-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Trustix Secure Linux Security Advisory #2007-0019 Package names: fetchmail, freetype, gd, libpng, python24 Summary: Multiple vulnerabilities Date: 2007-05-25 Affected versions: Trustix Secure Linux 2.2 Trustix Secure Linux 3.0 Trustix Secure Linux 3.0.5 Trustix Operating System - Enterprise Server 2 - -------------------------------------------------------------------------- Package description: fetchmail Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so you can read it through your favorite mail client. freetype The FreeType engine is a free and portable TrueType font rendering engine, developed to provide TrueType support for a variety of platforms and environments. FreeType is a library which can open and manages font files as well as efficiently load, hint and render individual glyphs. FreeType is not a font server or a complete text-rendering library. gd gd is a graphics library. It allows your code to quickly draw images complete with lines, arcs, text, multiple colors, cut and paste from other images, and flood fills, and write out the result as a PNG or JPEG file. This is particularly useful in World Wide Web applications, where PNG and JPEG are two of the formats accepted for inline images by most browsers. libpng libpng is a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. python24 Python is an interpreted, interactive, object-oriented programming language often compared to Tcl, Perl, Scheme or Java. Python includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries. Problem description: fetchmail < TSL 3.0.5 > < TSL 3.0 > - New upsteam. - SECURITY Fix: A weakness has been identified which is caused by an error in the APOP protocol that fails to properly prevent MD5 collisions, which could be exploited via man-in-the-middle attacks and specially crafted message-IDs to potentially disclose the first three characters of passwords. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007-1558 to this issue. freetype < TSL 3.0.5 > < TSL 3.0 > < TSL 2.2 > - SECURITY Fix: Victor Stinner has reported a vulnerability in FreeType, caused due to an error when parsing malformed TTF fonts in src/truetype/ttgload.c and may be exploited when processing a specially crafted TTF font. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-2754 to this issue. gd < TSL 3.0.5 > < TSL 3.0 > < TSL 2.2 > - SECURITY Fix: Xavier Roche has reported a vulnerability in GD Graphics Library caused due to the incorrect use of libpng within the function "gdPngReadData()" when processing truncated data. This can be exploited to cause an infinite loop by e.g. tricking an application using the library to process a specially crafted file. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-2756 to this issue. libpng < TSL 3.0.5 > < TSL 3.0 >< TSL 2.2 > < TSEL 2> - SECURITY Fix: A vulnerability has been reported in libpng, caused due to an error in the "png_handle_tRNS" function in pngrutil.c. This can be exploited by tricking an application using the library to process a specially crafted PNG file containing a malformed tRNS chunk. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-2445 to this issue. python24 < TSL 3.0.5 > - SECURITY Fix: A vulnerability has been identified, which could be exploited by attackers to gain knowledge of potentially sensitive information. This issue is caused by an off-by-one error in the "PyLocale_strxfrm()" [Modules/_localemodule.c] function when calculating the "n2" buffer size, which could be exploited by attackers to disclose and read portions of memory. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-2052 to this issue. Action: We recommend that all systems with this package installed be upgraded. Please note that if you do not need the functionality provided by this package, you may want to remove it from your system. Location: All Trustix Secure Linux updates are available from <URI:http://http.trustix.org/pub/trustix/updates/> <URI:ftp://ftp.trustix.org/pub/trustix/updates/> About Trustix Secure Linux: Trustix Secure Linux is a small Linux distribution for servers. With focus on security and stability, the system is painlessly kept safe and up to date from day one using swup, the automated software updater. Automatic updates: Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'. Questions? Check out our mailing lists: <URI:http://www.trustix.org/support/> Verification: This advisory along with all Trustix packages are signed with the TSL sign key. This key is available from: <URI:http://www.trustix.org/TSL-SIGN-KEY> The advisory itself is available from the errata pages at <URI:http://www.trustix.org/errata/trustix-2.2/> <URI:http://www.trustix.org/errata/trustix-3.0/> and <URI:http://www.trustix.org/errata/trustix-3.0.5/> or directly at <URI:http://www.trustix.org/errata/2007/0019/> MD5sums of the packages: - -------------------------------------------------------------------------- 7e7fca1269d3cef8364255068ca0f0eb 3.0.5/rpms/fetchmail-6.3.8-1tr.i586.rpm b8253ea826e589446d340459bc0c8e19 3.0.5/rpms/freetype-2.2.1-4tr.i586.rpm f3f5bc6cd33b050f3b20132ed962c569 3.0.5/rpms/freetype-devel-2.2.1-4tr.i586.rpm 25cb794e2a82cd79cbbacbc5b9a37e90 3.0.5/rpms/gd-2.0.33-9tr.i586.rpm 3ad81c1bb37200a1512548098cc058c5 3.0.5/rpms/gd-devel-2.0.33-9tr.i586.rpm 9ca0451a302ceb6ad281a1387aa0858c 3.0.5/rpms/gd-utils-2.0.33-9tr.i586.rpm 7ef7ade271351a872d36d07474a5df1c 3.0.5/rpms/libpng-1.2.8-7tr.i586.rpm 1f4800a01ce727e0762a03d6111e87e7 3.0.5/rpms/libpng-devel-1.2.8-7tr.i586.rpm 61ad38f6a3575f36373fce0a590a99c4 3.0.5/rpms/libpng-tools-1.2.8-7tr.i586.rpm 190ad056b4845b0a55871ba2a4dc0415 3.0.5/rpms/python24-2.4.3-3tr.i586.rpm c9f6db6204a43e1dced98335ef2e707e 3.0.5/rpms/python24-devel-2.4.3-3tr.i586.rpm cf8bc6fad6d1ebe2cbdcd82fa73cb7a5 3.0.5/rpms/python24-docs-2.4.3-3tr.i586.rpm 306f3bb8368df63bfc8d26f943086ed2 3.0.5/rpms/python24-gdbm-2.4.3-3tr.i586.rpm 2efe519b245c7a7ac0d3bf39658ae844 3.0.5/rpms/python24-idle-2.4.3-3tr.i586.rpm f67994c30577317cd00cc2c7fa12b36e 3.0.5/rpms/python24-modules-2.4.3-3tr.i586.rpm 95d9d0b13dcf5eb4be9e6a244c103073 3.0/rpms/fetchmail-6.3.8-1tr.i586.rpm 4b3632b42bd1f44831553f7e6c0e18d0 3.0/rpms/freetype-2.2.1-3tr.i586.rpm e8525aeb5dcd9b74803da0ca8cf5a038 3.0/rpms/freetype-devel-2.2.1-3tr.i586.rpm 1b3cc6c8410795d4f0928a00ee21a56e 3.0/rpms/gd-2.0.33-8tr.i586.rpm 74bb9464d9cdf55864d7b9107b411742 3.0/rpms/gd-devel-2.0.33-8tr.i586.rpm 4ddc9896fec17c94f493461a56da0c20 3.0/rpms/gd-utils-2.0.33-8tr.i586.rpm 86ebb35e3ac771671381c57dfa47499a 3.0/rpms/libpng-1.2.8-6tr.i586.rpm be14341a8c739f36518a9c9be0b1aae3 3.0/rpms/libpng-devel-1.2.8-6tr.i586.rpm 6cdfac28461801d5017364aa3acfe9d7 3.0/rpms/libpng-tools-1.2.8-6tr.i586.rpm 999941386f1af1854592aaeb2527738d 2.2/rpms/freetype-2.2.1-3tr.i586.rpm 2c8e070510dc431d4912d4fd7a718e72 2.2/rpms/freetype-devel-2.2.1-3tr.i586.rpm 75fe49d9388dcd718419d9c7fa295f62 2.2/rpms/gd-2.0.33-6tr.i586.rpm ffb27b795f47bae1b270d0602b9a8961 2.2/rpms/gd-devel-2.0.33-6tr.i586.rpm 8926492e1dad737d05de5703fa37dfae 2.2/rpms/gd-utils-2.0.33-6tr.i586.rpm 136a054c65e5106c00c1f6e39bb7614c 2.2/rpms/libpng-1.2.7-3tr.i586.rpm c3f5efe104098c7484f704a6cc52f728 2.2/rpms/libpng-devel-1.2.7-3tr.i586.rpm 29c0926024f2b122073bf96955f3a46b 2.2/rpms/libpng-tools-1.2.7-3tr.i586.rpm - -------------------------------------------------------------------------- Trustix Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) iD8DBQFGVrPfi8CEzsK9IksRAvPqAJ0Yjfv2b9+KBwnxfPboznlr/V0XJQCcCmha /Ok1CVATXlidPmuSa5X6cDg= =TaL6 -----END PGP SIGNATURE-----