CVE-2017-8105
Published: August 31, 2023Last modified: July 22, 2025
Description
FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 9.8 | 
| Attack Vector | NETWORK | 
| Attack complexity | LOW | 
| Privileges required | NONE | 
| User interaction | NONE | 
| Scope | UNCHANGED | 
| Confidentiality | HIGH | 
| Integrity impact | HIGH | 
| Availability impact | HIGH | 
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | freetype | Not affected (2.12.1-r0) | 
| Stream | freetype | Not affected (2.13.2-r0) | |
| Hardened Containers | 23 LTS | freetype | Not affected (2.12.1-r0) | 
| Stream | freetype | Not affected (2.13.2-r0) | 
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
- http://www.debian.org/security/2017/dsa-3839
- http://www.securityfocus.com/bid/99093
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
- https://security.gentoo.org/glsa/201706-14
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html