 e63725b32587585dbe228f972e1e2380  2009.1/SRPMS/freetype2-2.3.9-1.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 25b3e15ad48a854303030162b787db3a  2009.1/x86_64/lib64freetype6-2.3.9-1.1mdv2009.1.x86_64.rpm
 8440c7b2ae4e4a086cefe1fe2e6ff570  2009.1/x86_64/lib64freetype6-devel-2.3.9-1.1mdv2009.1.x86_64.rpm
 e27316a1f606abb8fc48777b8463ddb3  2009.1/x86_64/lib64freetype6-static-devel-2.3.9-1.1mdv2009.1.x86_64.rpm 
 e63725b32587585dbe228f972e1e2380  2009.1/SRPMS/freetype2-2.3.9-1.1mdv2009.1.src.rpm

 Corporate 3.0:
 f948c36866c4e88a57c2b86981cb0572  corporate/3.0/i586/libfreetype6-2.1.7-4.1mdk.i586.rpm
 e13e1f739ad2d23a8650b84b7c8a835e  corporate/3.0/i586/libfreetype6-devel-2.1.7-4.1mdk.i586.rpm
 3a51bd81a15f0ce1a8c9383cbb0f4303  corporate/3.0/i586/libfreetype6-static-devel-2.1.7-4.1mdk.i586.rpm 
 8a55e71067dec4650b2b87ced560df1f  corporate/3.0/SRPMS/freetype2-2.1.7-4.1mdk.src.rpm

 Corporate 3.0/X86_64:
 abb9d88c1a86f57a74de59ed7be92439  corporate/3.0/x86_64/lib64freetype6-2.1.7-4.1mdk.x86_64.rpm
 406752a5824f847e2e79a7df364400b6  corporate/3.0/x86_64/lib64freetype6-devel-2.1.7-4.1mdk.x86_64.rpm
 0a11ca2598811ea3682443ddc48516cf  corporate/3.0/x86_64/lib64freetype6-static-devel-2.1.7-4.1mdk.x86_64.rpm 
 8a55e71067dec4650b2b87ced560df1f  corporate/3.0/SRPMS/freetype2-2.1.7-4.1mdk.src.rpm

 Corporate 4.0:
 c7354faa30ceaf8ba7a4b9b1cc8ebac8  corporate/4.0/i586/libfreetype6-2.1.10-9.5.20060mdk.i586.rpm
 2e372e7929e098a2252625a68f796021  corporate/4.0/i586/libfreetype6-devel-2.1.10-9.5.20060mdk.i586.rpm
 700b134ae5e9be79d821d4fc1c3d4f62  corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.5.20060mdk.i586.rpm 
 851e39d15b46e39c0397843094404bec  corporate/4.0/SRPMS/freetype2-2.1.10-9.5.20060mdk.src.rpm

 Corporate 4.0/X86_64:
 2dac67bf3e415120ec46088c1f730cf6  corporate/4.0/x86_64/lib64freetype6-2.1.10-9.5.20060mdk.x86_64.rpm
 a8fdded81e8d96ece2df2bf04c1023ac  corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.5.20060mdk.x86_64.rpm
 4868760c912eb7328149351fbb49ee2c  corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.5.20060mdk.x86_64.rpm 
 851e39d15b46e39c0397843094404bec  corporate/4.0/SRPMS/freetype2-2.1.10-9.5.20060mdk.src.rpm

 Mandriva Enterprise Server 5:
 d4cb24a13958abfa18a879aa5b98172f  mes5/i586/libfreetype6-2.3.7-1.1mdvmes5.i586.rpm
 9d43b837f18818f660a4d03c608418fe  mes5/i586/libfreetype6-devel-2.3.7-1.1mdvmes5.i586.rpm
 400ba426ca88b7fbc408e3419b5d4881  mes5/i586/libfreetype6-static-devel-2.3.7-1.1mdvmes5.i586.rpm 
 ac2f712eef4f39dd3f0f755f6871bed8  mes5/SRPMS/freetype2-2.3.7-1.1mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 4d1ede220e16a886ac25133e77a65c38  mes5/x86_64/lib64freetype6-2.3.7-1.1mdvmes5.x86_64.rpm
 56208bca0368645b8956454fa0ea137f  mes5/x86_64/lib64freetype6-devel-2.3.7-1.1mdvmes5.x86_64.rpm
 7ff2a5b36638eb0891d92424f47263b4  mes5/x86_64/lib64freetype6-static-devel-2.3.7-1.1mdvmes5.x86_64.rpm 
 ac2f712eef4f39dd3f0f755f6871bed8  mes5/SRPMS/freetype2-2.3.7-1.1mdvmes5.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories 

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKuURymqjQ0CJFipgRAnkgAKCQ0Y8WEXGflapRGnPN6CRToCntXwCgpP/5
ObOaPsOaq04breeG9P/xixA=WbYT
-----END PGP SIGNATURE-----


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH