Security update for freetype2

This update for freetype2 fixes the following security issues:

- CVE-2016-10244: Make sure that the parse_charstrings function in
type1/t1load.c does ensure that a font contains a glyph name to prevent a DoS
through a heap-based buffer over-read or possibly have unspecified other
impact via a crafted file (bsc#1028103)
- CVE-2017-8105: Fix an out-of-bounds write caused by a heap-based
buffer overflow related to the t1_decoder_parse_charstrings function in
psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
overflow related to the t1_builder_close_contour function in psaux/psobjs.c
(bsc#1036457)
- Fix several integer overflow issues in truetype/ttinterp.c (bsc#1079600)

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Fixed bugs
bnc#1079600
VUL-1: freetype2: Integer overflow issues in src/truetype/ttinterp.c
bnc#1035807
VUL-0: CVE-2017-8105: freetype2: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by aheap-based buffer overflow relat...
bnc#1036457
VUL-0: CVE-2017-8287: freetype2: FreeType 2 before 2017-03-26 has an out-of-bounds write caused by aheap-based buffer overflow relat...
bnc#1028103
VUL-1: CVE-2016-10244: freetype2: The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 doesnot ensure that a fon...
Selected Binaries
openSUSE Build Service is sponsored by