SUSE-SU-2018:0462-1: moderate: Security update for freetype2

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Feb 16 07:07:26 MST 2018


   SUSE Security Update: Security update for freetype2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0462-1
Rating:             moderate
References:         #1028103 #1035807 #1036457 
Cross-References:   CVE-2016-10244 CVE-2017-8105 CVE-2017-8287
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:


   This update for freetype2 fixes the following issues:

   Security issue fixed:
   - CVE-2016-10244: The parse_charstrings function in type1/t1load.c did not
     ensure that a font contains a glyph name, which allowed remote attackers
     to cause a denial of service (heap-based buffer over-read) or possibly
     have unspecified other impact via a crafted file (bsc#1028103).

   - CVE-2017-8105: Fixed an out-of-bounds write caused by a heap-based
     buffer overflow related to the t1_decoder_parse_charstrings function in
     psaux/t1decode.ca (bsc#1035807)
   - CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
     overflow related to the t1_builder_close_contour function in
      psaux/psobjs.c (bsc#1036457)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-freetype2-13472=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-freetype2-13472=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-freetype2-13472=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      freetype2-devel-2.3.7-25.45.5.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):

      freetype2-devel-32bit-2.3.7-25.45.5.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      freetype2-2.3.7-25.45.5.1
      ft2demos-2.3.7-25.45.5.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      freetype2-32bit-2.3.7-25.45.5.1

   - SUSE Linux Enterprise Server 11-SP4 (ia64):

      freetype2-x86-2.3.7-25.45.5.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      freetype2-debuginfo-2.3.7-25.45.5.1
      freetype2-debugsource-2.3.7-25.45.5.1
      ft2demos-debuginfo-2.3.7-25.45.5.1
      ft2demos-debugsource-2.3.7-25.45.5.1


References:

   https://www.suse.com/security/cve/CVE-2016-10244.html
   https://www.suse.com/security/cve/CVE-2017-8105.html
   https://www.suse.com/security/cve/CVE-2017-8287.html
   https://bugzilla.suse.com/1028103
   https://bugzilla.suse.com/1035807
   https://bugzilla.suse.com/1036457



More information about the sle-updates mailing list