LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 12th, 2014
Linux Security Week: December 9th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2012:002: t1lib Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake A vulnerability has been found and corrected in t1lib: t1lib 5.1.2 and earlier uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a specially crafted Type 1 font in a PDF document [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:002
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : t1lib
 Date    : January 2, 2012
 Affected: 2010.1, 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in t1lib:
 
 t1lib 5.1.2 and earlier uses an invalid pointer in conjunction with
 a dereference operation, which allows remote attackers to execute
 arbitrary code via a specially crafted Type 1 font in a PDF document
 (CVE-2011-0764).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2010.1:
 736337c41d7a950e14295f328745fd27  2010.1/i586/libt1lib5-5.1.2-8.2mdv2010.2.i586.rpm
 813152c5481cf07cd8d99c2f0869a59a  2010.1/i586/libt1lib-devel-5.1.2-8.2mdv2010.2.i586.rpm
 c06988fef2ca8807fa5f4cf93f7c6028  2010.1/i586/libt1lib-static-devel-5.1.2-8.2mdv2010.2.i586.rpm
 6cf4ba79e30bd53541a4f07a39084911  2010.1/i586/t1lib-config-5.1.2-8.2mdv2010.2.i586.rpm
 60d961c0411c0c98b547c623c03541b1  2010.1/i586/t1lib-progs-5.1.2-8.2mdv2010.2.i586.rpm 
 f03a530d559e867382eb6019c9d72271  2010.1/SRPMS/t1lib-5.1.2-8.2mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 ebdf62d8fcc239056b321add6f465d14  2010.1/x86_64/lib64t1lib5-5.1.2-8.2mdv2010.2.x86_64.rpm
 211d1f28995b631a524f484ffc0bf6f1  2010.1/x86_64/lib64t1lib-devel-5.1.2-8.2mdv2010.2.x86_64.rpm
 d23e081377659e1052bb938373159aa2  2010.1/x86_64/lib64t1lib-static-devel-5.1.2-8.2mdv2010.2.x86_64.rpm
 dce8a152687348ae926c16eb8149409c  2010.1/x86_64/t1lib-config-5.1.2-8.2mdv2010.2.x86_64.rpm
 d757fde4ed8a3211143e1e5c22a65cc0  2010.1/x86_64/t1lib-progs-5.1.2-8.2mdv2010.2.x86_64.rpm 
 f03a530d559e867382eb6019c9d72271  2010.1/SRPMS/t1lib-5.1.2-8.2mdv2010.2.src.rpm

 Mandriva Linux 2011:
 b1d91af6ae3ad03f3b3328aabef3491a  2011/i586/libt1lib5-5.1.2-11.1-mdv2011.0.i586.rpm
 236e2c32254f8a57352ac083e5bbd207  2011/i586/libt1lib-devel-5.1.2-11.1-mdv2011.0.i586.rpm
 945a94f1f6e1da103be813fe567503e3  2011/i586/libt1lib-static-devel-5.1.2-11.1-mdv2011.0.i586.rpm
 a88e481bd9e7dd898cfbd44e7419708d  2011/i586/t1lib-config-5.1.2-11.1-mdv2011.0.i586.rpm
 c9c78d2627b7851b5a9580258316c1a2  2011/i586/t1lib-progs-5.1.2-11.1-mdv2011.0.i586.rpm 
 7eaa61424b8c70df589144ac4f94f0e8  2011/SRPMS/t1lib-5.1.2-11.1.src.rpm

 Mandriva Linux 2011/X86_64:
 c614966e22c3e938b1d6b281198d8c65  2011/x86_64/lib64t1lib5-5.1.2-11.1-mdv2011.0.x86_64.rpm
 58302f9a21cd083b07bb4d11d2f33025  2011/x86_64/lib64t1lib-devel-5.1.2-11.1-mdv2011.0.x86_64.rpm
 f02a3ba5f9b92975d3e8f57ce5e1c9bc  2011/x86_64/lib64t1lib-static-devel-5.1.2-11.1-mdv2011.0.x86_64.rpm
 6031e97c0a98a94bf02676fb55a25bc3  2011/x86_64/t1lib-config-5.1.2-11.1-mdv2011.0.x86_64.rpm
 a4823d7fa62693b958075f6636b2d80a  2011/x86_64/t1lib-progs-5.1.2-11.1-mdv2011.0.x86_64.rpm 
 7eaa61424b8c70df589144ac4f94f0e8  2011/SRPMS/t1lib-5.1.2-11.1.src.rpm

 Mandriva Enterprise Server 5:
 3dc617bc21b08591bc6d0bce378e932e  mes5/i586/libt1lib5-5.1.2-4.2mdvmes5.2.i586.rpm
 725ec350e47e98781c1878e8319c6816  mes5/i586/libt1lib-devel-5.1.2-4.2mdvmes5.2.i586.rpm
 c65f8176917dcc140925ba003314790b  mes5/i586/libt1lib-static-devel-5.1.2-4.2mdvmes5.2.i586.rpm
 f2d805d204260d1337b76165f85facaf  mes5/i586/t1lib-config-5.1.2-4.2mdvmes5.2.i586.rpm
 6724eaf4fe88225bd7efc8a2fb4729aa  mes5/i586/t1lib-progs-5.1.2-4.2mdvmes5.2.i586.rpm 
 4ad34410ac6ced36e2ead5bf4d6c901a  mes5/SRPMS/t1lib-5.1.2-4.2mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 ddff1845d1c1c7e910f177c6ec5db490  mes5/x86_64/lib64t1lib5-5.1.2-4.2mdvmes5.2.x86_64.rpm
 eb7f4ca434bd133e0e5fb4f87f25d775  mes5/x86_64/lib64t1lib-devel-5.1.2-4.2mdvmes5.2.x86_64.rpm
 8732ecfba47434c69b44aed240ca3f13  mes5/x86_64/lib64t1lib-static-devel-5.1.2-4.2mdvmes5.2.x86_64.rpm
 105a1b571853b1958f788a27d8717566  mes5/x86_64/t1lib-config-5.1.2-4.2mdvmes5.2.x86_64.rpm
 6ce1bfcbf6edbca9e4110bf9b3118907  mes5/x86_64/t1lib-progs-5.1.2-4.2mdvmes5.2.x86_64.rpm 
 4ad34410ac6ced36e2ead5bf4d6c901a  mes5/SRPMS/t1lib-5.1.2-4.2mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
University of California, Berkeley Hacked, Data Compromised
London teen pleads guilty to Spamhaus DDoS
New England security group shares threat intelligence, strives to bolster region
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.