Summary: | <x11-libs/pango-1.28.3-r1: Heap corruption when using FreeType2 backend (CVE-2011-0020) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | gnome |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.gnome.org/show_bug.cgi?id=639882 | ||
Whiteboard: | A2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 357067 |
Description
Tim Sammut (RETIRED)
2011-01-19 04:29:28 UTC
Per http://www.openwall.com/lists/oss-security/2011/01/20/2 this has been assigned CVE-2011-0020. +*pango-1.28.3-r1 (12 Mar 2011) + + 12 Mar 2011; Pacho Ramos <pacho@gentoo.org> -files/pango-1.2.5-lib64.patch, + -pango-1.24.5-r1.ebuild, -files/pango-1.26.0-introspection-automagic.patch, + -pango-1.26.2.ebuild, +pango-1.28.3-r1.ebuild, + +files/pango-1.28.3-heap-corruption.patch, + +files/pango-1.28.3-malloc-failure.patch: + Fix security issues: CVE-2011-0020 and CVE-2011-0064. Remove old. + Thanks, Pacho. Arches, please test and mark stable: =x11-libs/pango-1.28.3-r1 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" Tested on SPARc, passed its tests. Could stabilise. ppc/ppc64 stable amd64 ok x86 stable Stable on alpha. amd64 done. Thanks Agostino Stable for HPPA. arm/ia64/s390/sh/sparc stable Thanks folks. Added existing GLSA request. CVE-2011-0020 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0020): Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object. This issue was resolved and addressed in GLSA 201405-13 at http://security.gentoo.org/glsa/glsa-201405-13.xml by GLSA coordinator Sean Amoss (ackle). |