Updated freetype2 packages fix security vulnerability
Publication date: 02 May 2017Modification date: 02 May 2017
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-10328 , CVE-2017-8105 , CVE-2017-8287
Description
It was discovered that a heap-based buffer overflow existed in the FreeType library. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2016-10328). FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c (CVE-2017-8105). FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c (CVE-2017-8287).
References
- https://bugs.mageia.org/show_bug.cgi?id=20720
- https://www.ubuntu.com/usn/usn-3263-1/
- https://www.debian.org/security/2017/dsa-3839
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
SRPMS
5/tainted
- freetype2-2.5.4-2.3.mga5.tainted
5/core
- freetype2-2.5.4-2.3.mga5