freetype-2.3.11-15.AXS4.1

エラータID: AXSA:2015-085:01

Release date: 
Monday, March 30, 2015 - 23:41
Subject: 
freetype-2.3.11-15.AXS4.1
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

Description :
The FreeType engine is a free and portable font rendering
engine, developed to provide advanced font support for a variety of
platforms and environments. FreeType is a library which can open and
manages font files as well as efficiently load, hint and render
individual glyphs. FreeType is not a font server or a complete
text-rendering library.

Security issues fixed with this release:

CVE-2014-9657
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.

CVE-2014-9658
The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.

CVE-2014-9660
The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.

CVE-2014-9661
type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.

CVE-2014-9663
The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.

CVE-2014-9664
FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.

CVE-2014-9667
sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.

CVE-2014-9669
Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.

CVE-2014-9670
Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.

CVE-2014-9671
Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.

CVE-2014-9673
Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.

CVE-2014-9674
The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.

CVE-2014-9675
bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.

Solution: 

Update package.

Additional Info: 

N/A

Download: 

SRPMS
  1. freetype-2.3.11-15.AXS4.1.src.rpm
    MD5: af1fa84b0023648d835a57ec513a25f5
    SHA-256: 3a76109d471d1265ba2a0edb0999cd79af4da061af201343ea8b3dc3617c5bf1
    Size: 1.70 MB

Asianux Server 4 for x86
  1. freetype-2.3.11-15.AXS4.1.i686.rpm
    MD5: 9404c50becd511befbc3bfc313dbc87b
    SHA-256: 003cf8643b6cd3a217de39f908ee7d73b9aafc99fa6f113a1c00af3cde799abe
    Size: 364.36 kB
  2. freetype-devel-2.3.11-15.AXS4.1.i686.rpm
    MD5: 97b181cb0696352a8db63740d5d8dfd5
    SHA-256: a17105ff236547fe0c6a32e7718dd9951776703e207dc267c0f9e193ced8074a
    Size: 364.80 kB

Asianux Server 4 for x86_64
  1. freetype-2.3.11-15.AXS4.1.x86_64.rpm
    MD5: a0795a1e398c2e7f73ced910b4573528
    SHA-256: ca256539ffedcdd4ea35a5efc888397a820a85cd2cda343231394a7dd1dde9ca
    Size: 359.96 kB
  2. freetype-devel-2.3.11-15.AXS4.1.x86_64.rpm
    MD5: f32273f2638cbc8ed4d8eabbe7bf8ca7
    SHA-256: fd4cf913de37bfd18b6dc3aef79b7f29de9c64ac2fea08a155a0ea98188867c4
    Size: 364.38 kB
  3. freetype-2.3.11-15.AXS4.1.i686.rpm
    MD5: 9404c50becd511befbc3bfc313dbc87b
    SHA-256: 003cf8643b6cd3a217de39f908ee7d73b9aafc99fa6f113a1c00af3cde799abe
    Size: 364.36 kB
  4. freetype-devel-2.3.11-15.AXS4.1.i686.rpm
    MD5: 97b181cb0696352a8db63740d5d8dfd5
    SHA-256: a17105ff236547fe0c6a32e7718dd9951776703e207dc267c0f9e193ced8074a
    Size: 364.80 kB