Source: freetype
Version: 2.6.3-3.1
Severity: important
Tags: security patch upstream
Forwarded: https://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858
Control: fixed -1 2.7.1-0.1

Hi,

the following vulnerability was published for freetype.

CVE-2016-10328[0]:
| FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a
| heap-based buffer overflow related to the cff_parser_run function in
| cff/cffparse.c.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-10328
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
[1] https://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858
[2] 
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
[3] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to