Jamie Strandboge
2012-Jan-17 23:38 UTC
[Secure-testing-team] Bug#656278: t1lib: [PATCH] fixes for remaining CVEs
Package: t1lib Version: 5.1.2-3.4 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-devel at lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch Dear Maintainer, In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: fix denial of service via oversized fonts - debian/patches/CVE-2011-1552_1553_1554.patch: add additional tests to address remaining crashes - CVE-2011-1552 - CVE-2011-1553 - CVE-2011-1554 * SECURITY UPDATE: fix heap-based buffer overflow via AFM font parser - update debian/patches/series to apply CVE-2010-2642.patch which was mistakenly not updated in 5.1.2-3.4 - CVE-2010-2642 - CVE-2011-0433 Debian took the Ubuntu patch for CVE-2011-0764 (which is great). RedHat later fixed the remaining open CVEs with a patch landing in Fedora''s http://koji.fedoraproject.org/koji/buildinfo?buildID=282529. I then verified all the patches in Debian against Fedora''s patchset and came up with this patch against 5.1.2-3.4. While Debian included an equivalent patch for CVE-2010-2642 (which also fixes CVE-2011-0433), it was not added to the debian/patches/series file, so it wasn''t applied during the build. The attached debdiff should bring unstable up to date on these issues. Thanks for considering the patch. -- System Information: Debian Release: wheezy/sid APT prefers precise-updates APT policy: (500, ''precise-updates''), (500, ''precise-security''), (500, ''precise'') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-8-generic (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -------------- next part -------------- A non-text attachment was scrubbed... Name: t1lib_5.1.2-3.4ubuntu1.debdiff Type: text/x-diff Size: 6362 bytes Desc: not available URL: <http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20120117/b761f51a/attachment.diff>