gentoo-full-overlay/metadata/glsa/glsa-201408-02.xml

52 lines
1.8 KiB
XML
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201408-02">
<title>FreeType: Arbitrary code execution</title>
<synopsis>A vulnerability in FreeType could result in execution of arbitrary
code or Denial of Service.
</synopsis>
<product type="ebuild">freetype</product>
<announced>2014-08-09</announced>
<revised count="1">2014-08-09</revised>
<bug>504088</bug>
<access>remote</access>
<affected>
<package name="media-libs/freetype" auto="yes" arch="*">
<unaffected range="ge">2.5.3-r1</unaffected>
<vulnerable range="lt">2.5.3-r1</vulnerable>
</package>
</affected>
<background>
<p>FreeType is a high-quality and portable font engine.</p>
</background>
<description>
<p>A stack-based buffer overflow exists in Freetypes cf2_hintmap_build
function in cff/cf2hints.c.
</p>
</description>
<impact type="normal">
<p>A remote attacker may be able to execute arbitrary code or cause a
Denial of Service condition via specially crafted font file.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All FreeType users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.5.3-r1"
</code>
<p>Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying these packages.
</p>
</resolution>
<references>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2240">CVE-2014-2240</uri>
</references>
<metadata tag="requester" timestamp="2014-07-15T20:29:39Z">Zlogene</metadata>
<metadata tag="submitter" timestamp="2014-08-09T19:09:10Z">Zlogene</metadata>
</glsa>