Gentoo Archives: gentoo-announce

From: Sean Amoss <ackle@g.o>
To: gentoo-announce@l.g.o
Cc: buqtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 201201-09 ] FreeType: Multiple vulnerabilities
Date: Mon, 23 Jan 2012 20:18:13
Message-Id: 4F1DBE7C.9090808@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201201-09
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: FreeType: Multiple vulnerabilities
9 Date: January 23, 2012
10 Bugs: #332701, #342121, #345843, #377143, #387535, #390623
11 ID: 201201-09
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in FreeType, allowing remote
19 attackers to possibly execute arbitrary code or cause a Denial of
20 Service.
21
22 Background
23 ==========
24
25 FreeType is a high-quality and portable font engine.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 media-libs/freetype < 2.4.8 >= 2.4.8
34
35 Description
36 ===========
37
38 Multiple vulnerabilities have been discovered in FreeType. Please
39 review the CVE identifiers referenced below for details.
40
41 Impact
42 ======
43
44 A remote attacker could entice a user to open a specially crafted font,
45 possibly resulting in the remote execution of arbitrary code with the
46 privileges of the user running the application, or a Denial of Service.
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All FreeType users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.4.8"
60
61 References
62 ==========
63
64 [ 1 ] CVE-2010-1797
65 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1797
66 [ 2 ] CVE-2010-2497
67 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2497
68 [ 3 ] CVE-2010-2498
69 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2498
70 [ 4 ] CVE-2010-2499
71 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2499
72 [ 5 ] CVE-2010-2500
73 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2500
74 [ 6 ] CVE-2010-2519
75 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2519
76 [ 7 ] CVE-2010-2520
77 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2520
78 [ 8 ] CVE-2010-2527
79 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2527
80 [ 9 ] CVE-2010-2541
81 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2541
82 [ 10 ] CVE-2010-2805
83 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2805
84 [ 11 ] CVE-2010-2806
85 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2806
86 [ 12 ] CVE-2010-2807
87 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2807
88 [ 13 ] CVE-2010-2808
89 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2808
90 [ 14 ] CVE-2010-3053
91 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3053
92 [ 15 ] CVE-2010-3054
93 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3054
94 [ 16 ] CVE-2010-3311
95 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3311
96 [ 17 ] CVE-2010-3814
97 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3814
98 [ 18 ] CVE-2010-3855
99 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855
100 [ 19 ] CVE-2011-0226
101 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0226
102 [ 20 ] CVE-2011-3256
103 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3256
104 [ 21 ] CVE-2011-3439
105 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3439
106
107 Availability
108 ============
109
110 This GLSA and any updates to it are available for viewing at
111 the Gentoo Security Website:
112
113 http://security.gentoo.org/glsa/glsa-201201-09.xml
114
115 Concerns?
116 =========
117
118 Security is a primary focus of Gentoo Linux and ensuring the
119 confidentiality and security of our users' machines is of utmost
120 importance to us. Any security concerns should be addressed to
121 security@g.o or alternatively, you may file a bug at
122 https://bugs.gentoo.org.
123
124 License
125 =======
126
127 Copyright 2012 Gentoo Foundation, Inc; referenced text
128 belongs to its owner(s).
129
130 The contents of this document are licensed under the
131 Creative Commons - Attribution / Share Alike license.
132
133 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature