<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for freetype2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0704-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-05-23T18:14:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-05-23T18:14:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-05-23T18:14:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for freetype2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for freetype2 to version 2.10.1 fixes the following issues:

Security issue fixed:

- CVE-2018-6942: Fixed a NULL pointer dereference within ttinerp.c (bsc#1079603).

Non-security issues fixed:

- Update to version 2.10.1
  * The bytecode hinting of OpenType variation fonts was flawed, since
    the data in the `CVAR' table wasn't correctly applied.
  * Auto-hinter support for Mongolian.
  * The handling of  the default character in PCF fonts as  introduced
    in version 2.10.0 was partially broken, causing premature abortion
    of charmap iteration for many fonts.
  * If  `FT_Set_Named_Instance' was  called  with  the same  arguments
    twice in a row, the function  returned an incorrect error code the
    second time.
  * Direct   rendering   using  FT_RASTER_FLAG_DIRECT   crashed   (bug
    introduced in version 2.10.0).
  * Increased  precision  while  computing  OpenType  font   variation
    instances.
  * The  flattening  algorithm of  cubic  Bezier  curves was  slightly
    changed to make  it faster.  This can cause  very subtle rendering
    changes, which aren't noticeable by the eye, however.
  * The  auto-hinter  now  disables hinting  if there  are blue  zones
    defined for a `style' (i.e., a certain combination of a script and
    its related typographic features) but the font doesn't contain any
    characters needed to set up at least one blue zone.
- Add tarball signatures and freetype2.keyring

- Update to version 2.10.0
  * A bunch of new functions has been added to access and process
    COLR/CPAL data of OpenType fonts with color-layered glyphs.
  * As a GSoC 2018 project, Nikhil Ramakrishnan completely
    overhauled and modernized the API reference.
  * The logic for computing the global ascender, descender, and
    height of OpenType fonts has been slightly adjusted for
    consistency.
  * `TT_Set_MM_Blend' could fail if called repeatedly with the same
    arguments.
  * The precision of handling deltas in Variation Fonts has been
    increased.The problem did only show up with multidimensional
    designspaces.
  * New function `FT_Library_SetLcdGeometry' to set up the geometry
    of LCD subpixels.
  * FreeType now uses the `defaultChar' property of PCF fonts to set
    the  glyph for  the undefined  character  at glyph  index 0  (as
    FreeType already does for all other supported font formats).  As
    a consequence, the order of glyphs of a PCF font if accessed
    with  FreeType can be different now compared to previous
    versions.
    This change doesn't affect PCF font access with cmaps.
  * `FT_Select_Charmap' has been changed to allow  parameter value
    `FT_ENCODING_NONE', which is valid for BDF, PCF, and Windows FNT
    formats to access built-in cmaps that don't have a predefined
    `FT_Encoding' value.
  * A previously reserved field in the `FT_GlyphSlotRec' structure
    now holds the glyph index.
  * The usual round of fuzzer bug fixes to better reject malformed
    fonts.
  * `FT_Outline_New_Internal' and `FT_Outline_Done_Internal' have
    been removed.These two functions were public by oversight only
    and were never documented.
  * A new function `FT_Error_String' returns descriptions of error
    codes if configuration macro FT_CONFIG_OPTION_ERROR_STRINGS is
    defined.
  * `FT_Set_MM_WeightVector' and `FT_Get_MM_WeightVector' are new
    functions limited to Adobe MultiMaster fonts to directly set and
    get the weight vector.

- Enable subpixel rendering with infinality config:

- Re-enable freetype-config, there is just too many fallouts. 

- Update to version 2.9.1
  * Type 1 fonts containing flex features were not rendered
    correctly (bug introduced in version 2.9).
  * CVE-2018-6942: Older FreeType versions can crash with certain
    malformed variation fonts.
  * Bug fix: Multiple calls to `FT_Get_MM_Var' returned garbage.
  * Emboldening of bitmaps didn't work correctly sometimes, showing
    various artifacts (bug introduced in version 2.8.1).
  * The auto-hinter script ranges have  been updated for Unicode 11.
    No support for new scripts have been added, however,  with the
    exception of Georgian Mtavruli.
- freetype-config is now deprecated by upstream and not enabled
  by default.

- Update to version 2.10.1
  * The `ftmulti' demo program now  supports multiple hidden axes with
    the same name tag.
  * `ftview', `ftstring', and `ftgrid' got  a `-k' command line option
    to emulate a sequence of keystrokes at start-up.
  * `ftview', `ftstring', and `ftgrid' now support screen dumping to a
    PNG file.
  * The bytecode debugger, `ttdebug',  now supports variation TrueType
    fonts; a variation font instance can be selected with the new `-d'
    command line option.
- Add tarball signatures and freetype2.keyring

- Update to version 2.10.0
  * The  `ftdump' demo  program has new options `-c'  and `-C'  to
    display charmaps in compact and detailed format, respectively.
    Option `-V' has been removed.
  * The `ftview', `ftstring', and `ftgrid' demo programs use a new
    command line option `-d' to specify the program window's width,
    height, and color depth.
  * The `ftview' demo program now displays red boxes for zero-width
    glyphs.
  * `ftglyph' has limited support to display fonts with
    color-layered glyphs.This will be improved later on.
  * `ftgrid' can now display bitmap fonts also.
  * The `ttdebug' demo program has a new option `-f' to select a
    member of a TrueType collection (TTC).
  * Other various improvements to the demo programs.

- Remove 'Supplements: fonts-config' to avoid accidentally pulling
  in Qt dependencies on some non-Qt based desktops.(bsc#1091109)
  fonts-config is fundamental but ft2demos seldom installs by end users.
  only fonts-config maintainers/debuggers may use ft2demos along to
  debug some issues. 

- Update to version 2.9.1
  * No changelog upstream.

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-704</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0704-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1079603</URL>
      <Description>SUSE Bug 1079603</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1091109</URL>
      <Description>SUSE Bug 1091109</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6942/</URL>
      <Description>SUSE CVE CVE-2018-6942 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="freetype2-devel-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="freetype2-devel-2.10.1-lp151.4.3.1">freetype2-devel-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freetype2-devel-32bit-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="freetype2-devel-32bit-2.10.1-lp151.4.3.1">freetype2-devel-32bit-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freetype2-profile-tti35-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="freetype2-profile-tti35-2.10.1-lp151.4.3.1">freetype2-profile-tti35-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ft2demos-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ft2demos-2.10.1-lp151.4.3.1">ft2demos-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftbench-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftbench-2.10.1-lp151.4.3.1">ftbench-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftdiff-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftdiff-2.10.1-lp151.4.3.1">ftdiff-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftdump-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftdump-2.10.1-lp151.4.3.1">ftdump-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftgamma-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftgamma-2.10.1-lp151.4.3.1">ftgamma-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftgrid-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftgrid-2.10.1-lp151.4.3.1">ftgrid-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftinspect-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftinspect-2.10.1-lp151.4.3.1">ftinspect-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftlint-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftlint-2.10.1-lp151.4.3.1">ftlint-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftmulti-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftmulti-2.10.1-lp151.4.3.1">ftmulti-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftstring-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftstring-2.10.1-lp151.4.3.1">ftstring-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftvalid-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftvalid-2.10.1-lp151.4.3.1">ftvalid-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ftview-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="ftview-2.10.1-lp151.4.3.1">ftview-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreetype6-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="libfreetype6-2.10.1-lp151.4.3.1">libfreetype6-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreetype6-32bit-2.10.1-lp151.4.3.1">
      <FullProductName ProductID="libfreetype6-32bit-2.10.1-lp151.4.3.1">libfreetype6-32bit-2.10.1-lp151.4.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="freetype2-devel-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freetype2-devel-2.10.1-lp151.4.3.1">freetype2-devel-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-devel-32bit-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freetype2-devel-32bit-2.10.1-lp151.4.3.1">freetype2-devel-32bit-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-profile-tti35-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:freetype2-profile-tti35-2.10.1-lp151.4.3.1">freetype2-profile-tti35-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ft2demos-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ft2demos-2.10.1-lp151.4.3.1">ft2demos-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftbench-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftbench-2.10.1-lp151.4.3.1">ftbench-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftdiff-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftdiff-2.10.1-lp151.4.3.1">ftdiff-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftdump-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftdump-2.10.1-lp151.4.3.1">ftdump-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftgamma-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftgamma-2.10.1-lp151.4.3.1">ftgamma-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftgrid-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftgrid-2.10.1-lp151.4.3.1">ftgrid-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftinspect-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftinspect-2.10.1-lp151.4.3.1">ftinspect-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftlint-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftlint-2.10.1-lp151.4.3.1">ftlint-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftmulti-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftmulti-2.10.1-lp151.4.3.1">ftmulti-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftstring-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftstring-2.10.1-lp151.4.3.1">ftstring-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftvalid-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftvalid-2.10.1-lp151.4.3.1">ftvalid-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ftview-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:ftview-2.10.1-lp151.4.3.1">ftview-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreetype6-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libfreetype6-2.10.1-lp151.4.3.1">libfreetype6-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreetype6-32bit-2.10.1-lp151.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libfreetype6-32bit-2.10.1-lp151.4.3.1">libfreetype6-32bit-2.10.1-lp151.4.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file.</Note>
    </Notes>
    <CVE>CVE-2018-6942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:freetype2-devel-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freetype2-devel-32bit-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:freetype2-profile-tti35-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ft2demos-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftbench-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftdiff-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftdump-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftgamma-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftgrid-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftinspect-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftlint-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftmulti-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftstring-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftvalid-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:ftview-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libfreetype6-2.10.1-lp151.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libfreetype6-32bit-2.10.1-lp151.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6942.html</URL>
        <Description>CVE-2018-6942</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
