Säkerhetsbulletin från Debian
DSA-1635-1 freetype -- flera sårbarheter
- Rapporterat den:
- 2008-09-10
- Berörda paket:
- freetype
- Sårbara:
- Ja
- Referenser i säkerhetsdatabaser:
- I Mitres CVE-förteckning: CVE-2008-1806, CVE-2008-1807, CVE-2008-1808.
- Ytterligare information:
-
Flera lokala sårbarheter har upptäckts i freetype, en FreeType 2-teckensnittsmotor, vilka kunde leda till exekvering av godtycklig kod.
Projektet Common Vulnerabilities and Exposures identifierar följande problem:
- CVE-2008-1806
Ett heltalsspill gjorde det möjligt för sammanhangsberoende angrepp att exekvera godtycklig kod via en specialskriven uppsättning värden i tabellen för privat uppslagstabell i en PFB-fil (Printer Font Binary).
- CVE-2008-1807
Hanteringen av ogiltiga ”antar axlar”-fält i PFB-filen kunde utlösa en frigörning av godtyckliga minnesområden, vilket ledde till minnessönderskrivning.
- CVE-2008-1808
Flera stegfel gjorde det möjligt att exekvera godtycklig kod via felformade tabeller i PFB-filer, eller ogiltiga SHC-instruktioner i TTF-filer.
För den stabila utgåvan (Etch) har dessa problem rättats i version 2.2.1-5+etch3.
För den instabila utgåvan (Sid) har dessa problem rättats i version 2.3.6-1.
Vi rekommenderar att ni uppgraderar ert freetype-paket.
- CVE-2008-1806
- Rättat i:
-
Debian GNU/Linux 4.0 (etch)
- Källkod:
- http://security.debian.org/pool/updates/main/f/freetype/freetype_2.2.1-5+etch3.diff.gz
- http://security.debian.org/pool/updates/main/f/freetype/freetype_2.2.1-5+etch3.dsc
- http://security.debian.org/pool/updates/main/f/freetype/freetype_2.2.1-5+etch3.dsc
- Alpha:
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_alpha.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_alpha.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_alpha.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_alpha.udeb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_amd64.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_amd64.udeb
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_amd64.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_amd64.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_amd64.udeb
- ARM:
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_arm.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_arm.deb
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_arm.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_arm.udeb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_hppa.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_hppa.udeb
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_hppa.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_hppa.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_hppa.udeb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_i386.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_i386.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_i386.udeb
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_i386.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_ia64.udeb
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_ia64.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_ia64.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_ia64.deb
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_mips.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_mips.udeb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_mips.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_mips.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_mips.udeb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_mipsel.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_mipsel.udeb
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_mipsel.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_mipsel.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_mipsel.udeb
- PowerPC:
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_powerpc.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_powerpc.udeb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_powerpc.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_powerpc.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_powerpc.udeb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch3_sparc.udeb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_sparc.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch3_sparc.deb
- http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch3_sparc.deb
- http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch3_sparc.deb
MD5-kontrollsummor för dessa filer finns i originalbulletinen.