Security update for freetype2

SUSE Security Update: Security update for freetype2
Announcement ID: SUSE-SU-2015:0463-1
Rating: moderate
References: #916856 #916857 #916858 #916859 #916861 #916863 #916864 #916865 #916870 #916871 #916872 #916873 #916874 #916879 #916881
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP3
  • SUSE Linux Enterprise Server 11 SP3 for VMware
  • SUSE Linux Enterprise Server 11 SP3
  • SUSE Linux Enterprise Desktop 11 SP3

  • An update that fixes 20 vulnerabilities is now available.

    Description:


    The font rendering library freetype2 has been updated to fix various
    security issues.

    Security Issues:

    * CVE-2014-9656

    * CVE-2014-9657

    * CVE-2014-9658

    * CVE-2014-9660

    * CVE-2014-9661

    * CVE-2014-9662

    * CVE-2014-9667

    * CVE-2014-9666

    * CVE-2014-9665

    * CVE-2014-9664

    * CVE-2014-9663

    * CVE-2014-9659

    * CVE-2014-9668

    * CVE-2014-9669

    * CVE-2014-9670

    * CVE-2014-9671

    * CVE-2014-9672

    * CVE-2014-9673

    * CVE-2014-9674

    * CVE-2014-9675

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP3:
      zypper in -t patch sdksp3-freetype2-201503=10386
    • SUSE Linux Enterprise Server 11 SP3 for VMware:
      zypper in -t patch slessp3-freetype2-201503=10386
    • SUSE Linux Enterprise Server 11 SP3:
      zypper in -t patch slessp3-freetype2-201503=10386
    • SUSE Linux Enterprise Desktop 11 SP3:
      zypper in -t patch sledsp3-freetype2-201503=10386

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
      • freetype2-devel-2.3.7-25.34.1
    • SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64):
      • freetype2-devel-32bit-2.3.7-25.34.1
    • SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
      • freetype2-2.3.7-25.34.1
      • ft2demos-2.3.7-25.34.1
    • SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
      • freetype2-32bit-2.3.7-25.34.1
    • SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
      • freetype2-2.3.7-25.34.1
      • ft2demos-2.3.7-25.34.1
    • SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
      • freetype2-32bit-2.3.7-25.34.1
    • SUSE Linux Enterprise Server 11 SP3 (ia64):
      • freetype2-x86-2.3.7-25.34.1
    • SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
      • freetype2-2.3.7-25.34.1
      • ft2demos-2.3.7-25.34.1
    • SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
      • freetype2-32bit-2.3.7-25.34.1

    References:

    • http://support.novell.com/security/cve/CVE-2014-9656.html
    • http://support.novell.com/security/cve/CVE-2014-9657.html
    • http://support.novell.com/security/cve/CVE-2014-9658.html
    • http://support.novell.com/security/cve/CVE-2014-9659.html
    • http://support.novell.com/security/cve/CVE-2014-9660.html
    • http://support.novell.com/security/cve/CVE-2014-9661.html
    • http://support.novell.com/security/cve/CVE-2014-9662.html
    • http://support.novell.com/security/cve/CVE-2014-9663.html
    • http://support.novell.com/security/cve/CVE-2014-9664.html
    • http://support.novell.com/security/cve/CVE-2014-9665.html
    • http://support.novell.com/security/cve/CVE-2014-9666.html
    • http://support.novell.com/security/cve/CVE-2014-9667.html
    • http://support.novell.com/security/cve/CVE-2014-9668.html
    • http://support.novell.com/security/cve/CVE-2014-9669.html
    • http://support.novell.com/security/cve/CVE-2014-9670.html
    • http://support.novell.com/security/cve/CVE-2014-9671.html
    • http://support.novell.com/security/cve/CVE-2014-9672.html
    • http://support.novell.com/security/cve/CVE-2014-9673.html
    • http://support.novell.com/security/cve/CVE-2014-9674.html
    • http://support.novell.com/security/cve/CVE-2014-9675.html
    • https://bugzilla.suse.com/916856
    • https://bugzilla.suse.com/916857
    • https://bugzilla.suse.com/916858
    • https://bugzilla.suse.com/916859
    • https://bugzilla.suse.com/916861
    • https://bugzilla.suse.com/916863
    • https://bugzilla.suse.com/916864
    • https://bugzilla.suse.com/916865
    • https://bugzilla.suse.com/916870
    • https://bugzilla.suse.com/916871
    • https://bugzilla.suse.com/916872
    • https://bugzilla.suse.com/916873
    • https://bugzilla.suse.com/916874
    • https://bugzilla.suse.com/916879
    • https://bugzilla.suse.com/916881
    • http://download.suse.com/patch/finder/?keywords=8ff7d5aec940c311b66cdebb04cb66ea