SUSE-SU-2015:0463-1: moderate: Security update for freetype2
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Mar 10 19:04:55 MDT 2015
SUSE Security Update: Security update for freetype2
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0463-1
Rating: moderate
References: #916856 #916857 #916858 #916859 #916861 #916863
#916864 #916865 #916870 #916871 #916872 #916873
#916874 #916879 #916881
Cross-References: CVE-2014-9656 CVE-2014-9657 CVE-2014-9658
CVE-2014-9659 CVE-2014-9660 CVE-2014-9661
CVE-2014-9662 CVE-2014-9663 CVE-2014-9664
CVE-2014-9665 CVE-2014-9666 CVE-2014-9667
CVE-2014-9668 CVE-2014-9669 CVE-2014-9670
CVE-2014-9671 CVE-2014-9672 CVE-2014-9673
CVE-2014-9674 CVE-2014-9675
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that fixes 20 vulnerabilities is now available.
Description:
The font rendering library freetype2 has been updated to fix various
security issues.
Security Issues:
* CVE-2014-9656
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656>
* CVE-2014-9657
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657>
* CVE-2014-9658
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658>
* CVE-2014-9660
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660>
* CVE-2014-9661
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661>
* CVE-2014-9662
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662>
* CVE-2014-9667
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667>
* CVE-2014-9666
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666>
* CVE-2014-9665
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665>
* CVE-2014-9664
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664>
* CVE-2014-9663
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663>
* CVE-2014-9659
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659>
* CVE-2014-9668
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668>
* CVE-2014-9669
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669>
* CVE-2014-9670
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670>
* CVE-2014-9671
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671>
* CVE-2014-9672
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672>
* CVE-2014-9673
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673>
* CVE-2014-9674
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674>
* CVE-2014-9675
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-freetype2-201503=10386
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-freetype2-201503=10386
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-freetype2-201503=10386
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-freetype2-201503=10386
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
freetype2-devel-2.3.7-25.34.1
- SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64):
freetype2-devel-32bit-2.3.7-25.34.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
freetype2-2.3.7-25.34.1
ft2demos-2.3.7-25.34.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
freetype2-32bit-2.3.7-25.34.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
freetype2-2.3.7-25.34.1
ft2demos-2.3.7-25.34.1
- SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
freetype2-32bit-2.3.7-25.34.1
- SUSE Linux Enterprise Server 11 SP3 (ia64):
freetype2-x86-2.3.7-25.34.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
freetype2-2.3.7-25.34.1
ft2demos-2.3.7-25.34.1
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
freetype2-32bit-2.3.7-25.34.1
References:
http://support.novell.com/security/cve/CVE-2014-9656.html
http://support.novell.com/security/cve/CVE-2014-9657.html
http://support.novell.com/security/cve/CVE-2014-9658.html
http://support.novell.com/security/cve/CVE-2014-9659.html
http://support.novell.com/security/cve/CVE-2014-9660.html
http://support.novell.com/security/cve/CVE-2014-9661.html
http://support.novell.com/security/cve/CVE-2014-9662.html
http://support.novell.com/security/cve/CVE-2014-9663.html
http://support.novell.com/security/cve/CVE-2014-9664.html
http://support.novell.com/security/cve/CVE-2014-9665.html
http://support.novell.com/security/cve/CVE-2014-9666.html
http://support.novell.com/security/cve/CVE-2014-9667.html
http://support.novell.com/security/cve/CVE-2014-9668.html
http://support.novell.com/security/cve/CVE-2014-9669.html
http://support.novell.com/security/cve/CVE-2014-9670.html
http://support.novell.com/security/cve/CVE-2014-9671.html
http://support.novell.com/security/cve/CVE-2014-9672.html
http://support.novell.com/security/cve/CVE-2014-9673.html
http://support.novell.com/security/cve/CVE-2014-9674.html
http://support.novell.com/security/cve/CVE-2014-9675.html
https://bugzilla.suse.com/916856
https://bugzilla.suse.com/916857
https://bugzilla.suse.com/916858
https://bugzilla.suse.com/916859
https://bugzilla.suse.com/916861
https://bugzilla.suse.com/916863
https://bugzilla.suse.com/916864
https://bugzilla.suse.com/916865
https://bugzilla.suse.com/916870
https://bugzilla.suse.com/916871
https://bugzilla.suse.com/916872
https://bugzilla.suse.com/916873
https://bugzilla.suse.com/916874
https://bugzilla.suse.com/916879
https://bugzilla.suse.com/916881
http://download.suse.com/patch/finder/?keywords=8ff7d5aec940c311b66cdebb04cb66ea
More information about the sle-security-updates
mailing list