https://bugzilla.redhat.com/show_bug.cgi?id=1262377
Bug ID: 1262377 Summary: freetype: Infinite loop in parse_encoding in t1load.c Product: Security Response Component: vulnerability Keywords: Security Severity: low Priority: low Assignee: security-response-team@redhat.com Reporter: amaris@redhat.com CC: behdad@fedoraproject.org, erik-fedora@vanpienbroek.nl, fedora-mingw@lists.fedoraproject.org, fonts-bugs@lists.fedoraproject.org, kevin@tigcc.ticalc.org, lfarkas@lfarkas.org, mkasik@redhat.com, rjones@redhat.com
If the Postscript stream contains a broken number-with-base (e.g. "8#garbage") the cursor doesn't advance and parse_encoding enters an infinite loop.
Upstream patch:
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b...
CVE request:
http://seclists.org/oss-sec/2015/q3/537