Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in freetype2
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in freetype2
ID: MDVSA-2011:177
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0, Mandriva 2010.1, Mandriva 2011
Datum: Mo, 21. November 2011, 22:33
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439
Applikationen: Freetype

Originalnachricht

This is a multi-part message in MIME format...

------------=_1321898050-2333-252

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:177
http://www.mandriva.com/security/
_______________________________________________________________________

Package : freetype2
Date : November 21, 2011
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been discovered and corrected in freetype2:

FreeType allows remote attackers to execute arbitrary code or cause a
denial of service (memory corruption) via a crafted font in a document
(CVE-2011-3439).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.1:
ae0f53491bcf584d4654b07553141a52
2010.1/i586/libfreetype6-2.3.12-1.8mdv2010.2.i586.rpm
6475e532d3fd4392959e47e9ee363510
2010.1/i586/libfreetype6-devel-2.3.12-1.8mdv2010.2.i586.rpm
f611c34743c08421b28201ec14d4a7f3
2010.1/i586/libfreetype6-static-devel-2.3.12-1.8mdv2010.2.i586.rpm
f3de152e4ddb62342d2cb1fcea834303
2010.1/SRPMS/freetype2-2.3.12-1.8mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
698cbd16590fc808eb9472a9c044faf4
2010.1/x86_64/lib64freetype6-2.3.12-1.8mdv2010.2.x86_64.rpm
11c4c173faa05524566af100c6ebe41b
2010.1/x86_64/lib64freetype6-devel-2.3.12-1.8mdv2010.2.x86_64.rpm
73eadaf1dd762f3c8c9f10f34c2a67de
2010.1/x86_64/lib64freetype6-static-devel-2.3.12-1.8mdv2010.2.x86_64.rpm
f3de152e4ddb62342d2cb1fcea834303
2010.1/SRPMS/freetype2-2.3.12-1.8mdv2010.2.src.rpm

Mandriva Linux 2011:
e0adff2d732e1771e1921d72169ca4b7
2011/i586/freetype2-demos-2.4.5-2.2-mdv2011.0.i586.rpm
bf25705a35f331d9a53a537bdeb79fdb
2011/i586/libfreetype6-2.4.5-2.2-mdv2011.0.i586.rpm
bbe1ce316eba76d6e4a8a5847ae44dc5
2011/i586/libfreetype6-devel-2.4.5-2.2-mdv2011.0.i586.rpm
7cc8ef092ccf50fdcf5e973b1c907b9f
2011/i586/libfreetype6-static-devel-2.4.5-2.2-mdv2011.0.i586.rpm
50fef33dbe18888528e8e61471777df6 2011/SRPMS/freetype2-2.4.5-2.2.src.rpm

Mandriva Linux 2011/X86_64:
39e263d8b04c5f4e97a73ba51f3fc200
2011/x86_64/freetype2-demos-2.4.5-2.2-mdv2011.0.x86_64.rpm
628964be9f606d92a0880624d208c184
2011/x86_64/lib64freetype6-2.4.5-2.2-mdv2011.0.x86_64.rpm
2f8d19012d12a07e8d5bf35145d13f4d
2011/x86_64/lib64freetype6-devel-2.4.5-2.2-mdv2011.0.x86_64.rpm
57ae10111448bc9cb648c541e5dbd196
2011/x86_64/lib64freetype6-static-devel-2.4.5-2.2-mdv2011.0.x86_64.rpm
50fef33dbe18888528e8e61471777df6 2011/SRPMS/freetype2-2.4.5-2.2.src.rpm

Mandriva Enterprise Server 5:
b9b8ee42885918af3f77332c48b05936
mes5/i586/libfreetype6-2.3.7-1.9mdvmes5.2.i586.rpm
146a3977f324b1a54c28abfc94c18a91
mes5/i586/libfreetype6-devel-2.3.7-1.9mdvmes5.2.i586.rpm
25683658ff4e5716b60456dbfe11224b
mes5/i586/libfreetype6-static-devel-2.3.7-1.9mdvmes5.2.i586.rpm
66fb94dddbc6df45e5b1ec5d726458ec
mes5/SRPMS/freetype2-2.3.7-1.9mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
5624556f88a090c359cd805efa13385f
mes5/x86_64/lib64freetype6-2.3.7-1.9mdvmes5.2.x86_64.rpm
cc6788b438137432858e8e753ced9fc3
mes5/x86_64/lib64freetype6-devel-2.3.7-1.9mdvmes5.2.x86_64.rpm
a4e5f4430dc1a74d02fb1574a7fd2b9e
mes5/x86_64/lib64freetype6-static-devel-2.3.7-1.9mdvmes5.2.x86_64.rpm
66fb94dddbc6df45e5b1ec5d726458ec
mes5/SRPMS/freetype2-2.3.7-1.9mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFOymJJmqjQ0CJFipgRArgbAKCe/NiGUsXrmR+Q5XLa3QcTTms7CgCgrgxI
HenoG428VcBeYFhd5EhHmLM=
=V3c9
-----END PGP SIGNATURE-----


------------=_1321898050-2333-252
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1321898050-2333-252--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung