openSUSE Security Update: freetype: Fixed several off-by-one / length checks missing
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2011:0852-1
Rating:             important
References:         #704612 
Cross-References:   CVE-2011-0226
Affected Products:
                    openSUSE 11.4
                    openSUSE 11.3
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This freetype2 update fixes sign extension problems and
   missing length checks.

   This issue was used in one of the last jailbreakme exploits
   for Apple iPhone/iPad products. (CVE-2011-0226)


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 11.4:

      zypper in -t patch freetype2-4915

   - openSUSE 11.3:

      zypper in -t patch freetype2-4915

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 11.4 (i586 x86_64):

      freetype2-devel-2.4.4-7.8.1
      libfreetype6-2.4.4-7.8.1

   - openSUSE 11.4 (x86_64):

      freetype2-devel-32bit-2.4.4-7.8.1
      libfreetype6-32bit-2.4.4-7.8.1

   - openSUSE 11.3 (i586 x86_64):

      freetype2-devel-2.3.12-7.6.1
      libfreetype6-2.3.12-7.6.1

   - openSUSE 11.3 (x86_64):

      freetype2-devel-32bit-2.3.12-7.6.1
      libfreetype6-32bit-2.3.12-7.6.1


References:

   https://www.suse.com/security/cve/CVE-2011-0226.html
   https://bugzilla.novell.com/704612

-- 

openSUSE: 2011:0852-1: important: freetype

July 28, 2011
An update that fixes one vulnerability is now available.

Description

This freetype2 update fixes sign extension problems and missing length checks. This issue was used in one of the last jailbreakme exploits for Apple iPhone/iPad products. (CVE-2011-0226)

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch freetype2-4915 - openSUSE 11.3: zypper in -t patch freetype2-4915 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 11.4 (i586 x86_64): freetype2-devel-2.4.4-7.8.1 libfreetype6-2.4.4-7.8.1 - openSUSE 11.4 (x86_64): freetype2-devel-32bit-2.4.4-7.8.1 libfreetype6-32bit-2.4.4-7.8.1 - openSUSE 11.3 (i586 x86_64): freetype2-devel-2.3.12-7.6.1 libfreetype6-2.3.12-7.6.1 - openSUSE 11.3 (x86_64): freetype2-devel-32bit-2.3.12-7.6.1 libfreetype6-32bit-2.3.12-7.6.1


References

https://www.suse.com/security/cve/CVE-2011-0226.html https://bugzilla.novell.com/704612--


Severity
Announcement ID: openSUSE-SU-2011:0852-1
Rating: important
Affected Products: openSUSE 11.4 openSUSE 11.3

Related News