[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:602244
It was discovered that FreeType did not properly handle some malformed inputs. This could allow remote attackers to cause a denial of service via crafted font files.

oval:org.secpod.oval:def:89045387
This update of the freetype2 library fixes two security issues: - An infinite loop in parse_encoding in t1load.c - Use of uninitialized memory in ps_parser_load_field, t42_parse_font_matrix and t1_parse_font_matrix

CPE    3
cpe:/o:debian:debian_linux:7.0
cpe:/o:debian:debian_linux:8.0
cpe:/a:freetype:freetype
CWE    1
CWE-399
*CVE
CVE-2014-9747

© SecPod Technologies