---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: SUSE update for freetype2 SECUNIA ADVISORY ID: SA21285 VERIFY ADVISORY: http://secunia.com/advisories/21285/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: UnitedLinux 1.0 http://secunia.com/product/2003/ SUSE Linux 10 http://secunia.com/product/6221/ SUSE Linux 10.1 http://secunia.com/product/10796/ SUSE Linux 9.2 http://secunia.com/product/4258/ SUSE Linux 9.3 http://secunia.com/product/4933/ SuSE Linux Desktop 1.x http://secunia.com/product/2002/ SuSE Linux Enterprise Server 8 http://secunia.com/product/1171/ SUSE Linux Enterprise Server 9 http://secunia.com/product/4118/ DESCRIPTION: SUSE has issued an update for freetype2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise applications using the library. For more information: SA20100 SOLUTION: Apply updated packages. x86 Platform: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/freetype2-2.1.10-18.8.i586.rpm 5b3f167cce62870117a4e2fa009bae4f ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/freetype2-devel-2.1.10-18.8.i586.rpm e927b989339e9f9bec00d1b9dcaf9a19 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/freetype2-2.1.10-4.4.i586.rpm 531f4629f8dc5a2875f9e1c9aec0b1b5 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/freetype2-devel-2.1.10-4.4.i586.rpm 42dd4c6ca44ba52786519f59c83624b9 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/freetype2-2.1.9-4.4.i586.rpm c4c0764be947a478d0b5583e50510903 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/freetype2-devel-2.1.9-4.4.i586.rpm 3519d6e62b3d582bc47e5af1a2c774c6 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/freetype2-2.1.9-3.4.i586.rpm 146856628a74cb15457e11aa7337c31f ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/freetype2-devel-2.1.9-3.4.i586.rpm c416e6195fb1aa805e288526d54381af Power PC Platform: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/freetype2-2.1.10-18.8.ppc.rpm 2fb95c4f2d717cf3813db084be206a9f ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/freetype2-devel-2.1.10-18.8.ppc.rpm e42b9fb058f7fc177a5923b76d43aa1d SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/freetype2-2.1.10-4.4.ppc.rpm 57edbb76b03b7ea2c4a0649549f2556f ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/freetype2-devel-2.1.10-4.4.ppc.rpm 3e84a91d83f2723e4f1e9174bc744976 x86-64 Platform: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/freetype2-2.1.10-18.8.x86_64.rpm b6e4eb912ae20cc5e2108918aa4223ce ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/freetype2-32bit-2.1.10-18.8.x86_64.rpm 200e0497a3aba6400b95def9fd370743 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/freetype2-devel-2.1.10-18.8.x86_64.rpm 0069a1143bda97ed5c65e37561b634a6 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/freetype2-devel-32bit-2.1.10-18.8.x86_64.rpm eadbd8ec95d26e0b377c41b0a4b81ce7 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/freetype2-2.1.10-4.4.x86_64.rpm 502ee9101176c8cabe74ffa96b9c86bf ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/freetype2-32bit-2.1.10-4.4.x86_64.rpm b3839f54586cb9250067b43e9c37ff4f ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/freetype2-devel-2.1.10-4.4.x86_64.rpm db9965909415db561e09bee9f6fbb445 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/freetype2-devel-32bit-2.1.10-4.4.x86_64.rpm e84c092650ccd5dee76edaa90cbb26b0 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/freetype2-2.1.9-4.4.x86_64.rpm eef00de5d1a91266ed07285f4da34af2 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/freetype2-32bit-9.3-7.2.x86_64.rpm c906a892e78ffd90fcd96aba1d20f0f2 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/freetype2-devel-2.1.9-4.4.x86_64.rpm 62c7a3e6baab5ea1276f4e1b6bc2ca69 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/freetype2-devel-32bit-9.3-7.2.x86_64.rpm e5d5670a23d190565c0c3691bcf6dba7 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/freetype2-2.1.9-3.4.x86_64.rpm de7b9ea0e3aeae01c5fac30cc34a4e55 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/freetype2-32bit-9.2-200607282225.x86_64.rpm d2abe911c1b5147c1ac917c3f2704397 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/freetype2-devel-2.1.9-3.4.x86_64.rpm b5b7030ca22d70fad00bd1ed437906bb ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/freetype2-devel-32bit-9.2-200607282225.x86_64.rpm 8d1c484d443d317fc05ee83f426c83fa Sources: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/freetype2-2.1.10-18.8.src.rpm 0b6ab9aba01fb96057457dfa029075c6 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/freetype2-2.1.10-4.4.src.rpm 22d3bccb56fade850da7f816f1b482f2 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/freetype2-2.1.9-4.4.src.rpm 1535c2f49679dac17b60199e3f447121 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/freetype2-2.1.9-3.4.src.rpm 0a33023485fbdd877595ad66e541d06c ORIGINAL ADVISORY: http://lists.suse.com/archive/suse-security-announce/2006-Aug/0002.html OTHER REFERENCES: SA20100: http://secunia.com/advisories/20100/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------