FreeType: Buffer overflow — GLSA 200705-22

A vulnerability has been discovered in FreeType allowing for the execution of arbitrary code.

Affected Packages

media-libs/freetype on all architectures
Affected versions < 2.3.4-r2
Unaffected versions >= 2.3.4-r2, < 2.0

Background

FreeType is a True Type Font rendering library.

Description

Victor Stinner discovered a heap-based buffer overflow in the function Get_VMetrics() in src/truetype/ttgload.c when processing TTF files with a negative n_points attribute.

Impact

A remote attacker could entice a user to open a specially crafted TTF file, possibly resulting in the execution of arbitrary code with the privileges of the user running FreeType.

Workaround

There is no known workaround at this time.

Resolution

All FreeType users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.3.4-r2"

References

Release Date
May 30, 2007

Latest Revision
May 30, 2007: 01

Severity
normal

Exploitable
remote

Bugzilla entries