Lucene search

K
mageiaGentoo FoundationMGASA-2014-0526
HistoryDec 13, 2014 - 11:16 p.m.

Updated freetype2 packages fix security vulnerability

2014-12-1323:16:05
Gentoo Foundation
advisories.mageia.org
13

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.139 Low

EPSS

Percentile

95.7%

Updated freetype2 packages fix security vulnerability: It was reported that Freetype before 2.5.4 suffers from an out-of-bounds stack-based read/write flaw in cf2_hintmap_build() in the CFF rasterizing code, which could lead to a buffer overflow. This is due to an incomplete fix for CVE-2014-2240.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchfreetype2<Β 2.5.0.1-3.2freetype2-2.5.0.1-3.2.mga4
Mageia4noarchfreetype2<Β 2.5.0.1-3.2freetype2-2.5.0.1-3.2.mga4.tainted

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.139 Low

EPSS

Percentile

95.7%