Description: | Description: The remote host is missing an update to freetype announced via advisory FEDORA-2010-15785.
References:
[ 1 ] Bug #613160 - CVE-2010-2498 freetype: invalid free vulnerability with possible heap corruption https://bugzilla.redhat.com/show_bug.cgi?id=613160 [ 2 ] Bug #613162 - CVE-2010-2499 freetype: buffer overflow vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=613162 [ 3 ] Bug #613167 - CVE-2010-2500 freetype: integer overflow vulnerability in smooth/ftgrays.c https://bugzilla.redhat.com/show_bug.cgi?id=613167 [ 4 ] Bug #613194 - CVE-2010-2519 freetype: heap buffer overflow vulnerability when processing certain font files https://bugzilla.redhat.com/show_bug.cgi?id=613194 [ 5 ] Bug #613198 - CVE-2010-2520 freetype: heap buffer overflow vulnerability in truetype bytecode support https://bugzilla.redhat.com/show_bug.cgi?id=613198 [ 6 ] Bug #614557 - CVE-2010-2527 Freetype demos multiple buffer overflows https://bugzilla.redhat.com/show_bug.cgi?id=614557 [ 7 ] Bug #617342 - CVE-2010-2541 Freetype ftmulti buffer overflow https://bugzilla.redhat.com/show_bug.cgi?id=617342 [ 8 ] Bug #621144 - CVE-2010-1797 FreeType: Multiple stack overflows by processing CFF opcodes https://bugzilla.redhat.com/show_bug.cgi?id=621144 [ 9 ] Bug #621907 - CVE-2010-2808 FreeType: Stack-based buffer overflow by processing certain LWFN fonts https://bugzilla.redhat.com/show_bug.cgi?id=621907 [ 10 ] Bug #621980 - CVE-2010-2806 FreeType: Heap-based buffer overflow by processing FontType42 fonts with negative length of SFNT strings (FT bug #30656) https://bugzilla.redhat.com/show_bug.cgi?id=621980 [ 11 ] Bug #623625 - CVE-2010-3311 freetype: Input stream position error by processing Compact Font Format (CFF) font files https://bugzilla.redhat.com/show_bug.cgi?id=623625 [ 12 ] Bug #625626 - CVE-2010-2805 freetype: FT_Stream_EnterFrame() does not properly validate certain position values https://bugzilla.redhat.com/show_bug.cgi?id=625626
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update freetype' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-15785
Risk factor : Critical
CVSS Score: 9.3
|