openSUSE Security Update : freetype2 (openSUSE-2018-156)

critical Nessus Plugin ID 106743



The remote openSUSE host is missing a security update.


This update for freetype2 fixes the following security issues :

- CVE-2016-10244: Make sure that the parse_charstrings function in type1/t1load.c does ensure that a font contains a glyph name to prevent a DoS through a heap-based buffer over-read or possibly have unspecified other impact via a crafted file (bsc#1028103)

- CVE-2017-8105: Fix an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/ (bsc#1035807)

- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c (bsc#1036457)

- Fix several integer overflow issues in truetype/ttinterp.c (bsc#1079600)

This update was imported from the SUSE:SLE-12-SP2:Update update project.


Update the affected freetype2 packages.

See Also

Plugin Details

Severity: Critical

ID: 106743

File Name: openSUSE-2018-156.nasl

Version: 3.3

Type: local

Agent: unix

Published: 2/12/2018

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P


Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:freetype2-debugsource, p-cpe:/a:novell:opensuse:freetype2-devel, p-cpe:/a:novell:opensuse:freetype2-devel-32bit, p-cpe:/a:novell:opensuse:ft2demos, p-cpe:/a:novell:opensuse:libfreetype6, p-cpe:/a:novell:opensuse:libfreetype6-32bit, p-cpe:/a:novell:opensuse:libfreetype6-debuginfo, p-cpe:/a:novell:opensuse:libfreetype6-debuginfo-32bit, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2/12/2018

Reference Information

CVE: CVE-2016-10244, CVE-2017-7864, CVE-2017-8105, CVE-2017-8287