[Bug 1191079] CVE-2014-9657 freetype: off-by-one buffer over-read in tt_face_load_hdmx()

bugzilla at redhat.com bugzilla at redhat.com
Thu Feb 19 13:13:10 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1191079

Tomas Hoger <thoger at redhat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Priority|medium                      |low
   Fixed In Version|                            |freetype 2.5.4
            Summary|CVE-2014-9657 freetype: DoS |CVE-2014-9657 freetype:
                   |in the tt_face_load_hdmx    |off-by-one buffer over-read
                   |function in                 |in tt_face_load_hdmx()
                   |truetype/ttpload.c          |
         Whiteboard|impact=moderate,public=2014 |impact=low,public=20141124,
                   |1124,reported=20150210,sour |reported=20150210,source=cv
                   |ce=cve,cvss2=3.7/AV:L/AC:H/ |e,cvss2=2.6/AV:N/AC:H/Au:N/
                   |Au:N/C:P/I:P/A:P,fedora-all |C:N/I:N/A:P,cwe=CWE-193->CW
                   |/freetype=affected,rhel-5/f |E-125,fedora-all/freetype=a
                   |reetype=new,rhel-6/freetype |ffected,rhel-5/freetype=new
                   |=new,rhel-7/freetype=new    |,rhel-6/freetype=new,rhel-7
                   |                            |/freetype=new
           Severity|medium                      |low



--- Comment #2 from Tomas Hoger <thoger at redhat.com> ---
Upstream bug is:
https://savannah.nongnu.org/bugs/?43679

Issue was fixed upstream in 2.5.4.

This is a single byte heap-based buffer over-read.  A probability of this
causing crash is extremely low.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=eZz2yJjIF6&a=cc_unsubscribe


More information about the fonts-bugs mailing list