Source: freetype Version: 2.6.3-3 Severity: important Tags: patch upstream security
Hi, the following vulnerability was published for freetype. CVE-2017-7864[0]: | FreeType 2 before 2017-02-02 has an out-of-bounds write caused by a | heap-based buffer overflow related to the tt_size_reset function in | truetype/ttobjs.c. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-7864 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7864 [1] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=e6699596af5c5d6f0ae0ea06e19df87dce088df8 [2] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=509 Please adjust the affected versions in the BTS as needed. Regards, Salvatore