Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 10 Mar 2014 16:31:33 +0100
From: Raphael Geissert <geissert@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Two stack-based issues in freetype [NOT a request]

Hi,

Just a heads up as I've not seen this issue anywhere. There is an
"Out-of-bounds stack-based read/write in cf2_hintmap_build" in freetype

If I understood things correctly, CVE-2014-2240 is:
https://savannah.nongnu.org/bugs/?41697#comment0
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0eae6eb0645264c98812f0095e0f5df4541830e6

While CVE-2014-2241is:
https://savannah.nongnu.org/bugs/?41697#comment2
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969

Release notes:
http://sourceforge.net/projects/freetype/files/freetype2/2.5.3/

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ