[Bug 1034189] New: VUL-0: CVE-2017-7857: freetype2: heap-based buffer overflow (TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c)
![](https://seccdn.libravatar.org/avatar/3035b38ff33cf86f480bb169b8500b80.jpg?s=120&d=mm&r=g)
http://bugzilla.opensuse.org/show_bug.cgi?id=1034189 Bug ID: 1034189 Summary: VUL-0: CVE-2017-7857: freetype2: heap-based buffer overflow (TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c) Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: mikhail.kasimov@gmail.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-7857 ==================================================== Description FreeType 2 before 2017-03-08 has an out-of-bounds write caused by a heap-based buffer overflow related to the TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c. Source: MITRE Last Modified: 04/14/2017 ==================================================== Hyperlink [1] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7bbb91fbf... [2] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=759 [3] https://security-tracker.debian.org/tracker/CVE-2017-7857 ============================================================= - freetype <not-affected> (Vulnerable code introduced in 2.6.4) Introduced after: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=813aca51d... Fixed by: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7bbb91fbf... https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=759 ============================================================= https://software.opensuse.org/package/freetype2 2.7.1 (TW, official repo) 2.6.3 (42.2, official repo) 2.5.5 (42.1, official repo) -- You are receiving this mail because: You are on the CC list for the bug.
![](https://seccdn.libravatar.org/avatar/3035b38ff33cf86f480bb169b8500b80.jpg?s=120&d=mm&r=g)
http://bugzilla.opensuse.org/show_bug.cgi?id=1034189
Mikhail Kasimov
participants (1)
-
bugzilla_noreply@novell.com