Rapid7 Vulnerability & Exploit Database

RHSA-2012:0137: texlive security update

Back to Search

RHSA-2012:0137: texlive security update

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
01/07/2011
Created
07/25/2018
Added
02/21/2012
Modified
07/04/2017

Description

TeX Live is an implementation of TeX. TeX takes a text file and a set offormatting commands as input, and creates a typesetter-independent DeViceIndependent (DVI) file as output. The texlive packages provide a number ofutilities, including dvips.TeX Live embeds a copy of t1lib. The t1lib library allows you to rasterizebitmaps from PostScript Type 1 fonts. The following issues affect t1libcode:Two heap-based buffer overflow flaws were found in the way t1lib processedAdobe Font Metrics (AFM) files. If a specially-crafted font file was openedby a TeX Live utility, it could cause the utility to crash or, potentially,execute arbitrary code with the privileges of the user running the utility.(CVE-2010-2642, CVE-2011-0433)An invalid pointer dereference flaw was found in t1lib. A specially-craftedfont file could, when opened, cause a TeX Live utility to crash or,potentially, execute arbitrary code with the privileges of the user runningthe utility. (CVE-2011-0764)A use-after-free flaw was found in t1lib. A specially-crafted font filecould, when opened, cause a TeX Live utility to crash or, potentially,execute arbitrary code with the privileges of the user running the utility.(CVE-2011-1553)An off-by-one flaw was found in t1lib. A specially-crafted font file could,when opened, cause a TeX Live utility to crash or, potentially, executearbitrary code with the privileges of the user running the utility.(CVE-2011-1554)An out-of-bounds memory read flaw was found in t1lib. A specially-craftedfont file could, when opened, cause a TeX Live utility to crash.(CVE-2011-1552)Red Hat would like to thank the Evince development team for reportingCVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as theoriginal reporter of CVE-2010-2642.All users of texlive are advised to upgrade to these updated packages,which contain backported patches to correct these issues.

Solution(s)

  • redhat-upgrade-kpathsea
  • redhat-upgrade-kpathsea-devel
  • redhat-upgrade-mendexk
  • redhat-upgrade-texlive
  • redhat-upgrade-texlive-afm
  • redhat-upgrade-texlive-context
  • redhat-upgrade-texlive-debuginfo
  • redhat-upgrade-texlive-dvips
  • redhat-upgrade-texlive-dviutils
  • redhat-upgrade-texlive-east-asian
  • redhat-upgrade-texlive-latex
  • redhat-upgrade-texlive-utils
  • redhat-upgrade-texlive-xetex

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;