安全公告详情

NS-SA-2025-0249

2025-10-23 19:59:52

简介

important: freetype/git security update

严重级别

important

主题

An update for freetype/git is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

freetype:
git:


Security Fix(es):
freetype: A flaw was found in FreeType. In affected versions, an out-of-bounds write condition may be triggered when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value, causing it to wrap around and allocate a heap buffer that is too small. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This issue could result in arbitrary code execution or other undefined behavior.(CVE-2025-27363)
freetype: bugfix
git: A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a specialized repository on their target's local system. For performance reasons, Git uses hardlinks when cloning a repository located on the same disk. However, if the repo being cloned is owned by a different user, this can introduce a security risk. At any time in the future, the original repo owner could rewrite the hardlinked files in the cloned user's repo.(CVE-2024-32020)
git: A vulnerability was found in Git. This vulnerability can be exploited by an unauthenticated attacker who places a specialized repository on the target's local system. If the victim clones this repository, the attacker can execute arbitrary code.(CVE-2024-32004)
git: A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a repository on their target's local system that contains symlinks. During the cloning process, Git could be tricked into creating hardlinked arbitrary files into their repository's objects/ directory, impacting availability and integrity.(CVE-2024-32021)
git: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.04B7.

影响组件

  • freetype
  • git

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["freetype-2.13.2-1.zncgsl7.2.x86_64.rpm","freetype-doc-2.13.2-1.zncgsl7.2.noarch.rpm","freetype-mini-2.13.2-1.zncgsl7.2.x86_64.rpm","freetype-devel-2.13.2-1.zncgsl7.2.x86_64.rpm","freetype-demos-2.13.2-1.zncgsl7.2.x86_64.rpm"],"source":"freetype-2.13.2-1.zncgsl7.2.src.rpm"},{"binary":["perl-Git-2.41.0-1.zncgsl7.10.noarch.rpm","perl-Git-SVN-2.41.0-1.zncgsl7.10.noarch.rpm","gitweb-2.41.0-1.zncgsl7.10.noarch.rpm","git-subtree-2.41.0-1.zncgsl7.10.noarch.rpm","git-p4-2.41.0-1.zncgsl7.10.noarch.rpm","git-instaweb-2.41.0-1.zncgsl7.10.noarch.rpm","git-credential-libsecret-2.41.0-1.zncgsl7.10.x86_64.rpm","git-svn-2.41.0-1.zncgsl7.10.noarch.rpm","git-email-2.41.0-1.zncgsl7.10.noarch.rpm","gitk-2.41.0-1.zncgsl7.10.noarch.rpm","git-gui-2.41.0-1.zncgsl7.10.noarch.rpm","git-core-doc-2.41.0-1.zncgsl7.10.noarch.rpm","git-2.41.0-1.zncgsl7.10.x86_64.rpm","git-daemon-2.41.0-1.zncgsl7.10.x86_64.rpm","git-all-2.41.0-1.zncgsl7.10.noarch.rpm","git-core-2.41.0-1.zncgsl7.10.x86_64.rpm"],"source":"git-2.41.0-1.zncgsl7.10.src.rpm"}]}]}

CVE

参考