Lucene search

K
gentooGentoo FoundationGLSA-201201-08
HistoryJan 23, 2012 - 12:00 a.m.

FontForge: User-assisted execution of arbitrary code

2012-01-2300:00:00
Gentoo Foundation
security.gentoo.org
12

0.166 Low

EPSS

Percentile

96.0%

Background

FontForge is a PostScript font editor and converter.

Description

FontForge is vulnerable to an error when processing the “CHARSET_REGISTRY” header in font files, which could cause a stack-based buffer overflow.

Impact

A remote attacker could entice a user to open a specially crafted BDF file using FontForge font editor, possibly resulting in the remote execution of arbitrary code with the privileges of the FontForge process, or a Denial of Service (application crash).

Workaround

There is no known workaround at this time.

Resolution

All FontForge users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-gfx/fontforge-20110222-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since October 12, 2011. It is likely that your system is already no longer affected by this issue.

OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-gfx/fontforge< 20110222-r1UNKNOWN