https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Bug ID: 1191085 Summary: CVE-2014-9663 freetype: out-of-bounds read in the tt_cmap4_validate function in sfnt/ttcmap.c Product: Security Response Component: vulnerability Keywords: Security Severity: medium Priority: medium Assignee: security-response-team@redhat.com Reporter: vkaigoro@redhat.com CC: behdad@fedoraproject.org, fonts-bugs@lists.fedoraproject.org, kevin@tigcc.ticalc.org, mkasik@redhat.com
Common Vulnerabilities and Exposures assigned CVE-2014-9663 to the following issue:
The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
http://code.google.com/p/google-security-research/issues/detail?id=184 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9bd20b730...
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Vasyl Kaigorodov vkaigoro@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1191099
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1191099 [Bug 1191099] CVE-2014-9656 CVE-2014-9657 CVE-2014-9661 CVE-2014-9660 CVE-2014-9662 CVE-2014-9658 CVE-2014-9659 freetype: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
--- Comment #1 from Vasyl Kaigorodov vkaigoro@redhat.com ---
Created freetype tracking bugs for this issue:
Affects: fedora-all [bug 1191099]
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Vasyl Kaigorodov vkaigoro@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Blocks| |1191102
https://bugzilla.redhat.com/show_bug.cgi?id=1191085 Bug 1191085 depends on bug 1191099, which changed state.
Bug 1191099 Summary: CVE-2014-9656 CVE-2014-9657 CVE-2014-9661 CVE-2014-9660 CVE-2014-9667 CVE-2014-9666 CVE-2014-9665 CVE-2014-9664 CVE-2014-9669 CVE-2014-9668 CVE-2014-9662 CVE-2014-9658 CVE-2014-9659 CVE-2014-9663 CVE-2014-9670 freetype: various flaws [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1191099
What |Removed |Added ---------------------------------------------------------------------------- Status|ON_QA |CLOSED Resolution|--- |ERRATA
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
--- Comment #2 from Fedora Update System updates@fedoraproject.org --- freetype-2.5.3-15.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
--- Comment #3 from Fedora Update System updates@fedoraproject.org --- freetype-2.5.0-9.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Tomas Hoger thoger@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Priority|medium |low Fixed In Version| |freetype 2.5.4 Summary|CVE-2014-9663 freetype: |CVE-2014-9663 freetype: |out-of-bounds read in the |out-of-bounds read in |tt_cmap4_validate function |tt_cmap4_validate() |in sfnt/ttcmap.c | Whiteboard|impact=moderate,public=2014 |impact=low,public=20141124, |1124,reported=20150210,sour |reported=20150210,source=cv |ce=cve,cvss2=3.7/AV:L/AC:H/ |e,cvss2=2.6/AV:N/AC:H/Au:N/ |Au:N/C:P/I:P/A:P,fedora-all |C:N/I:N/A:P,cwe=CWE-125,rhe |/freetype=affected,rhel-5/f |l-4/freetype=wontfix,rhel-5 |reetype=new,rhel-6/freetype |/freetype=wontfix,rhel-6/fr |=new,rhel-7/freetype=new |eetype=affected,rhel-7/free | |type=affected,rhev-m-3/ming | |w-virt-viewer=affected,fedo | |ra-all/freetype=affected,fe | |dora-all/mingw-freetype=aff | |ected,epel-7/mingw-freetype | |=affected Severity|medium |low
--- Comment #4 from Tomas Hoger thoger@redhat.com --- Upstream bug is: https://savannah.nongnu.org/bugs/?43656
Issue was fixed upstream in 2.5.4.
This is a very limited buffer over-read. Two bytes are read from at max 7th and 8th byte after the end of the buffer. After that, another check is reached that detects the problem. This is rather unlikely to cause crash.
Issue is caused by a misplaced check to ensure enough input it still available for further parsing. After the check, length variable indicating remaining input size is decremented to the size of the actually available data.
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Martin Prpic mprpic@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1197737
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Martin Prpic mprpic@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1197738
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Martin Prpic mprpic@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1197739
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Martin Prpic mprpic@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1197740
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
--- Comment #7 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7
Via RHSA-2015:0696 https://rhn.redhat.com/errata/RHSA-2015-0696.html
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Tomas Hoger thoger@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |ERRATA Last Closed| |2015-03-18 03:40:50
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Vincent Danen vdanen@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|impact=low,public=20141124, |impact=low,public=20141124, |reported=20150210,source=cv |reported=20150210,source=cv |e,cvss2=2.6/AV:N/AC:H/Au:N/ |e,cvss2=2.6/AV:N/AC:H/Au:N/ |C:N/I:N/A:P,cwe=CWE-125,rhe |C:N/I:N/A:P,cwe=CWE-125,rhe |l-4/freetype=wontfix,rhel-5 |l-4/freetype=wontfix,rhel-5 |/freetype=wontfix,rhel-6/fr |/freetype=wontfix,rhel-6/fr |eetype=affected,rhel-7/free |eetype=notaffected,rhel-7/f |type=affected,rhev-m-3/ming |reetype=affected,rhev-m-3/m |w-virt-viewer=affected,fedo |ingw-virt-viewer=affected,f |ra-all/freetype=affected,fe |edora-all/freetype=affected |dora-all/mingw-freetype=aff |,fedora-all/mingw-freetype= |ected,epel-7/mingw-freetype |affected,epel-7/mingw-freet |=affected |ype=affected
https://bugzilla.redhat.com/show_bug.cgi?id=1191085
Ján Rusnačko jrusnack@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|impact=low,public=20141124, |impact=low,public=20141124, |reported=20150210,source=cv |reported=20150210,source=cv |e,cvss2=2.6/AV:N/AC:H/Au:N/ |e,cvss2=2.6/AV:N/AC:H/Au:N/ |C:N/I:N/A:P,cwe=CWE-125,rhe |C:N/I:N/A:P,cwe=CWE-125,rhe |l-4/freetype=wontfix,rhel-5 |l-4/freetype=wontfix,rhel-5 |/freetype=wontfix,rhel-6/fr |/freetype=wontfix,rhel-6/fr |eetype=notaffected,rhel-7/f |eetype=affected,rhel-7/free |reetype=affected,rhev-m-3/m |type=affected,rhev-m-3/ming |ingw-virt-viewer=affected,f |w-virt-viewer=affected,fedo |edora-all/freetype=affected |ra-all/freetype=affected,fe |,fedora-all/mingw-freetype= |dora-all/mingw-freetype=aff |affected,epel-7/mingw-freet |ected,epel-7/mingw-freetype |ype=affected |=affected
fonts-bugs@lists.fedoraproject.org