Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59684
Category:Fedora Local Security Checks
Title:Fedora Core 7 FEDORA-2007-0033 (freetype)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to freetype
announced via advisory FEDORA-2007-0033.

The FreeType engine is a free and portable font rendering
engine, developed to provide advanced font support for a variety of
platforms and environments. FreeType is a library which can open and
manages font files as well as efficiently load, hint and render
individual glyphs. FreeType is not a font server or a complete
text-rendering library.

Update Information:

This update fixes a bug in FreeType font rasterization engine that could cause a carefully crafted TrueType font to crash applications trying to use it.
ChangeLog:

* Thu May 31 2007 Behdad Esfahbod 2.3.4-3
- Add freetype-2.3.4-ttf-overflow.patch
* Thu Apr 12 2007 Behdad Esfahbod 2.3.4-2
- Add alpha to 64-bit archs (#236166)
References:

[ 1 ] Bug #240577
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240577
[ 2 ] CVE-2007-2754
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754
Updated packages:

1576a18681b5580e53614559a58b8bb87528e2e4 freetype-devel-2.3.4-3.fc7.ppc64.rpm
1bddaae976740d59c4b54325d1de2a9d18d2b7d5 freetype-demos-2.3.4-3.fc7.ppc64.rpm
e6372f6e32d854997e3c86084ea864115dbe5a57 freetype-2.3.4-3.fc7.ppc64.rpm
1ac840dea16a77b9d733b35039e7b5bf9b008467 freetype-debuginfo-2.3.4-3.fc7.ppc64.rpm
4199b4fe9bb1feaa3fc6e825cee8bf27ee257f8f freetype-2.3.4-3.fc7.i386.rpm
c2c16ccee25353f3e76bd32a502cb6b19f8f8fca freetype-devel-2.3.4-3.fc7.i386.rpm
c9ed324b1d6c44810c1e9bb80461edb15c9f604a freetype-debuginfo-2.3.4-3.fc7.i386.rpm
ad2a4c879c9cd6e63c65d7e1581363426095a22d freetype-demos-2.3.4-3.fc7.i386.rpm
32f1d5dc67e217d95e844dfa1ec45ddb4bbb429d freetype-2.3.4-3.fc7.x86_64.rpm
17796fed2280cbbc9e1d5224406480e69def1f70 freetype-demos-2.3.4-3.fc7.x86_64.rpm
87bb984b21ad73be7d202a7d052c8f141d3695fe freetype-devel-2.3.4-3.fc7.x86_64.rpm
d883a4ab97f600834a90e865584a29caf384b646 freetype-debuginfo-2.3.4-3.fc7.x86_64.rpm
e630c5a928c329cc6aa49e5d2f2ad009c503b09b freetype-demos-2.3.4-3.fc7.ppc.rpm
9593fc7c5e017ef1b6a8a09645ee5f7cfcff1c9d freetype-debuginfo-2.3.4-3.fc7.ppc.rpm
a3c6b6f01ed096f9b6568f24342289c3736d1f4c freetype-2.3.4-3.fc7.ppc.rpm
e6ebfe44dcb86d301675c4a748030ba8a76e924c freetype-devel-2.3.4-3.fc7.ppc.rpm
d08a9d43bbabddcb28a0e97a878fdefe2ab7ccf8 freetype-2.3.4-3.fc7.src.rpm

This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://docs.fedoraproject.org/yum/.

Solution: Apply the appropriate updates.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-0033

Risk factor : High

CVSS Score:
6.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-2754
1018088
http://www.securitytracker.com/id?1018088
102967
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1
103171
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1
200033
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1
2007-0019
http://www.trustix.org/errata/2007/0019/
20070524 FLEA-2007-0020-1: freetype
http://www.securityfocus.com/archive/1/469463/100/200/threaded
20070602-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
20070613 FLEA-2007-0025-1: openoffice.org
http://www.securityfocus.com/archive/1/471286/30/6180/threaded
24074
http://www.securityfocus.com/bid/24074
25350
http://secunia.com/advisories/25350
25353
http://secunia.com/advisories/25353
25386
http://secunia.com/advisories/25386
25463
http://secunia.com/advisories/25463
25483
http://secunia.com/advisories/25483
25609
http://secunia.com/advisories/25609
25612
http://secunia.com/advisories/25612
25654
http://secunia.com/advisories/25654
25705
http://secunia.com/advisories/25705
25808
http://secunia.com/advisories/25808
25894
http://secunia.com/advisories/25894
25905
http://secunia.com/advisories/25905
26129
http://secunia.com/advisories/26129
26305
http://secunia.com/advisories/26305
28298
http://secunia.com/advisories/28298
30161
http://secunia.com/advisories/30161
35074
http://secunia.com/advisories/35074
35200
http://secunia.com/advisories/35200
35204
http://secunia.com/advisories/35204
35233
http://secunia.com/advisories/35233
36509
http://osvdb.org/36509
ADV-2007-1894
http://www.vupen.com/english/advisories/2007/1894
ADV-2007-2229
http://www.vupen.com/english/advisories/2007/2229
ADV-2008-0049
http://www.vupen.com/english/advisories/2008/0049
ADV-2009-1297
http://www.vupen.com/english/advisories/2009/1297
APPLE-SA-2007-11-14
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
APPLE-SA-2009-05-12
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
DSA-1302
http://www.debian.org/security/2007/dsa-1302
DSA-1334
http://www.debian.org/security/2007/dsa-1334
FEDORA-2009-5558
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
FEDORA-2009-5644
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
GLSA-200705-22
http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml
GLSA-200707-02
http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
GLSA-200805-07
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
MDKSA-2007:121
http://www.mandriva.com/security/advisories?name=MDKSA-2007:121
OpenPKG-SA-2007.018
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html
RHSA-2007:0403
http://www.redhat.com/support/errata/RHSA-2007-0403.html
RHSA-2009:0329
http://www.redhat.com/support/errata/RHSA-2009-0329.html
RHSA-2009:1062
http://www.redhat.com/support/errata/RHSA-2009-1062.html
SUSE-SA:2007:041
http://www.novell.com/linux/security/advisories/2007_41_freetype2.html
TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
USN-466-1
http://www.ubuntu.com/usn/usn-466-1
[ft-devel] 20070427 Bug in fuzzed TTF file
http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178
http://support.apple.com/kb/HT3549
http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
https://bugzilla.redhat.com/show_bug.cgi?id=502565
https://issues.rpath.com/browse/RPL-1390
oval:org.mitre.oval:def:11325
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325
oval:org.mitre.oval:def:5532
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.