Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:13.2:Update
patchinfo.3653
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.3653
<patchinfo incident="3653"> <issue id="916873" tracker="bnc">VUL-0: CVE-2014-9672: freetype2: Array index error in the parse_fond function in base/ftmac.c</issue> <issue id="916872" tracker="bnc">VUL-0: CVE-2014-9671: freetype2: Off-by-one error in the pcf_get_properties function in pcf/pcfread.c</issue> <issue id="916871" tracker="bnc">VUL-0: CVE-2014-9670: freetype2: Multiple integer signedness errors in the pcf_get_encodings function inpcf/pcfread.c</issue> <issue id="916870" tracker="bnc">VUL-0: CVE-2014-9669: freetype2: Multiple integer overflows in sfnt/ttcmap.c</issue> <issue id="916860" tracker="bnc">VUL-0: CVE-2014-9662: freetype2: heap-based buffer overflow in cff/cf2ft.c</issue> <issue id="916861" tracker="bnc">VUL-0: CVE-2014-9667: freetype2: integer overflow and out-of-bounds read in sfnt/ttload.c</issue> <issue id="916862" tracker="bnc">VUL-0: CVE-2014-9666: freetype2: integer overflow and out-of-bounds read in the tt_sbit_decoder_init function in sfnt/ttsbit.c</issue> <issue id="916874" tracker="bnc">VUL-0: CVE-2014-9673: freetype2: Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c</issue> <issue id="916879" tracker="bnc">VUL-0: CVE-2014-9674: freetype2: integer overflow and heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c</issue> <issue id="916863" tracker="bnc">VUL-0: CVE-2014-9665: freetype2: integer overflow and heap-based buffer overflow in the Load_SBit_Png function in sfnt/pngshim.c</issue> <issue id="916868" tracker="bnc">VUL-0: CVE-2014-9668: freetype2: integer overflow and heap-based buffer overflow in the woff_open_font function in sfnt/sfobjs.c</issue> <issue id="916881" tracker="bnc">VUL-0: CVE-2014-9675: freetype2: bypass the ASLR protection mechanism via a crafted BDF font</issue> <issue id="916859" tracker="bnc">VUL-0: CVE-2014-9661: freetype2: use-after-free in type42/t42parse.c</issue> <issue id="916858" tracker="bnc">VUL-0: CVE-2014-9660: freetype2: NULL pointer dereference in the _bdf_parse_glyphs function in bdf/bdflib.c</issue> <issue id="916865" tracker="bnc">VUL-0: CVE-2014-9663: freetype2: out-of-bounds read in the tt_cmap4_validate function in sfnt/ttcmap.c</issue> <issue id="916867" tracker="bnc">VUL-0: CVE-2014-9659: freetype2: stack-based buffer overflow in cff/cf2intrp.c in the CFF CharString interpreter</issue> <issue id="916864" tracker="bnc">VUL-0: CVE-2014-9664: freetype2: out-of-bounds read via a crafted Type42 font</issue> <issue id="916847" tracker="bnc">VUL-0: CVE-2014-9656: freetype2: integer overflow in the tt_sbit_decoder_load_image function in sfnt/ttsbit.c</issue> <issue id="916857" tracker="bnc">VUL-0: CVE-2014-9658: freetype2: DoS in the tt_face_load_kern function in sfnt/ttkern.c</issue> <issue id="916856" tracker="bnc">VUL-0: CVE-2014-9657: freetype2: DoS in the tt_face_load_hdmx function in truetype/ttpload.c</issue> <issue id="CVE-2014-9663" tracker="cve" /> <issue id="CVE-2014-9662" tracker="cve" /> <issue id="CVE-2014-9661" tracker="cve" /> <issue id="CVE-2014-9660" tracker="cve" /> <issue id="CVE-2014-9667" tracker="cve" /> <issue id="CVE-2014-9666" tracker="cve" /> <issue id="CVE-2014-9665" tracker="cve" /> <issue id="CVE-2014-9664" tracker="cve" /> <issue id="CVE-2014-9669" tracker="cve" /> <issue id="CVE-2014-9668" tracker="cve" /> <issue id="CVE-2014-9656" tracker="cve" /> <issue id="CVE-2014-9658" tracker="cve" /> <issue id="CVE-2014-9659" tracker="cve" /> <issue id="CVE-2014-9674" tracker="cve" /> <issue id="CVE-2014-9675" tracker="cve" /> <issue id="CVE-2014-9657" tracker="cve" /> <issue id="CVE-2014-9670" tracker="cve" /> <issue id="CVE-2014-9671" tracker="cve" /> <issue id="CVE-2014-9672" tracker="cve" /> <issue id="CVE-2014-9673" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>nadvornik</packager> <description>freetype2 was updated to fix various vulnerabilities that could lead to crashes or potentially code execution when parsing fonts. </description> <summary>Security update for freetype2</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor