ALT-PU-2014-2420-1
Package libfreetype updated to version 2.5.4-alt1 for branch sisyphus in task 136091.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-9656
The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=196
- http://code.google.com/p/google-security-research/issues/detail?id=196
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f0292bb9920aa1dbfed5f53861e7c7a89b35833a
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f0292bb9920aa1dbfed5f53861e7c7a89b35833a
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9657
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=195
- http://code.google.com/p/google-security-research/issues/detail?id=195
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=eca0f067068020870a429fe91f6329e499390d55
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=eca0f067068020870a429fe91f6329e499390d55
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9658
The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=194
- http://code.google.com/p/google-security-research/issues/detail?id=194
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f70d9342e65cd2cb44e9f26b6d7edeedf191fc6c
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f70d9342e65cd2cb44e9f26b6d7edeedf191fc6c
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9659
cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.
- http://code.google.com/p/google-security-research/issues/detail?id=190
- http://code.google.com/p/google-security-research/issues/detail?id=190
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2cdc4562f873237f1c77d43540537c7a721d3fd8
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2cdc4562f873237f1c77d43540537c7a721d3fd8
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9660
The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=188
- http://code.google.com/p/google-security-research/issues/detail?id=188
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=af8346172a7b573715134f7a51e6c5c60fa7f2ab
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=af8346172a7b573715134f7a51e6c5c60fa7f2ab
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9661
type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=187
- http://code.google.com/p/google-security-research/issues/detail?id=187
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3788187e0c396952cd7d905c6c61f3ff8e84b2b4
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3788187e0c396952cd7d905c6c61f3ff8e84b2b4
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=42fcd6693ec7bd6ffc65ddc63e74287a65dda669
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=42fcd6693ec7bd6ffc65ddc63e74287a65dda669
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- http://packetstormsecurity.com/files/134396/FreeType-2.5.3-Type42-Parsing-Use-After-Free.html
- http://packetstormsecurity.com/files/134396/FreeType-2.5.3-Type42-Parsing-Use-After-Free.html
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9662
cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=185
- http://code.google.com/p/google-security-research/issues/detail?id=185
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5f201ab5c24cb69bc96b724fd66e739928d6c5e2
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5f201ab5c24cb69bc96b724fd66e739928d6c5e2
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9663
The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=184
- http://code.google.com/p/google-security-research/issues/detail?id=184
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9bd20b7304aae61de5d50ac359cf27132bafd4c1
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9bd20b7304aae61de5d50ac359cf27132bafd4c1
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9664
FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=183
- http://code.google.com/p/google-security-research/issues/detail?id=183
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=73be9f9ab67842cfbec36ee99e8d2301434c84ca
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=73be9f9ab67842cfbec36ee99e8d2301434c84ca
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=dd89710f0f643eb0f99a3830e0712d26c7642acd
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=dd89710f0f643eb0f99a3830e0712d26c7642acd
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9665
The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.
- http://code.google.com/p/google-security-research/issues/detail?id=168
- http://code.google.com/p/google-security-research/issues/detail?id=168
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=54abd22891bd51ef8b533b24df53b3019b5cee81
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=54abd22891bd51ef8b533b24df53b3019b5cee81
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b3500af717010137046ec4076d1e1c0641e33727
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b3500af717010137046ec4076d1e1c0641e33727
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9666
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=167
- http://code.google.com/p/google-security-research/issues/detail?id=167
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9667
sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=166
- http://code.google.com/p/google-security-research/issues/detail?id=166
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=677ddf4f1dc1b36cef7c7ddd59a14c508f4b1891
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=677ddf4f1dc1b36cef7c7ddd59a14c508f4b1891
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9668
The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
- http://code.google.com/p/google-security-research/issues/detail?id=164
- http://code.google.com/p/google-security-research/issues/detail?id=164
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f46add13895337ece929b18bb8f036431b3fb538
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f46add13895337ece929b18bb8f036431b3fb538
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9669
Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=163
- http://code.google.com/p/google-security-research/issues/detail?id=163
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=602040b1112c9f94d68e200be59ea7ac3d104565
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=602040b1112c9f94d68e200be59ea7ac3d104565
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9670
Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=158
- http://code.google.com/p/google-security-research/issues/detail?id=158
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ef1eba75187adfac750f326b563fe543dd5ff4e6
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ef1eba75187adfac750f326b563fe543dd5ff4e6
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9671
Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=157
- http://code.google.com/p/google-security-research/issues/detail?id=157
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0e2f5d518c60e2978f26400d110eff178fa7e3c3
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0e2f5d518c60e2978f26400d110eff178fa7e3c3
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9672
Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=155
- http://code.google.com/p/google-security-research/issues/detail?id=155
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=18a8f0d9943369449bc4de92d411c78fb08d616c
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=18a8f0d9943369449bc4de92d411c78fb08d616c
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- http://packetstormsecurity.com/files/134395/FreeType-2.5.3-Mac-FOND-Resource-Parsing-Out-Of-Bounds-Read-From-Stack.html
- http://packetstormsecurity.com/files/134395/FreeType-2.5.3-Mac-FOND-Resource-Parsing-Out-Of-Bounds-Read-From-Stack.html
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9673
Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=154
- http://code.google.com/p/google-security-research/issues/detail?id=154
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=35252ae9aa1dd9343e9f4884e9ddb1fee10ef415
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=35252ae9aa1dd9343e9f4884e9ddb1fee10ef415
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9674
The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=153
- http://code.google.com/p/google-security-research/issues/detail?id=153
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=240c94a185cd8dae7d03059abec8a5662c35ecd3
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=240c94a185cd8dae7d03059abec8a5662c35ecd3
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=cd4a5a26e591d01494567df9dec7f72d59551f6e
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=cd4a5a26e591d01494567df9dec7f72d59551f6e
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3461
- DSA-3461
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
Modified: 2024-11-21
CVE-2014-9675
bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://code.google.com/p/google-security-research/issues/detail?id=151
- http://code.google.com/p/google-security-research/issues/detail?id=151
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2c4832d30939b45c05757f0a05128ce64c4cacc7
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2c4832d30939b45c05757f0a05128ce64c4cacc7
- FEDORA-2015-2237
- FEDORA-2015-2237
- FEDORA-2015-2216
- FEDORA-2015-2216
- openSUSE-SU-2015:0627
- openSUSE-SU-2015:0627
- RHSA-2015:0696
- RHSA-2015:0696
- DSA-3188
- DSA-3188
- MDVSA-2015:055
- MDVSA-2015:055
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72986
- 72986
- USN-2510-1
- USN-2510-1
- USN-2739-1
- USN-2739-1
- GLSA-201503-05
- GLSA-201503-05
- https://source.android.com/security/bulletin/2016-11-01.html
- https://source.android.com/security/bulletin/2016-11-01.html
Modified: 2024-11-21
CVE-2014-9746
The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted font.
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
- DSA-3370
- DSA-3370
- [oss-security] 20150911 CVE Request: 2 FreeType issues
- [oss-security] 20150911 CVE Request: 2 FreeType issues
- [oss-security] 20150925 Re: CVE Request: 2 FreeType issues
- [oss-security] 20150925 Re: CVE Request: 2 FreeType issues
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- https://savannah.nongnu.org/bugs/?41309
- https://savannah.nongnu.org/bugs/?41309
Modified: 2024-11-21
CVE-2014-9747
The t42_parse_encoding function in type42/t42parse.c in FreeType before 2.5.4 does not properly update the current position for immediates-only mode, which allows remote attackers to cause a denial of service (infinite loop) via a Type42 font.
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
- DSA-3370
- DSA-3370
- [oss-security] 20150911 CVE Request: 2 FreeType issues
- [oss-security] 20150911 CVE Request: 2 FreeType issues
- [oss-security] 20150925 Re: CVE Request: 2 FreeType issues
- [oss-security] 20150925 Re: CVE Request: 2 FreeType issues
- https://savannah.nongnu.org/bugs/?41309
- https://savannah.nongnu.org/bugs/?41309