[Bug 1034186] New: VUL-0: CVE-2017-7858: freetype2: out-of-bounds write (TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c)
![](https://seccdn.libravatar.org/avatar/3035b38ff33cf86f480bb169b8500b80.jpg?s=120&d=mm&r=g)
http://bugzilla.opensuse.org/show_bug.cgi?id=1034186 Bug ID: 1034186 Summary: VUL-0: CVE-2017-7858: freetype2: out-of-bounds write (TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c) Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: mikhail.kasimov@gmail.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-7858 ==================================================== Description FreeType 2 before 2017-03-07 has an out-of-bounds write related to the TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c. Source: MITRE Last Modified: 04/14/2017 ==================================================== Hyperlink [1] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=779309744... [2] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=738 (open-)SUSE https://software.opensuse.org/package/freetype2 2.7.1 (TW, official repo) 2.6.3 (42.2, official repo) 2.5.5 (42.1, official repo) Due to https://security-tracker.debian.org/tracker/CVE-2017-7858 info, this bug can already be fixed. So, please, check that. -- You are receiving this mail because: You are on the CC list for the bug.
![](https://seccdn.libravatar.org/avatar/3035b38ff33cf86f480bb169b8500b80.jpg?s=120&d=mm&r=g)
http://bugzilla.opensuse.org/show_bug.cgi?id=1034186
Mikhail Kasimov
![](https://seccdn.libravatar.org/avatar/3035b38ff33cf86f480bb169b8500b80.jpg?s=120&d=mm&r=g)
http://bugzilla.opensuse.org/show_bug.cgi?id=1034186 http://bugzilla.opensuse.org/show_bug.cgi?id=1034186#c1 --- Comment #1 from Mikhail Kasimov--- (In reply to Mikhail Kasimov from comment #0) > Due to https://security-tracker.debian.org/tracker/CVE-2017-7858 info, this > bug can already be fixed. So, please, check that. ================================================================= - freetype (Vulnerable code introduced in 2.6.4) Introduced after: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=813aca51d28704f7ffc470721167738fa8decb3d Fixed by: https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=779309744222a736eba0f1731e8162fce6288d4e https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=738 ================================================================= -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com