Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
patchinfo.449
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.449
<patchinfo incident="449"> <issue id="916873" tracker="bnc">VUL-0: CVE-2014-9672: freetype2: Array index error in the parse_fond function in base/ftmac.c</issue> <issue id="916872" tracker="bnc">VUL-0: CVE-2014-9671: freetype2: Off-by-one error in the pcf_get_properties function in pcf/pcfread.c</issue> <issue id="916871" tracker="bnc">VUL-0: CVE-2014-9670: freetype2: Multiple integer signedness errors in the pcf_get_encodings function inpcf/pcfread.c</issue> <issue id="916870" tracker="bnc">VUL-0: CVE-2014-9669: freetype2: Multiple integer overflows in sfnt/ttcmap.c</issue> <issue id="916860" tracker="bnc">VUL-0: CVE-2014-9662: freetype2: heap-based buffer overflow in cff/cf2ft.c</issue> <issue id="916861" tracker="bnc">VUL-0: CVE-2014-9667: freetype2: integer overflow and out-of-bounds read in sfnt/ttload.c</issue> <issue id="916862" tracker="bnc">VUL-0: CVE-2014-9666: freetype2: integer overflow and out-of-bounds read in the tt_sbit_decoder_init function in sfnt/ttsbit.c</issue> <issue id="916874" tracker="bnc">VUL-0: CVE-2014-9673: freetype2: Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c</issue> <issue id="916879" tracker="bnc">VUL-0: CVE-2014-9674: freetype2: integer overflow and heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c</issue> <issue id="916863" tracker="bnc">VUL-0: CVE-2014-9665: freetype2: integer overflow and heap-based buffer overflow in the Load_SBit_Png function in sfnt/pngshim.c</issue> <issue id="916868" tracker="bnc">VUL-0: CVE-2014-9668: freetype2: integer overflow and heap-based buffer overflow in the woff_open_font function in sfnt/sfobjs.c</issue> <issue id="916881" tracker="bnc">VUL-0: CVE-2014-9675: freetype2: bypass the ASLR protection mechanism via a crafted BDF font</issue> <issue id="916859" tracker="bnc">VUL-0: CVE-2014-9661: freetype2: use-after-free in type42/t42parse.c</issue> <issue id="916858" tracker="bnc">VUL-0: CVE-2014-9660: freetype2: NULL pointer dereference in the _bdf_parse_glyphs function in bdf/bdflib.c</issue> <issue id="916865" tracker="bnc">VUL-0: CVE-2014-9663: freetype2: out-of-bounds read in the tt_cmap4_validate function in sfnt/ttcmap.c</issue> <issue id="916867" tracker="bnc">VUL-0: CVE-2014-9659: freetype2: stack-based buffer overflow in cff/cf2intrp.c in the CFF CharString interpreter</issue> <issue id="916864" tracker="bnc">VUL-0: CVE-2014-9664: freetype2: out-of-bounds read via a crafted Type42 font</issue> <issue id="916847" tracker="bnc">VUL-0: CVE-2014-9656: freetype2: integer overflow in the tt_sbit_decoder_load_image function in sfnt/ttsbit.c</issue> <issue id="916857" tracker="bnc">VUL-0: CVE-2014-9658: freetype2: DoS in the tt_face_load_kern function in sfnt/ttkern.c</issue> <issue id="916856" tracker="bnc">VUL-0: CVE-2014-9657: freetype2: DoS in the tt_face_load_hdmx function in truetype/ttpload.c</issue> <issue id="CVE-2014-2240" tracker="cve" /> <issue id="CVE-2014-9663" tracker="cve" /> <issue id="CVE-2014-9662" tracker="cve" /> <issue id="CVE-2014-9661" tracker="cve" /> <issue id="CVE-2014-9660" tracker="cve" /> <issue id="CVE-2014-9667" tracker="cve" /> <issue id="CVE-2014-9666" tracker="cve" /> <issue id="CVE-2014-9665" tracker="cve" /> <issue id="CVE-2014-9664" tracker="cve" /> <issue id="CVE-2014-9669" tracker="cve" /> <issue id="CVE-2014-9668" tracker="cve" /> <issue id="CVE-2014-9656" tracker="cve" /> <issue id="CVE-2014-9658" tracker="cve" /> <issue id="CVE-2014-9659" tracker="cve" /> <issue id="CVE-2014-9674" tracker="cve" /> <issue id="CVE-2014-9675" tracker="cve" /> <issue id="CVE-2014-9657" tracker="cve" /> <issue id="CVE-2014-9670" tracker="cve" /> <issue id="CVE-2014-9671" tracker="cve" /> <issue id="CVE-2014-9672" tracker="cve" /> <issue id="CVE-2014-9673" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>nadvornik</packager> <description>freetype2 was updated to fix 20 security issues. These security issues were fixed: - CVE-2014-9663: The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table (bnc#916865). - CVE-2014-9662: cff/cf2ft.c in FreeType before 2.5.4 did not validate the return values of point-allocation functions, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font (bnc#916860). - CVE-2014-9661: type42/t42parse.c in FreeType before 2.5.4 did not consider that scanning can be incomplete without triggering an error, which allowed remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font (bnc#916859). - CVE-2014-9660: The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 did not properly handle a missing ENDCHAR record, which allowed remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font (bnc#916858). - CVE-2014-9667: sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allowed remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table (bnc#916861). - CVE-2014-9666: The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allowed remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap (bnc#916862). - CVE-2014-9665: The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 did not restrict the rows and pitch values of PNG data, which allowed remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file (bnc#916863). - CVE-2014-9664: FreeType before 2.5.4 did not check for the end of the data during certain parsing actions, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c (bnc#916864). - CVE-2014-9669: Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table (bnc#916870). - CVE-2014-9668: The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allowed remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file (bnc#916868). - CVE-2014-9656: The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 did not properly check for an integer overflow, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font (bnc#916847). - CVE-2014-9658: The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font (bnc#916857). - CVE-2014-9659: cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240 (bnc#916867). - CVE-2014-9674: The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allowed remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font (bnc#916879). - CVE-2014-9675: bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allowed remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font (bnc#916881). - CVE-2014-9657: The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 did not establish a minimum record size, which allowed remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font (bnc#916856). - CVE-2014-9670: Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row (bnc#916871). - CVE-2014-9671: Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented (bnc#916872). - CVE-2014-9672: Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file (bnc#916873). - CVE-2014-9673: Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font (bnc#916874). </description> <summary>Security update for freetype2</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor