[Bug 1262373] New: freetype: Use of uninitialized memory
bugzilla at redhat.com
bugzilla at redhat.com
Fri Sep 11 13:50:17 UTC 2015
https://bugzilla.redhat.com/show_bug.cgi?id=1262373
Bug ID: 1262373
Summary: freetype: Use of uninitialized memory
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team at redhat.com
Reporter: amaris at redhat.com
CC: behdad at fedoraproject.org, erik-fedora at vanpienbroek.nl,
fedora-mingw at lists.fedoraproject.org,
fonts-bugs at lists.fedoraproject.org,
kevin at tigcc.ticalc.org, lfarkas at lfarkas.org,
mkasik at redhat.com, rjones at redhat.com
Three use-of-uninitialized conditions were found in psobjs.c in
ps_parser_load_field, in t42parse.c in 42_parse_font_matrix and in t1load.c in
tt1_parse_font_matrix.
Upstream bug:
https://savannah.nongnu.org/bugs/?41309
Upstream patch:
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
CVE request:
http://seclists.org/oss-sec/2015/q3/537
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=1vpsmfjkAX&a=cc_unsubscribe
More information about the mingw
mailing list