Date:         Fri, 6 Aug 2010 14:12:48 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Important: freetype on SL3.x, SL4.x,
              SL5.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Important: freetype security update
Issue date:	2010-08-05
CVE Names:	CVE-2010-1797

Two stack overflow flaws were found in the way the FreeType font engine
processed certain Compact Font Format (CFF) character strings (opcodes). 
If a user loaded a specially-crafted font file with an application 
linked against FreeType, it could cause the application to crash or, 
possibly, execute arbitrary code with the privileges of the user running 
the application. (CVE-2010-1797)

Note: CVE-2010-1797 only affects the FreeType 2 font engine.

The X server must be restarted (log out, then log back in) for this 
update to take effect.

SL 3.0.x

       SRPMS:
freetype-2.1.4-16.el3.src.rpm
       i386:
freetype-2.1.4-16.el3.i386.rpm
freetype-demos-2.1.4-16.el3.i386.rpm
freetype-devel-2.1.4-16.el3.i386.rpm
freetype-utils-2.1.4-16.el3.i386.rpm
       x86_64:
freetype-2.1.4-16.el3.i386.rpm
freetype-2.1.4-16.el3.x86_64.rpm
freetype-demos-2.1.4-16.el3.x86_64.rpm
freetype-devel-2.1.4-16.el3.x86_64.rpm
freetype-utils-2.1.4-16.el3.x86_64.rpm

SL 4.x

       SRPMS:
freetype-2.1.9-15.el4.8.src.rpm
       i386:
freetype-2.1.9-15.el4.8.i386.rpm
freetype-demos-2.1.9-15.el4.8.i386.rpm
freetype-devel-2.1.9-15.el4.8.i386.rpm
freetype-utils-2.1.9-15.el4.8.i386.rpm
       x86_64:
freetype-2.1.9-15.el4.8.i386.rpm
freetype-2.1.9-15.el4.8.x86_64.rpm
freetype-demos-2.1.9-15.el4.8.x86_64.rpm
freetype-devel-2.1.9-15.el4.8.x86_64.rpm
freetype-utils-2.1.9-15.el4.8.x86_64.rpm

SL 5.x

       SRPMS:
freetype-2.2.1-26.el5_5.src.rpm
       i386:
freetype-2.2.1-26.el5_5.i386.rpm
freetype-demos-2.2.1-26.el5_5.i386.rpm
freetype-devel-2.2.1-26.el5_5.i386.rpm
       x86_64:
freetype-2.2.1-26.el5_5.i386.rpm
freetype-2.2.1-26.el5_5.x86_64.rpm
freetype-demos-2.2.1-26.el5_5.x86_64.rpm
freetype-devel-2.2.1-26.el5_5.i386.rpm
freetype-devel-2.2.1-26.el5_5.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2010-1797 Important: freetype SL3.x, SL4.x,

Important: freetype security update

Summary

If a user loaded a specially-crafted font file with an applicationlinked against FreeType, it could cause the application to crash or,possibly, execute arbitrary code with the privileges of the user runningthe application. (CVE-2010-1797)Note: CVE-2010-1797 only affects the FreeType 2 font engine.The X server must be restarted (log out, then log back in) for thisupdate to take effect.SL 3.0.xSRPMS:freetype-2.1.4-16.el3.src.rpmi386:freetype-2.1.4-16.el3.i386.rpmfreetype-demos-2.1.4-16.el3.i386.rpmfreetype-devel-2.1.4-16.el3.i386.rpmfreetype-utils-2.1.4-16.el3.i386.rpmx86_64:freetype-2.1.4-16.el3.i386.rpmfreetype-2.1.4-16.el3.x86_64.rpmfreetype-demos-2.1.4-16.el3.x86_64.rpmfreetype-devel-2.1.4-16.el3.x86_64.rpmfreetype-utils-2.1.4-16.el3.x86_64.rpm



Security Fixes

Severity
Issued Date: : 2010-08-05
CVE Names: CVE-2010-1797
Two stack overflow flaws were found in the way the FreeType font engine
processed certain Compact Font Format (CFF) character strings (opcodes).

Related News