[Bug 1191079] CVE-2014-9657 freetype: off-by-one buffer over-read in tt_face_load_hdmx()
bugzilla at redhat.com
bugzilla at redhat.com
Thu Feb 19 13:13:10 UTC 2015
https://bugzilla.redhat.com/show_bug.cgi?id=1191079
Tomas Hoger <thoger at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|medium |low
Fixed In Version| |freetype 2.5.4
Summary|CVE-2014-9657 freetype: DoS |CVE-2014-9657 freetype:
|in the tt_face_load_hdmx |off-by-one buffer over-read
|function in |in tt_face_load_hdmx()
|truetype/ttpload.c |
Whiteboard|impact=moderate,public=2014 |impact=low,public=20141124,
|1124,reported=20150210,sour |reported=20150210,source=cv
|ce=cve,cvss2=3.7/AV:L/AC:H/ |e,cvss2=2.6/AV:N/AC:H/Au:N/
|Au:N/C:P/I:P/A:P,fedora-all |C:N/I:N/A:P,cwe=CWE-193->CW
|/freetype=affected,rhel-5/f |E-125,fedora-all/freetype=a
|reetype=new,rhel-6/freetype |ffected,rhel-5/freetype=new
|=new,rhel-7/freetype=new |,rhel-6/freetype=new,rhel-7
| |/freetype=new
Severity|medium |low
--- Comment #2 from Tomas Hoger <thoger at redhat.com> ---
Upstream bug is:
https://savannah.nongnu.org/bugs/?43679
Issue was fixed upstream in 2.5.4.
This is a single byte heap-based buffer over-read. A probability of this
causing crash is extremely low.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=eZz2yJjIF6&a=cc_unsubscribe
More information about the fonts-bugs
mailing list