https://bugzilla.redhat.com/show_bug.cgi?id=1262373

            Bug ID: 1262373
           Summary: freetype: Use of uninitialized memory
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: low
          Priority: low
          Assignee: [email protected]
          Reporter: [email protected]
                CC: [email protected], [email protected],
                    [email protected],
                    [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected]



Three use-of-uninitialized conditions were found in psobjs.c in
ps_parser_load_field, in t42parse.c in 42_parse_font_matrix and in t1load.c in
tt1_parse_font_matrix.

Upstream bug:

https://savannah.nongnu.org/bugs/?41309

Upstream patch:

http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1

CVE request:

http://seclists.org/oss-sec/2015/q3/537

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=1vpsmfjkAX&a=cc_unsubscribe
_______________________________________________
mingw mailing list
[email protected]
https://admin.fedoraproject.org/mailman/listinfo/mingw

Reply via email to