Lucene search

K
amazonAmazonALAS-2011-020
HistoryNov 19, 2011 - 1:18 a.m.

Important: freetype

2011-11-1901:18:00
alas.aws.amazon.com
11

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.8%

Issue Overview:

Multiple input validation flaws were found in the way FreeType processed CID-keyed fonts. If a specially-crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

Affected Packages:

freetype

Issue Correction:
Run yum update freetype to update your system.

New Packages:

i686:  
    freetype-demos-2.3.11-6.11.amzn1.i686  
    freetype-debuginfo-2.3.11-6.11.amzn1.i686  
    freetype-devel-2.3.11-6.11.amzn1.i686  
    freetype-2.3.11-6.11.amzn1.i686  
  
src:  
    freetype-2.3.11-6.11.amzn1.src  
  
x86_64:  
    freetype-debuginfo-2.3.11-6.11.amzn1.x86_64  
    freetype-demos-2.3.11-6.11.amzn1.x86_64  
    freetype-devel-2.3.11-6.11.amzn1.x86_64  
    freetype-2.3.11-6.11.amzn1.x86_64  

Additional References

Red Hat: CVE-2011-3439

Mitre: CVE-2011-3439

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.8%