File _patchinfo of Package patchinfo.2131
<patchinfo incident="2131">
<issue id="965810" tracker="bnc">VUL-0: CVE-2016-1526: graphite2: DoS</issue>
<issue id="965803" tracker="bnc">VUL-0: CVE-2016-1521: graphite2: An exploitable out-of-bounds read vulnerability exists in the opcodehandling functionality of Libgr...</issue>
<issue id="965807" tracker="bnc">VUL-0: CVE-2016-1523: graphite2: An exploitable heap-based buffer overflow exists in the context itemhandling functionality of Libgr...</issue>
<issue id="CVE-2016-1523" tracker="cve" />
<issue id="CVE-2016-1521" tracker="cve" />
<issue id="CVE-2016-1526" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>pgajdos</packager>
<description>
This update for graphite2 fixes the following issues:
- CVE-2016-1521: The directrun function in directmachine.cpp in
Libgraphite did not validate a certain skip operation, which allowed
remote attackers to execute arbitrary code, obtain sensitive information,
or cause a denial of service (out-of-bounds read and application crash)
via a crafted Graphite smart font.
- CVE-2016-1523: The SillMap::readFace function in FeatureMap.cpp in
Libgraphite mishandled a return value, which allowed remote attackers
to cause a denial of service (missing initialization, NULL pointer
dereference, and application crash) via a crafted Graphite smart font.
- CVE-2016-1526: The TtfUtil:LocaLookup function in TtfUtil.cpp in
Libgraphite incorrectly validated a size value, which allowed remote
attackers to obtain sensitive information or cause a denial of service
(out-of-bounds read and application crash) via a crafted Graphite
smart font.
</description>
<summary>Security update for graphite2</summary>
</patchinfo>