<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">freetype2-devel-2.7-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10438-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">freetype2-devel-2.7-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the freetype2-devel-2.7-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10438</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-0946/</URL>
      <Description>SUSE CVE CVE-2009-0946 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2497/</URL>
      <Description>SUSE CVE CVE-2010-2497 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2805/</URL>
      <Description>SUSE CVE CVE-2010-2805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3053/</URL>
      <Description>SUSE CVE CVE-2010-3053 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3054/</URL>
      <Description>SUSE CVE CVE-2010-3054 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3311/</URL>
      <Description>SUSE CVE CVE-2010-3311 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3814/</URL>
      <Description>SUSE CVE CVE-2010-3814 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3855/</URL>
      <Description>SUSE CVE CVE-2010-3855 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0226/</URL>
      <Description>SUSE CVE CVE-2011-0226 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3256/</URL>
      <Description>SUSE CVE CVE-2011-3256 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3439/</URL>
      <Description>SUSE CVE CVE-2011-3439 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1126/</URL>
      <Description>SUSE CVE CVE-2012-1126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1127/</URL>
      <Description>SUSE CVE CVE-2012-1127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1128/</URL>
      <Description>SUSE CVE CVE-2012-1128 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1129/</URL>
      <Description>SUSE CVE CVE-2012-1129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1130/</URL>
      <Description>SUSE CVE CVE-2012-1130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1131/</URL>
      <Description>SUSE CVE CVE-2012-1131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1132/</URL>
      <Description>SUSE CVE CVE-2012-1132 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1133/</URL>
      <Description>SUSE CVE CVE-2012-1133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1134/</URL>
      <Description>SUSE CVE CVE-2012-1134 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1135/</URL>
      <Description>SUSE CVE CVE-2012-1135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1136/</URL>
      <Description>SUSE CVE CVE-2012-1136 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1137/</URL>
      <Description>SUSE CVE CVE-2012-1137 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1138/</URL>
      <Description>SUSE CVE CVE-2012-1138 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1139/</URL>
      <Description>SUSE CVE CVE-2012-1139 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1140/</URL>
      <Description>SUSE CVE CVE-2012-1140 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1141/</URL>
      <Description>SUSE CVE CVE-2012-1141 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1142/</URL>
      <Description>SUSE CVE CVE-2012-1142 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1143/</URL>
      <Description>SUSE CVE CVE-2012-1143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1144/</URL>
      <Description>SUSE CVE CVE-2012-1144 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5668/</URL>
      <Description>SUSE CVE CVE-2012-5668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5669/</URL>
      <Description>SUSE CVE CVE-2012-5669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5670/</URL>
      <Description>SUSE CVE CVE-2012-5670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2240/</URL>
      <Description>SUSE CVE CVE-2014-2240 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2241/</URL>
      <Description>SUSE CVE CVE-2014-2241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9656/</URL>
      <Description>SUSE CVE CVE-2014-9656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9657/</URL>
      <Description>SUSE CVE CVE-2014-9657 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9658/</URL>
      <Description>SUSE CVE CVE-2014-9658 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9659/</URL>
      <Description>SUSE CVE CVE-2014-9659 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9660/</URL>
      <Description>SUSE CVE CVE-2014-9660 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9661/</URL>
      <Description>SUSE CVE CVE-2014-9661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9662/</URL>
      <Description>SUSE CVE CVE-2014-9662 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9663/</URL>
      <Description>SUSE CVE CVE-2014-9663 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9664/</URL>
      <Description>SUSE CVE CVE-2014-9664 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9665/</URL>
      <Description>SUSE CVE CVE-2014-9665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9666/</URL>
      <Description>SUSE CVE CVE-2014-9666 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9667/</URL>
      <Description>SUSE CVE CVE-2014-9667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9668/</URL>
      <Description>SUSE CVE CVE-2014-9668 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9669/</URL>
      <Description>SUSE CVE CVE-2014-9669 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9670/</URL>
      <Description>SUSE CVE CVE-2014-9670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9671/</URL>
      <Description>SUSE CVE CVE-2014-9671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9672/</URL>
      <Description>SUSE CVE CVE-2014-9672 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9673/</URL>
      <Description>SUSE CVE CVE-2014-9673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9674/</URL>
      <Description>SUSE CVE CVE-2014-9674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9675/</URL>
      <Description>SUSE CVE CVE-2014-9675 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="freetype2-devel-2.7-1.1">
      <FullProductName ProductID="freetype2-devel-2.7-1.1">freetype2-devel-2.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freetype2-devel-32bit-2.7-1.1">
      <FullProductName ProductID="freetype2-devel-32bit-2.7-1.1">freetype2-devel-32bit-2.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreetype6-2.7-1.1">
      <FullProductName ProductID="libfreetype6-2.7-1.1">libfreetype6-2.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreetype6-32bit-2.7-1.1">
      <FullProductName ProductID="libfreetype6-32bit-2.7-1.1">libfreetype6-32bit-2.7-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="freetype2-devel-2.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freetype2-devel-2.7-1.1">freetype2-devel-2.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="freetype2-devel-32bit-2.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1">freetype2-devel-32bit-2.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreetype6-2.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libfreetype6-2.7-1.1">libfreetype6-2.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreetype6-32bit-2.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1">libfreetype6-32bit-2.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.</Note>
    </Notes>
    <CVE>CVE-2009-0946</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-0946.html</URL>
        <Description>CVE-2009-0946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/485889</URL>
        <Description>SUSE Bug 485889</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/496289</URL>
        <Description>SUSE Bug 496289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/541626</URL>
        <Description>SUSE Bug 541626</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.</Note>
    </Notes>
    <CVE>CVE-2010-2497</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2497.html</URL>
        <Description>CVE-2010-2497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/619562</URL>
        <Description>SUSE Bug 619562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/635692</URL>
        <Description>SUSE Bug 635692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.</Note>
    </Notes>
    <CVE>CVE-2010-2805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2805.html</URL>
        <Description>CVE-2010-2805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/629447</URL>
        <Description>SUSE Bug 629447</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/635692</URL>
        <Description>SUSE Bug 635692</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.</Note>
    </Notes>
    <CVE>CVE-2010-3053</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3053.html</URL>
        <Description>CVE-2010-3053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/633938</URL>
        <Description>SUSE Bug 633938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/635692</URL>
        <Description>SUSE Bug 635692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/645982</URL>
        <Description>SUSE Bug 645982</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.</Note>
    </Notes>
    <CVE>CVE-2010-3054</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3054.html</URL>
        <Description>CVE-2010-3054</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/633943</URL>
        <Description>SUSE Bug 633943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/635692</URL>
        <Description>SUSE Bug 635692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/645982</URL>
        <Description>SUSE Bug 645982</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.</Note>
    </Notes>
    <CVE>CVE-2010-3311</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3311.html</URL>
        <Description>CVE-2010-3311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/635692</URL>
        <Description>SUSE Bug 635692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/641580</URL>
        <Description>SUSE Bug 641580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/645982</URL>
        <Description>SUSE Bug 645982</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.</Note>
    </Notes>
    <CVE>CVE-2010-3814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3814.html</URL>
        <Description>CVE-2010-3814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/647375</URL>
        <Description>SUSE Bug 647375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/689174</URL>
        <Description>SUSE Bug 689174</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.</Note>
    </Notes>
    <CVE>CVE-2010-3855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3855.html</URL>
        <Description>CVE-2010-3855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/647375</URL>
        <Description>SUSE Bug 647375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/689174</URL>
        <Description>SUSE Bug 689174</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.</Note>
    </Notes>
    <CVE>CVE-2011-0226</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0226.html</URL>
        <Description>CVE-2011-0226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/704612</URL>
        <Description>SUSE Bug 704612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/728044</URL>
        <Description>SUSE Bug 728044</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.</Note>
    </Notes>
    <CVE>CVE-2011-3256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3256.html</URL>
        <Description>CVE-2011-3256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/728044</URL>
        <Description>SUSE Bug 728044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/730124</URL>
        <Description>SUSE Bug 730124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/748083</URL>
        <Description>SUSE Bug 748083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.</Note>
    </Notes>
    <CVE>CVE-2011-3439</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3439.html</URL>
        <Description>CVE-2011-3439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/730124</URL>
        <Description>SUSE Bug 730124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/748083</URL>
        <Description>SUSE Bug 748083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.</Note>
    </Notes>
    <CVE>CVE-2012-1126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1126.html</URL>
        <Description>CVE-2012-1126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750937</URL>
        <Description>SUSE Bug 750937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.</Note>
    </Notes>
    <CVE>CVE-2012-1127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1127.html</URL>
        <Description>CVE-2012-1127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750947</URL>
        <Description>SUSE Bug 750947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.</Note>
    </Notes>
    <CVE>CVE-2012-1128</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1128.html</URL>
        <Description>CVE-2012-1128</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750942</URL>
        <Description>SUSE Bug 750942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.</Note>
    </Notes>
    <CVE>CVE-2012-1129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1129.html</URL>
        <Description>CVE-2012-1129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750952</URL>
        <Description>SUSE Bug 750952</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.</Note>
    </Notes>
    <CVE>CVE-2012-1130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1130.html</URL>
        <Description>CVE-2012-1130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750951</URL>
        <Description>SUSE Bug 750951</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.</Note>
    </Notes>
    <CVE>CVE-2012-1131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1131.html</URL>
        <Description>CVE-2012-1131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750953</URL>
        <Description>SUSE Bug 750953</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.</Note>
    </Notes>
    <CVE>CVE-2012-1132</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1132.html</URL>
        <Description>CVE-2012-1132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750950</URL>
        <Description>SUSE Bug 750950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.</Note>
    </Notes>
    <CVE>CVE-2012-1133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1133.html</URL>
        <Description>CVE-2012-1133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750940</URL>
        <Description>SUSE Bug 750940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.</Note>
    </Notes>
    <CVE>CVE-2012-1134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1134.html</URL>
        <Description>CVE-2012-1134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750945</URL>
        <Description>SUSE Bug 750945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.</Note>
    </Notes>
    <CVE>CVE-2012-1135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1135.html</URL>
        <Description>CVE-2012-1135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750946</URL>
        <Description>SUSE Bug 750946</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.</Note>
    </Notes>
    <CVE>CVE-2012-1136</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1136.html</URL>
        <Description>CVE-2012-1136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750939</URL>
        <Description>SUSE Bug 750939</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.</Note>
    </Notes>
    <CVE>CVE-2012-1137</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1137.html</URL>
        <Description>CVE-2012-1137</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750943</URL>
        <Description>SUSE Bug 750943</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.</Note>
    </Notes>
    <CVE>CVE-2012-1138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1138.html</URL>
        <Description>CVE-2012-1138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750941</URL>
        <Description>SUSE Bug 750941</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.</Note>
    </Notes>
    <CVE>CVE-2012-1139</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1139.html</URL>
        <Description>CVE-2012-1139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750938</URL>
        <Description>SUSE Bug 750938</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.</Note>
    </Notes>
    <CVE>CVE-2012-1140</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1140.html</URL>
        <Description>CVE-2012-1140</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750954</URL>
        <Description>SUSE Bug 750954</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.</Note>
    </Notes>
    <CVE>CVE-2012-1141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1141.html</URL>
        <Description>CVE-2012-1141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750955</URL>
        <Description>SUSE Bug 750955</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.</Note>
    </Notes>
    <CVE>CVE-2012-1142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1142.html</URL>
        <Description>CVE-2012-1142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750948</URL>
        <Description>SUSE Bug 750948</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.</Note>
    </Notes>
    <CVE>CVE-2012-1143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1143.html</URL>
        <Description>CVE-2012-1143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750949</URL>
        <Description>SUSE Bug 750949</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.</Note>
    </Notes>
    <CVE>CVE-2012-1144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1144.html</URL>
        <Description>CVE-2012-1144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/750944</URL>
        <Description>SUSE Bug 750944</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.</Note>
    </Notes>
    <CVE>CVE-2012-5668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5668.html</URL>
        <Description>CVE-2012-5668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/795826</URL>
        <Description>SUSE Bug 795826</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2012-5669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5669.html</URL>
        <Description>CVE-2012-5669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/795826</URL>
        <Description>SUSE Bug 795826</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.</Note>
    </Notes>
    <CVE>CVE-2012-5670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5670.html</URL>
        <Description>CVE-2012-5670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/795826</URL>
        <Description>SUSE Bug 795826</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.</Note>
    </Notes>
    <CVE>CVE-2014-2240</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2240.html</URL>
        <Description>CVE-2014-2240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/867620</URL>
        <Description>SUSE Bug 867620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916867</URL>
        <Description>SUSE Bug 916867</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.</Note>
    </Notes>
    <CVE>CVE-2014-2241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2241.html</URL>
        <Description>CVE-2014-2241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/867620</URL>
        <Description>SUSE Bug 867620</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.</Note>
    </Notes>
    <CVE>CVE-2014-9656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9656.html</URL>
        <Description>CVE-2014-9656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916847</URL>
        <Description>SUSE Bug 916847</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.</Note>
    </Notes>
    <CVE>CVE-2014-9657</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9657.html</URL>
        <Description>CVE-2014-9657</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916856</URL>
        <Description>SUSE Bug 916856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.</Note>
    </Notes>
    <CVE>CVE-2014-9658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9658.html</URL>
        <Description>CVE-2014-9658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916857</URL>
        <Description>SUSE Bug 916857</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.</Note>
    </Notes>
    <CVE>CVE-2014-9659</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9659.html</URL>
        <Description>CVE-2014-9659</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916867</URL>
        <Description>SUSE Bug 916867</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.</Note>
    </Notes>
    <CVE>CVE-2014-9660</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9660.html</URL>
        <Description>CVE-2014-9660</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916858</URL>
        <Description>SUSE Bug 916858</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.</Note>
    </Notes>
    <CVE>CVE-2014-9661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9661.html</URL>
        <Description>CVE-2014-9661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916859</URL>
        <Description>SUSE Bug 916859</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.</Note>
    </Notes>
    <CVE>CVE-2014-9662</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9662.html</URL>
        <Description>CVE-2014-9662</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916860</URL>
        <Description>SUSE Bug 916860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.</Note>
    </Notes>
    <CVE>CVE-2014-9663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9663.html</URL>
        <Description>CVE-2014-9663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916865</URL>
        <Description>SUSE Bug 916865</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.</Note>
    </Notes>
    <CVE>CVE-2014-9664</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9664.html</URL>
        <Description>CVE-2014-9664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916864</URL>
        <Description>SUSE Bug 916864</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.</Note>
    </Notes>
    <CVE>CVE-2014-9665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9665.html</URL>
        <Description>CVE-2014-9665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916863</URL>
        <Description>SUSE Bug 916863</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.</Note>
    </Notes>
    <CVE>CVE-2014-9666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9666.html</URL>
        <Description>CVE-2014-9666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916862</URL>
        <Description>SUSE Bug 916862</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.</Note>
    </Notes>
    <CVE>CVE-2014-9667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9667.html</URL>
        <Description>CVE-2014-9667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916861</URL>
        <Description>SUSE Bug 916861</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.</Note>
    </Notes>
    <CVE>CVE-2014-9668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9668.html</URL>
        <Description>CVE-2014-9668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916868</URL>
        <Description>SUSE Bug 916868</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.</Note>
    </Notes>
    <CVE>CVE-2014-9669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9669.html</URL>
        <Description>CVE-2014-9669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916870</URL>
        <Description>SUSE Bug 916870</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.</Note>
    </Notes>
    <CVE>CVE-2014-9670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9670.html</URL>
        <Description>CVE-2014-9670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916871</URL>
        <Description>SUSE Bug 916871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933247</URL>
        <Description>SUSE Bug 933247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.</Note>
    </Notes>
    <CVE>CVE-2014-9671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9671.html</URL>
        <Description>CVE-2014-9671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916872</URL>
        <Description>SUSE Bug 916872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933247</URL>
        <Description>SUSE Bug 933247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.</Note>
    </Notes>
    <CVE>CVE-2014-9672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9672.html</URL>
        <Description>CVE-2014-9672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916873</URL>
        <Description>SUSE Bug 916873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.</Note>
    </Notes>
    <CVE>CVE-2014-9673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9673.html</URL>
        <Description>CVE-2014-9673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916874</URL>
        <Description>SUSE Bug 916874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.</Note>
    </Notes>
    <CVE>CVE-2014-9674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9674.html</URL>
        <Description>CVE-2014-9674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916879</URL>
        <Description>SUSE Bug 916879</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.</Note>
    </Notes>
    <CVE>CVE-2014-9675</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:freetype2-devel-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-2.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9675.html</URL>
        <Description>CVE-2014-9675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916881</URL>
        <Description>SUSE Bug 916881</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
