Summary: | <media-libs/freetype-2.4.3-r1: Heap Overflow Vulnerability via Crafted Font (CVE-2010-3855) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | bugsgentoo, fonts |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a | ||
Whiteboard: | A2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
2010-10-22 06:35:03 UTC
Patch applied in 2.4.3-r1. 2.4.3 was in the middle of stabilization so I'll close bug #341845 and we'll do it here. Great, thank you, Ryan. Arches, please test and mark stable: =media-libs/freetype-2.4.3-r1 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" ok for me on amd64 amd64 done. Thanks Agostino Stable for HPPA. alpha/arm/ia64/m68k/s390/sh/sparc/x86 stable ppc done ppc64 done Thanks folks, GLSA request filed. This is CVE-2010-3855. CVE-2010-3855 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855): Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font. This issue was resolved and addressed in GLSA 201201-09 at http://security.gentoo.org/glsa/glsa-201201-09.xml by GLSA coordinator Sean Amoss (ackle). |