Summary: | <app-text/t1utils-1.39: buffer overflow flaw (CVE-2015-3905) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | aballier, fonts, sam |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1218365 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() (In reply to Agostino Sarubbo from comment #0) > @maintainer(s): since the fixed package is already in the tree, please let > us know if it is ready for the stabilization or not. yes Do what? (In reply to Jeroen Roovers from comment #2) > Do what? Arches, please test and mark stable: =app-text/t1utils-1.39 Target keywords : "alpha amd64 arm hppa ia64 ppc64 x86" amd64 stable Stable for PPC64. Stable for HPPA. ia64 stable ppc stable x86 stable arm stable CVE-2015-3905 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3905): Buffer overflow in the set_cs_start function in t1disasm.c in t1utils before 1.39 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. sparc stable Ping for alpha. alpha stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches, Thank you for your work. Maintainer(s), please drop the vulnerable version(s). New GLSA Request filed. (In reply to Yury German from comment #15) > Maintainer(s), please drop the vulnerable version(s). Done: + 07 Jul 2015; Ben de Groot <yngwin@gentoo.org> -t1utils-1.38.ebuild: + Remove vulnerable version (bug #548638) This issue was resolved and addressed in GLSA 201507-10 at https://security.gentoo.org/glsa/201507-10 by GLSA coordinator Mikle Kolyada (Zlogene). |