Headline
Gentoo Linux Security Advisory 202407-02
Gentoo Linux Security Advisory 202407-2 - A vulnerability has been discovered in SDL_ttf, which can lead to arbitrary memory writes. Versions greater than or equal to 2.20.0 are affected.
Gentoo Linux Security Advisory GLSA 202407-02
https://security.gentoo.org/
Severity: Normal
Title: SDL_ttf: Arbitrary Memory Write
Date: July 01, 2024
Bugs: #843434
ID: 202407-02
Synopsis
A vulnerability has been discovered in SDL_ttf, which can lead to
arbitrary memory writes.
Background
SDL_ttf is a wrapper around the FreeType and Harfbuzz libraries,
allowing you to use TrueType fonts to render text in SDL applications.
Affected packages
Package Vulnerable Unaffected
media-libs/sdl2-ttf < 2.20.0 >= 2.20.0
Description
A vulnerability has been discovered in SDL_ttf. Please review the CVE
identifier referenced below for details.
Impact
SDL_ttf was discovered to contain an arbitrary memory write via the
function TTF_RenderText_Solid(). This vulnerability is triggered via a
crafted TTF file.
Workaround
There is no known workaround at this time.
Resolution
All SDL_ttf users should upgrade to the latest version:
emerge --sync
emerge --ask --oneshot --verbose “>=media-libs/sdl2-ttf-2.20.0”
References
[ 1 ] CVE-2022-27470
https://nvd.nist.gov/vuln/detail/CVE-2022-27470
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202407-02
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Related news
SDL_ttf v2.0.18 and below was discovered to contain an arbitrary memory write via the function TTF_RenderText_Solid(). This vulnerability is triggered via a crafted TTF file.