Bugzilla – Bug 916881
VUL-0: CVE-2014-9675: freetype2: bypass the ASLR protection mechanism via a crafted BDF font
Last modified: 2019-05-22 01:02:33 UTC
CVE-2014-9675 bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9675 http://code.google.com/p/google-security-research/issues/detail?id=151 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2c4832d30939b45c05757f0a05128ce64c4cacc7
bugbot adjusting priority
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2015-02-25. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/60646
Submitted for SLE11, SLE12 and openSUSE.
SUSE-SU-2015:0455-1: An update that fixes 21 vulnerabilities is now available. Category: security (moderate) Bug References: 916847,916856,916857,916858,916859,916860,916861,916862,916863,916864,916865,916867,916868,916870,916871,916872,916873,916874,916879,916881 CVE References: CVE-2014-2240,CVE-2014-9656,CVE-2014-9657,CVE-2014-9658,CVE-2014-9659,CVE-2014-9660,CVE-2014-9661,CVE-2014-9662,CVE-2014-9663,CVE-2014-9664,CVE-2014-9665,CVE-2014-9666,CVE-2014-9667,CVE-2014-9668,CVE-2014-9669,CVE-2014-9670,CVE-2014-9671,CVE-2014-9672,CVE-2014-9673,CVE-2014-9674,CVE-2014-9675 Sources used: SUSE Linux Enterprise Software Development Kit 12 (src): freetype2-2.5.3-5.1 SUSE Linux Enterprise Server 12 (src): freetype2-2.5.3-5.1 SUSE Linux Enterprise Desktop 12 (src): freetype2-2.5.3-5.1
SUSE-SU-2015:0463-1: An update that fixes 20 vulnerabilities is now available. Category: security (moderate) Bug References: 916856,916857,916858,916859,916861,916863,916864,916865,916870,916871,916872,916873,916874,916879,916881 CVE References: CVE-2014-9656,CVE-2014-9657,CVE-2014-9658,CVE-2014-9659,CVE-2014-9660,CVE-2014-9661,CVE-2014-9662,CVE-2014-9663,CVE-2014-9664,CVE-2014-9665,CVE-2014-9666,CVE-2014-9667,CVE-2014-9668,CVE-2014-9669,CVE-2014-9670,CVE-2014-9671,CVE-2014-9672,CVE-2014-9673,CVE-2014-9674,CVE-2014-9675 Sources used: SUSE Linux Enterprise Software Development Kit 11 SP3 (src): freetype2-2.3.7-25.34.1 SUSE Linux Enterprise Server 11 SP3 for VMware (src): freetype2-2.3.7-25.34.1, ft2demos-2.3.7-25.34.1 SUSE Linux Enterprise Server 11 SP3 (src): freetype2-2.3.7-25.34.1, ft2demos-2.3.7-25.34.1 SUSE Linux Enterprise Desktop 11 SP3 (src): freetype2-2.3.7-25.34.1, ft2demos-2.3.7-25.34.1
This is an autogenerated message for OBS integration: This bug (916881) was mentioned in https://build.opensuse.org/request/show/292048 13.2 / freetype2 https://build.opensuse.org/request/show/292049 13.1 / freetype2
released
openSUSE-SU-2015:0627-1: An update that fixes 20 vulnerabilities is now available. Category: security (moderate) Bug References: 916847,916856,916857,916858,916859,916860,916861,916862,916863,916864,916865,916867,916868,916870,916871,916872,916873,916874,916879,916881 CVE References: CVE-2014-9656,CVE-2014-9657,CVE-2014-9658,CVE-2014-9659,CVE-2014-9660,CVE-2014-9661,CVE-2014-9662,CVE-2014-9663,CVE-2014-9664,CVE-2014-9665,CVE-2014-9666,CVE-2014-9667,CVE-2014-9668,CVE-2014-9669,CVE-2014-9670,CVE-2014-9671,CVE-2014-9672,CVE-2014-9673,CVE-2014-9674,CVE-2014-9675 Sources used: openSUSE 13.2 (src): freetype2-2.5.3-2.4.1, ft2demos-2.5.3-2.4.1 openSUSE 13.1 (src): freetype2-2.5.0.1-2.4.1, ft2demos-2.5.0-2.4.1