FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
458df97f-1440-11eb-aaec-e0d55e2a8bf9freetype2 -- heap buffer overlfow

The freetype project reports:

A heap buffer overflow has been found in the handling of embedded PNG bitmaps, introduced in FreeType version 2.6.


Discovery 2020-10-20
Entry 2020-10-22
freetype2
< 2.10.4

https://sourceforge.net/projects/freetype/files/freetype2/2.10.4/
CVE-2020-15999
b975763f-5210-11db-8f1a-000a48049292freetype -- LWFN Files Buffer Overflow Vulnerability

SecurityTracker reports:

A vulnerability was reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted font file that, when loaded by the target user's system, will trigger an integer underflow or integer overflow and crash the application or execute arbitrary code on the target system.

Chris Evans reported these vulnerabilities.

Impact: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.


Discovery 2006-07-10
Entry 2006-10-02
freetype2
< 2.1.10_5

18034
CVE-2006-0747
CVE-2006-1861
CVE-2006-3467
http://securitytracker.com/alerts/2006/Jul/1016522.html
4a088d67-3af2-11e7-9d75-c86000169601freetype2 -- buffer overflows

Werner Lemberg reports:

CVE-2017-8105, CVE-2017-8287: Older FreeType versions have out-of-bounds writes caused by heap-based buffer overflows related to Type 1 fonts.


Discovery 2017-05-17
Entry 2017-05-17
freetype2
< 2.8

http://lists.nongnu.org/archive/html/freetype-announce/2017-05/msg00000.html
CVE-2017-8105
CVE-2017-8287
de2fab2d-0a37-11dc-aae2-00304881ac9aFreeType 2 -- Heap overflow vulnerability

Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.


Discovery 2007-04-27
Entry 2007-05-24
freetype2
< 2.2.1_2

CVE-2007-2754
http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2754
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
ports/112769
567beb1e-7e0a-11e4-b9cc-bcaec565249cfreetype -- Out of bounds stack-based read/write

Werner LEMBERG reports:

The fix for CVE-2014-2240 was not 100% complete to fix the issue from the CVE completly.


Discovery 2014-12-07
Entry 2014-12-07
freetype2
< 2.5.4

http://lists.nongnu.org/archive/html/freetype-announce/2014-12/msg00000.html
CVE-2014-2240
20b4f284-2bfc-11de-bdeb-0030843d3802freetype2 -- multiple vulnerabilities

Secunia reports:

Some vulnerabilities have been reported in FreeType, which can be exploited by malicious people to potentially compromise an application using the library.

An integer overflow error within the "cff_charset_compute_cids()" function in cff/cffload.c can be exploited to potentially cause a heap-based buffer overflow via a specially crafted font.

Multiple integer overflow errors within validation functions in sfnt/ttcmap.c can be exploited to bypass length validations and potentially cause buffer overflows via specially crafted fonts.

An integer overflow error within the "ft_smooth_render_generic()" function in smooth/ftsmooth.c can be exploited to potentially cause a heap-based buffer overflow via a specially crafted font.


Discovery 2009-04-16
Entry 2009-04-18
freetype2
< 2.3.9_1

CVE-2009-0946
http://secunia.com/advisories/34723/
1a0de610-a761-11e3-95fe-bcaec565249cfreetype2 -- Out of bounds read/write

Mateusz Jurczyk reports:

Out of bounds stack-based read/write in cf2_hintmap_build.

This is a critical vulnerability in the CFF Rasterizer code recently contributed by Adobe, leading to potential arbitrary code execution in the context of the FreeType2 library client.


Discovery 2014-02-25
Entry 2014-03-09
freetype2
< 2.5.3

http://savannah.nongnu.org/bugs/?41697
54075e39-04ac-11e1-a94e-bcaec565249cfreetype -- Some type 1 fonts handling vulnerabilities

The FreeType project reports:

A couple of vulnerabilities in handling Type 1 fonts.


Discovery 2011-10-12
Entry 2011-11-01
freetype2
< 2.4.7

CVE-2011-3256
http://sourceforge.net/projects/freetype/files/freetype2/2.4.7/README/view
https://bugzilla.redhat.com/attachment.cgi?id=528829&action=diff
5d374b01-c3ee-11e0-8aa5-485d60cb5385freetype2 -- execute arbitrary code or cause denial of service

Vincent Danen reports:

Due to an error within the t1_decoder_parse_charstrings() function (src/psaux/t1decode.c) and can be exploited to corrupt memory by tricking a user into processing a specially-crafted postscript Type1 font in an application that uses the freetype library.


Discovery 2011-07-19
Entry 2011-08-11
freetype2
< 2.4.6

CVE-2011-0226
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0226
462e2d6c-8017-11e1-a571-bcaec565249cfreetype -- multiple vulnerabilities

The Freetype project reports:

Multiple vulnerabilities exist in freetype that can result in application crashes and remote code execution. Please review the details in each of the CVEs for additional information.


Discovery 2012-03-08
Entry 2012-04-06
freetype2
< 2.4.9

CVE-2012-1137
CVE-2012-1138
CVE-2012-1139
CVE-2012-1126
CVE-2012-1127
CVE-2012-1128
CVE-2012-1129
CVE-2012-1130
CVE-2012-1131
CVE-2012-1132
CVE-2012-1133
CVE-2012-1134
CVE-2012-1135
CVE-2012-1136
CVE-2012-1140
CVE-2012-1141
CVE-2012-1142
CVE-2012-1143
CVE-2012-1144
https://sourceforge.net/projects/freetype/files/freetype2/2.4.9/README/view
https://bugzilla.redhat.com/show_bug.cgi?id=806270
1ae613c3-5728-11e2-9483-14dae938ec40freetype -- Multiple vulnerabilities

The FreeType Project reports:

Some vulnerabilities in the BDF implementation have been fixed. Users of this font format should upgrade.


Discovery 2012-12-20
Entry 2013-01-05
freetype2
< 2.4.11

http://sourceforge.net/projects/freetype/files/freetype2/2.4.11/README/view
4fb43b2f-46a9-11dd-9d38-00163e000016FreeType 2 -- Multiple Vulnerabilities

Secunia reports:

  • An integer overflow error exists in the processing of PFB font files. This can be exploited to cause a heap-based buffer overflow via a PFB file containing a specially crafted "Private" dictionary table.
  • An error in the processing of PFB font files can be exploited to trigger the "free()" of memory areas that are not allocated on the heap.
  • An off-by-one error exists in the processing of PFB font files. This can be exploited to cause a one-byte heap-based buffer overflow via a specially crafted PFB file.
  • An off-by-one error exists in the implementation of the "SHC" instruction while processing TTF files. This can be exploited to cause a one-byte heap-based buffer overflow via a specially crafted TTF file.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.


Discovery 2008-06-10
Entry 2008-07-03
freetype2
< 2.3.6

29637
29639
29640
29641
CVE-2008-1806
CVE-2008-1807
CVE-2008-1808
http://secunia.com/advisories/30600
http://sourceforge.net/project/shownotes.php?release_id=605780