[Secure-testing-team] Bug#860303: freetype: CVE-2016-10328: heap-buffer-overflow in cff_parser_run()

Salvatore Bonaccorso carnil at debian.org
Fri Apr 14 09:47:13 UTC 2017


Source: freetype
Version: 2.6.3-3.1
Severity: important
Tags: security patch upstream
Forwarded: https://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858
Control: fixed -1 2.7.1-0.1

Hi,

the following vulnerability was published for freetype.

CVE-2016-10328[0]:
| FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a
| heap-based buffer overflow related to the cff_parser_run function in
| cff/cffparse.c.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-10328
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
[1] https://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858
[2] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
[3] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the Secure-testing-team mailing list