ALT-BU-2015-2835-1
Branch c6 update bulletin.
Closed vulnerabilities
Modified: 2016-11-28
BDU:2015-06193
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06194
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06195
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06196
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06197
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06198
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06199
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06200
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07217
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07219
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07221
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07223
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07225
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07227
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07229
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07230
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09219
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09220
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09221
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09222
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09223
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09224
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09225
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09226
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09331
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09332
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09333
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09334
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09335
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09336
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09337
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09338
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09813
Уязвимость операционной системы Red Hat Enterprise Virtualization, позволяющая удаленному нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2016-11-28
BDU:2015-09814
Уязвимость операционной системы Debian GNU/Linux, позволяющая удаленному злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2015-09865
Уязвимость микропрограммного обеспечения сервера контроля безопасного доступа Cisco ACS, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2015-09866
Уязвимость микропрограммного обеспечения маршрутизатора Cisco ASR, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2023-03-09
BDU:2015-09867
Уязвимость микропрограммного обеспечения коммутатора Cisco Nexus 5000, позволяющая нарушителю выполнить произвольный код
Modified: 2021-03-23
BDU:2015-09868
Уязвимость микропрограммного обеспечения коммутатора Cisco Nexus 7000, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2015-09869
Уязвимость микропрограммного обеспечения системы коммуникаций Cisco Unified Communications Manager, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2015-10227
Уязвимость микропрограммного обеспечения виртуального коммутатора Cisco Nexus 1000V, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2015-10228
Уязвимость микропрограммного обеспечения контроллера беспроводных Cisco Wireless LAN Controller 2000, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2015-10229
Уязвимость микропрограммного обеспечения контроллера беспроводных сетей Cisco Wireless LAN Controller 2100, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2015-10230
Уязвимость микропрограммного обеспечения контроллера беспроводных сетей Cisco Wireless LAN Controller 2500, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2015-10231
Уязвимость микропрограммного обеспечения контроллера беспроводных сетей Cisco Wireless LAN Controller 4100, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2015-10232
Уязвимость микропрограммного обеспечения контроллера беспроводных сетей Cisco Wireless LAN Controller 4400, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2015-10233
Уязвимость микропрограммного обеспечения контроллера беспроводных сетей Cisco Wireless LAN Controller 5500, позволяющая удаленному злоумышленнику выполнить произвольный код
Modified: 2021-03-23
BDU:2016-02235
Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющие нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2016-02236
Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющие нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2012-6656
iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.
- http://www.debian.org/security/2015/dsa-3142
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
- http://www.openwall.com/lists/oss-security/2014/08/29/3
- http://www.openwall.com/lists/oss-security/2014/09/02/1
- http://www.securityfocus.com/bid/69472
- http://www.ubuntu.com/usn/USN-2432-1
- https://security.gentoo.org/glsa/201503-04
- https://sourceware.org/bugzilla/show_bug.cgi?id=14134
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5
- http://www.debian.org/security/2015/dsa-3142
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
- http://www.openwall.com/lists/oss-security/2014/08/29/3
- http://www.openwall.com/lists/oss-security/2014/09/02/1
- http://www.securityfocus.com/bid/69472
- http://www.ubuntu.com/usn/USN-2432-1
- https://security.gentoo.org/glsa/201503-04
- https://sourceware.org/bugzilla/show_bug.cgi?id=14134
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5
Modified: 2025-04-11
CVE-2013-1914
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- http://rhn.redhat.com/errata/RHSA-2013-0769.html
- http://rhn.redhat.com/errata/RHSA-2013-1605.html
- http://seclists.org/fulldisclosure/2021/Sep/0
- http://secunia.com/advisories/52817
- http://secunia.com/advisories/55113
- http://sourceware.org/bugzilla/show_bug.cgi?id=15330
- http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
- http://www.openwall.com/lists/oss-security/2013/04/03/2
- http://www.openwall.com/lists/oss-security/2013/04/03/8
- http://www.openwall.com/lists/oss-security/2013/04/05/1
- http://www.securityfocus.com/bid/58839
- http://www.ubuntu.com/usn/USN-1991-1
- http://www.vmware.com/security/advisories/VMSA-2014-0008.html
- https://bugzilla.novell.com/show_bug.cgi?id=813121
- https://bugzilla.redhat.com/show_bug.cgi?id=947882
- https://security.gentoo.org/glsa/201503-04
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- http://rhn.redhat.com/errata/RHSA-2013-0769.html
- http://rhn.redhat.com/errata/RHSA-2013-1605.html
- http://seclists.org/fulldisclosure/2021/Sep/0
- http://secunia.com/advisories/52817
- http://secunia.com/advisories/55113
- http://sourceware.org/bugzilla/show_bug.cgi?id=15330
- http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
- http://www.openwall.com/lists/oss-security/2013/04/03/2
- http://www.openwall.com/lists/oss-security/2013/04/03/8
- http://www.openwall.com/lists/oss-security/2013/04/05/1
- http://www.securityfocus.com/bid/58839
- http://www.ubuntu.com/usn/USN-1991-1
- http://www.vmware.com/security/advisories/VMSA-2014-0008.html
- https://bugzilla.novell.com/show_bug.cgi?id=813121
- https://bugzilla.redhat.com/show_bug.cgi?id=947882
- https://security.gentoo.org/glsa/201503-04
Modified: 2025-04-11
CVE-2013-4237
sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
- http://secunia.com/advisories/55113
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
- http://www.openwall.com/lists/oss-security/2013/08/12/8
- http://www.securityfocus.com/bid/61729
- http://www.ubuntu.com/usn/USN-1991-1
- https://bugzilla.redhat.com/show_bug.cgi?id=995839
- https://security.gentoo.org/glsa/201503-04
- https://sourceware.org/bugzilla/show_bug.cgi?id=14699
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=91ce40854d0b7f865cf5024ef95a8026b76096f3
- http://secunia.com/advisories/55113
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
- http://www.openwall.com/lists/oss-security/2013/08/12/8
- http://www.securityfocus.com/bid/61729
- http://www.ubuntu.com/usn/USN-1991-1
- https://bugzilla.redhat.com/show_bug.cgi?id=995839
- https://security.gentoo.org/glsa/201503-04
- https://sourceware.org/bugzilla/show_bug.cgi?id=14699
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=91ce40854d0b7f865cf5024ef95a8026b76096f3
Modified: 2025-04-11
CVE-2013-4332
Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
- http://rhn.redhat.com/errata/RHSA-2013-1411.html
- http://rhn.redhat.com/errata/RHSA-2013-1605.html
- http://secunia.com/advisories/55113
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
- http://www.openwall.com/lists/oss-security/2013/09/12/6
- http://www.securityfocus.com/bid/62324
- http://www.ubuntu.com/usn/USN-1991-1
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4332
- https://security.gentoo.org/glsa/201503-04
- https://sourceware.org/bugzilla/show_bug.cgi?id=15855
- https://sourceware.org/bugzilla/show_bug.cgi?id=15856
- https://sourceware.org/bugzilla/show_bug.cgi?id=15857
- http://rhn.redhat.com/errata/RHSA-2013-1411.html
- http://rhn.redhat.com/errata/RHSA-2013-1605.html
- http://secunia.com/advisories/55113
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
- http://www.openwall.com/lists/oss-security/2013/09/12/6
- http://www.securityfocus.com/bid/62324
- http://www.ubuntu.com/usn/USN-1991-1
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4332
- https://security.gentoo.org/glsa/201503-04
- https://sourceware.org/bugzilla/show_bug.cgi?id=15855
- https://sourceware.org/bugzilla/show_bug.cgi?id=15856
- https://sourceware.org/bugzilla/show_bug.cgi?id=15857
Modified: 2025-04-12
CVE-2014-6040
GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
- http://linux.oracle.com/errata/ELSA-2015-0016.html
- http://secunia.com/advisories/62100
- http://secunia.com/advisories/62146
- http://ubuntu.com/usn/usn-2432-1
- http://www.debian.org/security/2015/dsa-3142
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
- http://www.openwall.com/lists/oss-security/2014/08/29/3
- http://www.openwall.com/lists/oss-security/2014/09/02/1
- http://www.securityfocus.com/bid/69472
- https://security.gentoo.org/glsa/201602-02
- https://sourceware.org/bugzilla/show_bug.cgi?id=17325
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6
- http://linux.oracle.com/errata/ELSA-2015-0016.html
- http://secunia.com/advisories/62100
- http://secunia.com/advisories/62146
- http://ubuntu.com/usn/usn-2432-1
- http://www.debian.org/security/2015/dsa-3142
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
- http://www.openwall.com/lists/oss-security/2014/08/29/3
- http://www.openwall.com/lists/oss-security/2014/09/02/1
- http://www.securityfocus.com/bid/69472
- https://security.gentoo.org/glsa/201602-02
- https://sourceware.org/bugzilla/show_bug.cgi?id=17325
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6
Modified: 2025-04-12
CVE-2015-0235
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
- http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/
- http://linux.oracle.com/errata/ELSA-2015-0090.html
- http://linux.oracle.com/errata/ELSA-2015-0092.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://marc.info/?l=bugtraq&m=142296726407499&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142722450701342&w=2
- http://marc.info/?l=bugtraq&m=142781412222323&w=2
- http://marc.info/?l=bugtraq&m=143145428124857&w=2
- http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html
- http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html
- http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
- http://rhn.redhat.com/errata/RHSA-2015-0126.html
- http://seclists.org/fulldisclosure/2015/Jan/111
- http://seclists.org/fulldisclosure/2019/Jun/18
- http://seclists.org/fulldisclosure/2021/Sep/0
- http://seclists.org/fulldisclosure/2022/Jun/36
- http://seclists.org/oss-sec/2015/q1/269
- http://seclists.org/oss-sec/2015/q1/274
- http://secunia.com/advisories/62517
- http://secunia.com/advisories/62640
- http://secunia.com/advisories/62667
- http://secunia.com/advisories/62680
- http://secunia.com/advisories/62681
- http://secunia.com/advisories/62688
- http://secunia.com/advisories/62690
- http://secunia.com/advisories/62691
- http://secunia.com/advisories/62692
- http://secunia.com/advisories/62698
- http://secunia.com/advisories/62715
- http://secunia.com/advisories/62758
- http://secunia.com/advisories/62812
- http://secunia.com/advisories/62813
- http://secunia.com/advisories/62816
- http://secunia.com/advisories/62865
- http://secunia.com/advisories/62870
- http://secunia.com/advisories/62871
- http://secunia.com/advisories/62879
- http://secunia.com/advisories/62883
- http://support.apple.com/kb/HT204942
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost
- http://www-01.ibm.com/support/docview.wss?uid=swg21695695
- http://www-01.ibm.com/support/docview.wss?uid=swg21695774
- http://www-01.ibm.com/support/docview.wss?uid=swg21695835
- http://www-01.ibm.com/support/docview.wss?uid=swg21695860
- http://www-01.ibm.com/support/docview.wss?uid=swg21696131
- http://www-01.ibm.com/support/docview.wss?uid=swg21696243
- http://www-01.ibm.com/support/docview.wss?uid=swg21696526
- http://www-01.ibm.com/support/docview.wss?uid=swg21696600
- http://www-01.ibm.com/support/docview.wss?uid=swg21696602
- http://www-01.ibm.com/support/docview.wss?uid=swg21696618
- http://www.debian.org/security/2015/dsa-3142
- http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:039
- http://www.openwall.com/lists/oss-security/2021/05/04/7
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/archive/1/534845/100/0/threaded
- http://www.securityfocus.com/bid/72325
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032909
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- https://bto.bluecoat.com/security-advisory/sa90
- https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf
- https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671
- https://kc.mcafee.com/corporate/index?page=content&id=SB10100
- https://seclists.org/bugtraq/2019/Jun/14
- https://security.gentoo.org/glsa/201503-04
- https://security.netapp.com/advisory/ntap-20150127-0001/
- https://support.apple.com/HT205267
- https://support.apple.com/HT205375
- https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9
- https://www.f-secure.com/en/web/labs_global/fsc-2015-1
- https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
- https://www.sophos.com/en-us/support/knowledgebase/121879.aspx
- http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/
- http://linux.oracle.com/errata/ELSA-2015-0090.html
- http://linux.oracle.com/errata/ELSA-2015-0092.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://marc.info/?l=bugtraq&m=142296726407499&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142722450701342&w=2
- http://marc.info/?l=bugtraq&m=142781412222323&w=2
- http://marc.info/?l=bugtraq&m=143145428124857&w=2
- http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html
- http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html
- http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
- http://rhn.redhat.com/errata/RHSA-2015-0126.html
- http://seclists.org/fulldisclosure/2015/Jan/111
- http://seclists.org/fulldisclosure/2019/Jun/18
- http://seclists.org/fulldisclosure/2021/Sep/0
- http://seclists.org/fulldisclosure/2022/Jun/36
- http://seclists.org/oss-sec/2015/q1/269
- http://seclists.org/oss-sec/2015/q1/274
- http://secunia.com/advisories/62517
- http://secunia.com/advisories/62640
- http://secunia.com/advisories/62667
- http://secunia.com/advisories/62680
- http://secunia.com/advisories/62681
- http://secunia.com/advisories/62688
- http://secunia.com/advisories/62690
- http://secunia.com/advisories/62691
- http://secunia.com/advisories/62692
- http://secunia.com/advisories/62698
- http://secunia.com/advisories/62715
- http://secunia.com/advisories/62758
- http://secunia.com/advisories/62812
- http://secunia.com/advisories/62813
- http://secunia.com/advisories/62816
- http://secunia.com/advisories/62865
- http://secunia.com/advisories/62870
- http://secunia.com/advisories/62871
- http://secunia.com/advisories/62879
- http://secunia.com/advisories/62883
- http://support.apple.com/kb/HT204942
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost
- http://www-01.ibm.com/support/docview.wss?uid=swg21695695
- http://www-01.ibm.com/support/docview.wss?uid=swg21695774
- http://www-01.ibm.com/support/docview.wss?uid=swg21695835
- http://www-01.ibm.com/support/docview.wss?uid=swg21695860
- http://www-01.ibm.com/support/docview.wss?uid=swg21696131
- http://www-01.ibm.com/support/docview.wss?uid=swg21696243
- http://www-01.ibm.com/support/docview.wss?uid=swg21696526
- http://www-01.ibm.com/support/docview.wss?uid=swg21696600
- http://www-01.ibm.com/support/docview.wss?uid=swg21696602
- http://www-01.ibm.com/support/docview.wss?uid=swg21696618
- http://www.debian.org/security/2015/dsa-3142
- http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:039
- http://www.openwall.com/lists/oss-security/2021/05/04/7
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/archive/1/534845/100/0/threaded
- http://www.securityfocus.com/bid/72325
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032909
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- https://bto.bluecoat.com/security-advisory/sa90
- https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf
- https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671
- https://kc.mcafee.com/corporate/index?page=content&id=SB10100
- https://seclists.org/bugtraq/2019/Jun/14
- https://security.gentoo.org/glsa/201503-04
- https://security.netapp.com/advisory/ntap-20150127-0001/
- https://support.apple.com/HT205267
- https://support.apple.com/HT205375
- https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9
- https://www.f-secure.com/en/web/labs_global/fsc-2015-1
- https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
- https://www.sophos.com/en-us/support/knowledgebase/121879.aspx
Package libfreetype updated to version 2.4.11-alt0.M60C.1 for branch c6 in task 155436.
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-04507
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05454
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05455
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05456
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05457
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05458
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05459
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05460
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05461
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05462
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06996
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-08926
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-09663
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-09722
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2025-04-11
CVE-2012-1126
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800581
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800581
Modified: 2025-04-11
CVE-2012-1127
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800583
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800583
Modified: 2025-04-11
CVE-2012-1128
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800584
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800584
Modified: 2025-04-11
CVE-2012-1129
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800585
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800585
Modified: 2025-04-11
CVE-2012-1130
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800587
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800587
Modified: 2025-04-11
CVE-2012-1131
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800589
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800589
Modified: 2025-04-11
CVE-2012-1132
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800590
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800590
Modified: 2025-04-11
CVE-2012-1133
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800591
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800591
Modified: 2025-04-11
CVE-2012-1134
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800592
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800592
Modified: 2025-04-11
CVE-2012-1135
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800593
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800593
Modified: 2025-04-11
CVE-2012-1136
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800594
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800594
Modified: 2025-04-11
CVE-2012-1137
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800595
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800595
Modified: 2025-04-11
CVE-2012-1138
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800597
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800597
Modified: 2025-04-11
CVE-2012-1139
Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800598
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800598
Modified: 2025-04-11
CVE-2012-1140
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800600
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800600
Modified: 2025-04-11
CVE-2012-1141
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800602
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800602
Modified: 2025-04-11
CVE-2012-1142
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800604
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800604
Modified: 2025-04-11
CVE-2012-1143
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800606
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800606
Modified: 2025-04-11
CVE-2012-1144
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800607
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800607
Modified: 2025-04-11
CVE-2012-5668
FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37905
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37905
Modified: 2025-04-11
CVE-2012-5669
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://rhn.redhat.com/errata/RHSA-2013-0216.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37906
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://rhn.redhat.com/errata/RHSA-2013-0216.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37906
Modified: 2025-04-11
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37907
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37907
Closed bugs
illegal hardcoded RPATH
В /usr/bin/freetype-config написана чушь