ALT-PU-2015-2200-1
Package libfreetype updated to version 2.4.11-alt0.M60C.1 for branch c6 in task 155436.
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-04507
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05454
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05455
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05456
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05457
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05458
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05459
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05460
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05461
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05462
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06996
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-08926
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-09663
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-09722
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2025-04-11
CVE-2012-1126
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800581
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800581
Modified: 2025-04-11
CVE-2012-1127
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800583
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800583
Modified: 2025-04-11
CVE-2012-1128
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800584
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800584
Modified: 2025-04-11
CVE-2012-1129
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800585
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800585
Modified: 2025-04-11
CVE-2012-1130
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800587
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800587
Modified: 2025-04-11
CVE-2012-1131
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800589
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800589
Modified: 2025-04-11
CVE-2012-1132
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800590
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800590
Modified: 2025-04-11
CVE-2012-1133
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800591
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800591
Modified: 2025-04-11
CVE-2012-1134
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800592
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800592
Modified: 2025-04-11
CVE-2012-1135
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800593
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800593
Modified: 2025-04-11
CVE-2012-1136
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800594
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800594
Modified: 2025-04-11
CVE-2012-1137
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800595
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800595
Modified: 2025-04-11
CVE-2012-1138
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800597
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800597
Modified: 2025-04-11
CVE-2012-1139
Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800598
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800598
Modified: 2025-04-11
CVE-2012-1140
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800600
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800600
Modified: 2025-04-11
CVE-2012-1141
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800602
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800602
Modified: 2025-04-11
CVE-2012-1142
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800604
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800604
Modified: 2025-04-11
CVE-2012-1143
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800606
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48918
- http://secunia.com/advisories/48951
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800606
Modified: 2025-04-11
CVE-2012-1144
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800607
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2012-0467.html
- http://secunia.com/advisories/48300
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48758
- http://secunia.com/advisories/48822
- http://secunia.com/advisories/48973
- http://security.gentoo.org/glsa/glsa-201204-04.xml
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2428
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://www.securityfocus.com/bid/52318
- http://www.securitytracker.com/id?1026765
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- https://bugzilla.redhat.com/show_bug.cgi?id=800607
Modified: 2025-04-11
CVE-2012-5668
FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37905
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37905
Modified: 2025-04-11
CVE-2012-5669
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://rhn.redhat.com/errata/RHSA-2013-0216.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37906
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://rhn.redhat.com/errata/RHSA-2013-0216.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37906
Modified: 2025-04-11
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37907
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
- http://secunia.com/advisories/51826
- http://secunia.com/advisories/51900
- http://www.freetype.org/
- http://www.openwall.com/lists/oss-security/2012/12/25/2
- http://www.securitytracker.com/id?1027921
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
- http://www.ubuntu.com/usn/USN-1686-1
- https://savannah.nongnu.org/bugs/?37907
Closed bugs
illegal hardcoded RPATH
В /usr/bin/freetype-config написана чушь