Lucene search

K
mageiaGentoo FoundationMGASA-2017-0124
HistoryMay 02, 2017 - 9:37 a.m.

Updated freetype2 packages fix security vulnerability

2017-05-0209:37:59
Gentoo Foundation
advisories.mageia.org
13

0.012 Low

EPSS

Percentile

84.9%

It was discovered that a heap-based buffer overflow existed in the FreeType library. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2016-10328). FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c (CVE-2017-8105). FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c (CVE-2017-8287).

OSVersionArchitecturePackageVersionFilename
Mageia5noarchfreetype2< 2.5.4-2.3freetype2-2.5.4-2.3.mga5
Mageia5noarchfreetype2< 2.5.4-2.3freetype2-2.5.4-2.3.mga5.tainted