Lucene search

K
mageiaGentoo FoundationMGASA-2020-0389
HistoryOct 20, 2020 - 7:22 p.m.

Updated freetype2 packages fix security vulnerability

2020-10-2019:22:12
Gentoo Foundation
advisories.mageia.org
36
freetype2
security vulnerability
heap buffer overflow
libpng
ttf files
png sbit glyphs

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.029

Percentile

90.9%

A heap buffer overflow has been found in freetype2 before 2.10.4. Malformed TTF files with PNG sbit glyphs can cause a heap buffer overflow in Load_SBit_Png as libpng uses the original 32-bit values, which are saved in png_struct. If the original width and/or height are greater than 65535, the allocated buffer won’t be able to fit the bitmap. (CVE-2020-15999)

OSVersionArchitecturePackageVersionFilename
Mageia7noarchfreetype2< 2.9.1-4.1freetype2-2.9.1-4.1.mga7
Mageia7noarchfreetype2< 2.9.1-4.1freetype2-2.9.1-4.1.mga7.tainted

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

EPSS

0.029

Percentile

90.9%