openSUSE Security Update : freetype2 (openSUSE-SU-2013:0165-1)

medium Nessus Plugin ID 75015

Synopsis

The remote openSUSE host is missing a security update.

Description

- BNC#795826, CVE-2012-5668.patch [bdf] Fix Savannah bug #37905.

- src/bdf/bdflib.c (_bdf_parse_start): Reset `props_size' to zero in case of allocation error; this value gets used in a loop in

- BNC#795826, CVE-2012-5669.patch [bdf] Fix Savannah bug #37906.

- src/bdf/bdflib.c (_bdf_parse_glyphs): Use correct array size for checking `glyph_enc'.

- BNC#795826, CVE-2012-5670.patch [bdf] Fix Savannah bug #37907.

- src/bdf/bdflib.c (_bdf_parse_glyphs) <ENCODING>:
Normalize negative second parameter of `ENCODING' field also.

Solution

Update the affected freetype2 packages.

See Also

https://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html

Plugin Details

Severity: Medium

ID: 75015

File Name: openSUSE-2013-44.nasl

Version: 1.6

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:ft2demos-debugsource, p-cpe:/a:novell:opensuse:libfreetype6-debuginfo-32bit, cpe:/o:novell:opensuse:12.2, p-cpe:/a:novell:opensuse:libfreetype6, p-cpe:/a:novell:opensuse:freetype2-debugsource, p-cpe:/a:novell:opensuse:freetype2-devel, p-cpe:/a:novell:opensuse:libfreetype6-debuginfo, p-cpe:/a:novell:opensuse:freetype2-devel-32bit, p-cpe:/a:novell:opensuse:libfreetype6-32bit, p-cpe:/a:novell:opensuse:ft2demos, p-cpe:/a:novell:opensuse:ft2demos-debuginfo

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/15/2013

Reference Information

CVE: CVE-2012-5668, CVE-2012-5669, CVE-2012-5670