MGASA-2014-0130

Source
https://advisories.mageia.org/MGASA-2014-0130.html
Import Source
https://advisories.mageia.org/MGASA-2014-0130.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0130
Related
Published
2014-03-15T16:26:54Z
Modified
2014-03-16T11:44:59Z
Summary
Updated freetype2 packages fix security vulnerabilities
Details

It was reported that Freetype before 2.5.3 suffers from an out-of-bounds stack-based read/write flaw in cf2hintmapbuild() in the CFF rasterizing code, which could lead to a buffer overflow (CVE-2014-2240).

It was also reported that Freetype before 2.5.3 has a denial-of-service vulnerability in the CFF rasterizing code, due to a reachable assertion (CVE-2014-2241).

References
Credits

Affected packages

Mageia:4 / freetype2

Package

Name
freetype2
Purl
pkg:rpm/mageia/freetype2?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.0.1-3.1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / freetype2

Package

Name
freetype2
Purl
pkg:rpm/mageia/freetype2?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.0.1-3.1.mga4.tainted

Ecosystem specific

{
    "section": "tainted"
}