https://bugzilla.redhat.com/show_bug.cgi?id=1191092
Tomas Hoger <thoger(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|medium |low
Fixed In Version| |freetype 2.5.4
Summary|CVE-2014-9669 freetype: |CVE-2014-9669 freetype:
|Multiple integer overflows |multiple integer overflows
|in sfnt/ttcmap.c |leading to buffer
| |over-reads in cmap handling
Whiteboard|impact=moderate,public=2014 |impact=low,public=20141124,
|1124,reported=20150210,sour |reported=20150210,source=cv
|ce=cve,cvss2=3.7/AV:L/AC:H/ |e,cvss2=4.3/AV:N/AC:M/Au:N/
|Au:N/C:P/I:P/A:P,fedora-all |C:N/I:N/A:P,cwe=CWE-190->CW
|/freetype=affected,rhel-5/f |E-125,rhel-4/freetype=affec
|reetype=new,rhel-6/freetype |ted,rhel-5/freetype=affecte
|=new,rhel-7/freetype=new |d,rhel-6/freetype=affected,
| |rhel-7/freetype=affected,rh
| |ev-m-3/mingw-virt-viewer=af
| |fected,fedora-all/freetype=
| |affected,fedora-all/mingw-f
| |reetype=affected,epel-7/min
| |gw-freetype=affected
Severity|medium |low
--- Comment #4 from Tomas Hoger <thoger(a)redhat.com> ---
Upstream bug is:
https://savannah.nongnu.org/bugs/?43588
Issue was fixed upstream in 2.5.4.
This CVE covers multiple integer overflow flaws in checks protecting against
out-of-bounds reads, making it possible to bypass those check. Crashing
freetype using a specially-crafted font file may be possible because of this.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug
https://bugzilla.redhat.com/token.cgi?t=jxd6pCDK6X&a=cc_unsubscribe