[Bug 1191090] CVE-2014-9667 freetype: integer overflow in tt_face_load_font_dir() leading to out-of-bounds read
bugzilla at redhat.com
bugzilla at redhat.com
Mon Feb 23 10:29:52 UTC 2015
https://bugzilla.redhat.com/show_bug.cgi?id=1191090
Tomas Hoger <thoger at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|medium |low
Fixed In Version| |freetype 2.5.4
Summary|CVE-2014-9667 freetype: |CVE-2014-9667 freetype:
|integer overflow and |integer overflow in
|out-of-bounds read in |tt_face_load_font_dir()
|sfnt/ttload.c |leading to out-of-bounds
| |read
Whiteboard|impact=moderate,public=2014 |impact=low,public=20141124,
|1124,reported=20150210,sour |reported=20150210,source=cv
|ce=cve,cvss2=3.7/AV:L/AC:H/ |e,cvss2=4.3/AV:N/AC:M/Au:N/
|Au:N/C:P/I:P/A:P,fedora-all |C:N/I:N/A:P,cwe=CWE-190->CW
|/freetype=affected,rhel-5/f |E-125,rhel-4/freetype=affec
|reetype=new,rhel-6/freetype |ted,rhel-5/freetype=affecte
|=new,rhel-7/freetype=new |d,rhel-6/freetype=affected,
| |rhel-7/freetype=affected,rh
| |ev-m-3/mingw-virt-viewer=af
| |fected,fedora-all/freetype=
| |affected,fedora-all/mingw-f
| |reetype=affected,epel-7/min
| |gw-freetype=affected
Severity|medium |low
--- Comment #4 from Tomas Hoger <thoger at redhat.com> ---
Upstream bug is:
https://savannah.nongnu.org/bugs/?43590
Issue was fixed upstream in 2.5.4.
The issue is an integer overflow flaw in a check protecting against
out-of-bounds reads, making it possible to bypass check. Crashing freetype
using a specially-crafted font file should be possible because of this.
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=LpNkSzLu5I&a=cc_unsubscribe
More information about the fonts-bugs
mailing list