SUSE-SU-2019:2236-1

Source
https://www.suse.com/support/update/announcement/2019/suse-su-20192236-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:2236-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2019:2236-1
Related
Published
2019-08-28T06:00:09Z
Modified
2019-08-28T06:00:09Z
Summary
Security update for fontforge
Details

This update for fontforge fixes the following security issues:

fontforge was updated to 20170731, fixings lots of bugs and security issues.

  • CVE-2017-11568: Heap-based buffer over-read in PSCharStringToSplines (bsc#1050161)
  • CVE-2017-11569: Heap-based buffer over-read in readttfcopyrights (bsc#1050181)
  • CVE-2017-11571: Stack-based buffer overflow in addnibble (bsc#1050185)
  • CVE-2017-11572: Heap-based buffer over-read in readcfftopdicts (bsc#1050187)
  • CVE-2017-11573: Over-read in ValidatePostScriptFontName (bsc#1050193)
  • CVE-2017-11574: Heap-based buffer overflow in readcffset (bsc#1050194)
  • CVE-2017-11575: Buffer over-read in strnmatch (bsc#1050195)
  • CVE-2017-11576: Ensure a positive size in a weight vector memcpycall in readcfftopdict (bsc#1050196)
  • CVE-2017-11577: Buffer over-read in getsid (bsc#1050200)
References

Affected packages

SUSE:Linux Enterprise Software Development Kit 12 SP4 / fontforge

Package

Name
fontforge
Purl
pkg:rpm/suse/fontforge&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20170731-11.8.1

Ecosystem specific

{
    "binaries": [
        {
            "fontforge": "20170731-11.8.1"
        }
    ]
}