All customers except US A&D: to ensure that you can access all of your product downloads, you must log in to the Wind River Delivers portal https://delivers.windriver.com and visit the My Products page to force an initial sync of your product entitlement. Only after you’ve completed this step will you be able to access and download product content through the Artifacts, Registry, and Git interfaces. This also applies to users attempting to run the Wind River installer in maintenance or update mode or Linux installation updates at the command line.

Wind River Support Network

Meet the Support Network

Home CVE Database CVE-2017-8105

CVE-2017-8105

Description

FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.

Priority: HIGH
CVSS v3: 9.8
Publish Date: Apr 24, 2017
Related ID: --
CVSS v2: Critical
Modified Date: Apr 24, 2017

Find out more about CVE-2017-8105 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Linux
Wind River Linux LTS 17 Not Vulnerable -- -- Wind River VxWorks Security Alert CVE-2017-8105 for FreeType 2
Wind River Linux 8 Fixed LIN8-6546
8.0.0.18 --
Wind River Linux 9 Fixed LIN9-4069
9.0.0.7 --
Wind River Linux 7 Fixed -- 7.0.0.25 --
Wind River Linux LTS 21 Not Vulnerable -- -- --
Wind River Linux LTS 18 Not Vulnerable -- -- Wind River VxWorks Security Alert CVE-2017-8105 for FreeType 2
Wind River Linux LTS 19 Not Vulnerable -- -- Wind River VxWorks Security Alert CVE-2017-8105 for FreeType 2
Wind River Linux CD release Not Vulnerable -- -- Wind River VxWorks Security Alert CVE-2017-8105 for FreeType 2
VxWorks
VxWorks 7 Fixed -- SR0640 Wind River VxWorks Security Alert CVE-2017-8105 for FreeType 2
VxWorks 6.9 Won't Fix -- -- Wind River VxWorks Security Alert CVE-2017-8105 for FreeType 2

Related Products

Product Name Status Defect Fixed Downloads

Comments

freetype


Notes
Requires LTSS - customers must have active LTSS (Long Term Security Shield) Support to receive up-to-date information about vulnerabilities that may affect legacy software. Please contact your Wind River account team or see https://docs.windriver.com/bundle/Support_and_Maintenance_Supplemental_Terms_and_Conditions and https://support2.windriver.com/index.php?page=plc for more information.
Live chat
Online