Univention Bugzilla – Full Text Bug Listing |
Summary: | freetype: Multiple issues (4.1) | ||
---|---|---|---|
Product: | UCS | Reporter: | Arvid Requate <requate> |
Component: | Security updates | Assignee: | Arvid Requate <requate> |
Status: | CLOSED FIXED | QA Contact: | Janek Walkenhorst <walkenhorst> |
Severity: | normal | ||
Priority: | P3 | CC: | gohmann, jmm, requate, walkenhorst |
Version: | UCS 4.1 | Flags: | requate:
Patch_Available+
|
Target Milestone: | UCS 4.1-4-errata | ||
Hardware: | Other | ||
OS: | Linux | ||
What kind of report is it?: | Security Issue | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | Security | |
Max CVSS v3 score: | 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) | ||
Bug Depends on: | 38465 | ||
Bug Blocks: |
Description
Arvid Requate
2016-02-01 11:52:55 CET
Upstream Debian package version 2.4.9-1.1+deb7u4 fixes this issue: * The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a font contains a glyph name, which allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file. (CVE-2016-10244) Imported and built. Advisory: freetype.yaml Tests (amd64): OK Advisory: OK Upstream Debian package version 2.4.9-1.1+deb7u5 additionally fixes: * out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c. (CVE-2016-10328) Package imported and built, advisory updated. Tests (amd64): OK Advisory: OK |