Mandriva Linux Security Advisory 2012-002 - t1lib 5.1.2 and earlier uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a specially crafted Type 1 font in a PDF document. The updated packages have been patched to correct this issue.
60428b231e6e685f90934eef256d10a1f276a4dc719c3d75122cf6e911385901
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:002
http://www.mandriva.com/security/
_______________________________________________________________________
Package : t1lib
Date : January 2, 2012
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in t1lib:
t1lib 5.1.2 and earlier uses an invalid pointer in conjunction with
a dereference operation, which allows remote attackers to execute
arbitrary code via a specially crafted Type 1 font in a PDF document
(CVE-2011-0764).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2010.1:
736337c41d7a950e14295f328745fd27 2010.1/i586/libt1lib5-5.1.2-8.2mdv2010.2.i586.rpm
813152c5481cf07cd8d99c2f0869a59a 2010.1/i586/libt1lib-devel-5.1.2-8.2mdv2010.2.i586.rpm
c06988fef2ca8807fa5f4cf93f7c6028 2010.1/i586/libt1lib-static-devel-5.1.2-8.2mdv2010.2.i586.rpm
6cf4ba79e30bd53541a4f07a39084911 2010.1/i586/t1lib-config-5.1.2-8.2mdv2010.2.i586.rpm
60d961c0411c0c98b547c623c03541b1 2010.1/i586/t1lib-progs-5.1.2-8.2mdv2010.2.i586.rpm
f03a530d559e867382eb6019c9d72271 2010.1/SRPMS/t1lib-5.1.2-8.2mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64:
ebdf62d8fcc239056b321add6f465d14 2010.1/x86_64/lib64t1lib5-5.1.2-8.2mdv2010.2.x86_64.rpm
211d1f28995b631a524f484ffc0bf6f1 2010.1/x86_64/lib64t1lib-devel-5.1.2-8.2mdv2010.2.x86_64.rpm
d23e081377659e1052bb938373159aa2 2010.1/x86_64/lib64t1lib-static-devel-5.1.2-8.2mdv2010.2.x86_64.rpm
dce8a152687348ae926c16eb8149409c 2010.1/x86_64/t1lib-config-5.1.2-8.2mdv2010.2.x86_64.rpm
d757fde4ed8a3211143e1e5c22a65cc0 2010.1/x86_64/t1lib-progs-5.1.2-8.2mdv2010.2.x86_64.rpm
f03a530d559e867382eb6019c9d72271 2010.1/SRPMS/t1lib-5.1.2-8.2mdv2010.2.src.rpm
Mandriva Linux 2011:
b1d91af6ae3ad03f3b3328aabef3491a 2011/i586/libt1lib5-5.1.2-11.1-mdv2011.0.i586.rpm
236e2c32254f8a57352ac083e5bbd207 2011/i586/libt1lib-devel-5.1.2-11.1-mdv2011.0.i586.rpm
945a94f1f6e1da103be813fe567503e3 2011/i586/libt1lib-static-devel-5.1.2-11.1-mdv2011.0.i586.rpm
a88e481bd9e7dd898cfbd44e7419708d 2011/i586/t1lib-config-5.1.2-11.1-mdv2011.0.i586.rpm
c9c78d2627b7851b5a9580258316c1a2 2011/i586/t1lib-progs-5.1.2-11.1-mdv2011.0.i586.rpm
7eaa61424b8c70df589144ac4f94f0e8 2011/SRPMS/t1lib-5.1.2-11.1.src.rpm
Mandriva Linux 2011/X86_64:
c614966e22c3e938b1d6b281198d8c65 2011/x86_64/lib64t1lib5-5.1.2-11.1-mdv2011.0.x86_64.rpm
58302f9a21cd083b07bb4d11d2f33025 2011/x86_64/lib64t1lib-devel-5.1.2-11.1-mdv2011.0.x86_64.rpm
f02a3ba5f9b92975d3e8f57ce5e1c9bc 2011/x86_64/lib64t1lib-static-devel-5.1.2-11.1-mdv2011.0.x86_64.rpm
6031e97c0a98a94bf02676fb55a25bc3 2011/x86_64/t1lib-config-5.1.2-11.1-mdv2011.0.x86_64.rpm
a4823d7fa62693b958075f6636b2d80a 2011/x86_64/t1lib-progs-5.1.2-11.1-mdv2011.0.x86_64.rpm
7eaa61424b8c70df589144ac4f94f0e8 2011/SRPMS/t1lib-5.1.2-11.1.src.rpm
Mandriva Enterprise Server 5:
3dc617bc21b08591bc6d0bce378e932e mes5/i586/libt1lib5-5.1.2-4.2mdvmes5.2.i586.rpm
725ec350e47e98781c1878e8319c6816 mes5/i586/libt1lib-devel-5.1.2-4.2mdvmes5.2.i586.rpm
c65f8176917dcc140925ba003314790b mes5/i586/libt1lib-static-devel-5.1.2-4.2mdvmes5.2.i586.rpm
f2d805d204260d1337b76165f85facaf mes5/i586/t1lib-config-5.1.2-4.2mdvmes5.2.i586.rpm
6724eaf4fe88225bd7efc8a2fb4729aa mes5/i586/t1lib-progs-5.1.2-4.2mdvmes5.2.i586.rpm
4ad34410ac6ced36e2ead5bf4d6c901a mes5/SRPMS/t1lib-5.1.2-4.2mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
ddff1845d1c1c7e910f177c6ec5db490 mes5/x86_64/lib64t1lib5-5.1.2-4.2mdvmes5.2.x86_64.rpm
eb7f4ca434bd133e0e5fb4f87f25d775 mes5/x86_64/lib64t1lib-devel-5.1.2-4.2mdvmes5.2.x86_64.rpm
8732ecfba47434c69b44aed240ca3f13 mes5/x86_64/lib64t1lib-static-devel-5.1.2-4.2mdvmes5.2.x86_64.rpm
105a1b571853b1958f788a27d8717566 mes5/x86_64/t1lib-config-5.1.2-4.2mdvmes5.2.x86_64.rpm
6ce1bfcbf6edbca9e4110bf9b3118907 mes5/x86_64/t1lib-progs-5.1.2-4.2mdvmes5.2.x86_64.rpm
4ad34410ac6ced36e2ead5bf4d6c901a mes5/SRPMS/t1lib-5.1.2-4.2mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFPAdMwmqjQ0CJFipgRAmZMAJ47lFJRJE8OtRkY+vlJtwEwIMHVHACg0LlP
ROT/onXPZhr3Y8R2Z1Iqcus=
=Q9Q6
-----END PGP SIGNATURE-----