Bug#1064517: texlive-bin: CVE-2024-25262
On Fri, Feb 23, 2024 at 10:13:53PM +0100, Hilmar Preuße wrote: > On 23.02.24 16:31, Moritz Mühlenhoff wrote: > > Hello Moritz, > > > The following vulnerability was published for texlive-bin. > > > > CVE-2024-25262[0]: > > | texlive-bin commit c515e was discovered to contain heap buffer > > | overflow via the function ttfLoadHDMX:ttfdump. This vulnerability > > | allows attackers to cause a Denial of Service (DoS) via supplying a > > | crafted TTF file. > > > > I'll upload tl-bin -9 soon. Do we need a fix in Debian stable too? It's rather harmless, I don't believe we need a DSA. If you make an update for a forthcoming point release to fix other bugs it's worth piggybacking this, though. Cheers, Moritz
Bug#1064517: texlive-bin: CVE-2024-25262
On 23.02.24 16:31, Moritz Mühlenhoff wrote: Hello Moritz, The following vulnerability was published for texlive-bin. CVE-2024-25262[0]: | texlive-bin commit c515e was discovered to contain heap buffer | overflow via the function ttfLoadHDMX:ttfdump. This vulnerability | allows attackers to cause a Denial of Service (DoS) via supplying a | crafted TTF file. I'll upload tl-bin -9 soon. Do we need a fix in Debian stable too? Hilmar -- Testmail OpenPGP_signature.asc Description: OpenPGP digital signature
Bug#1064517: texlive-bin: CVE-2024-25262
Source: texlive-bin X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for texlive-bin. CVE-2024-25262[0]: | texlive-bin commit c515e was discovered to contain heap buffer | overflow via the function ttfLoadHDMX:ttfdump. This vulnerability | allows attackers to cause a Denial of Service (DoS) via supplying a | crafted TTF file. https://tug.org/svn/texlive/trunk/Build/source/texk/ttfdump/ChangeLog?revision=69605=co https://bugs.launchpad.net/ubuntu/+source/texlive-bin/+bug/2047912 https://github.com/TeX-Live/texlive-source/pull/63 If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-25262 https://www.cve.org/CVERecord?id=CVE-2024-25262 Please adjust the affected versions in the BTS as needed.