[Secure-testing-team] Bug#860303: freetype: CVE-2016-10328: heap-buffer-overflow in cff_parser_run()
Salvatore Bonaccorso
carnil at debian.org
Fri Apr 14 09:47:13 UTC 2017
Source: freetype
Version: 2.6.3-3.1
Severity: important
Tags: security patch upstream
Forwarded: https://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858
Control: fixed -1 2.7.1-0.1
Hi,
the following vulnerability was published for freetype.
CVE-2016-10328[0]:
| FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a
| heap-based buffer overflow related to the cff_parser_run function in
| cff/cffparse.c.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2016-10328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
[1] https://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858
[2] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
[3] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
More information about the Secure-testing-team
mailing list