- -------------------------------------------------------------------------
Debian Security Advisory DSA-3370-1                   security@debian.org
https://www.debian.org/security/                       Alessandro Ghedini
October 06, 2015                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : freetype
CVE ID         : CVE-2014-9745 CVE-2014-9746 CVE-2014-9747
Debian Bug     : 798619 798620

It was discovered that FreeType did not properly handle some malformed
inputs. This could allow remote attackers to cause a denial of service
(crash) via crafted font files.

For the oldstable distribution (wheezy), these problems have been fixed
in version 2.4.9-1.1+deb7u2.

For the stable distribution (jessie), these problems have been fixed in
version 2.5.2-3+deb8u1.

For the testing distribution (stretch), these problems have been fixed
in version 2.6-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.6-1.

We recommend that you upgrade your freetype packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-3370-1: freetype security update

October 6, 2015
It was discovered that FreeType did not properly handle some malformed inputs

Summary

For the oldstable distribution (wheezy), these problems have been fixed
in version 2.4.9-1.1+deb7u2.

For the stable distribution (jessie), these problems have been fixed in
version 2.5.2-3+deb8u1.

For the testing distribution (stretch), these problems have been fixed
in version 2.6-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.6-1.

We recommend that you upgrade your freetype packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
It was discovered that FreeType did not properly handle some malformed
inputs. This could allow remote attackers to cause a denial of service
(crash) via crafted font files.

Related News