Bug 1191190 (CVE-2014-9674)
Summary: | CVE-2014-9674 freetype: multiple integer overflows Mac_Read_POST_Resource() leading to heap-based buffer overflows | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Martin Prpič <mprpic> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | behdad, fonts-bugs, kevin, mkasik |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | freetype 2.5.4 | Doc Type: | Bug Fix |
Doc Text: |
Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the way FreeType handled Mac fonts. If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-03-18 07:40:47 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1191191, 1197737, 1197738, 1197739, 1197740 | ||
Bug Blocks: | 1191102 |
Description
Martin Prpič
2015-02-10 16:19:59 UTC
Created freetype tracking bugs for this issue: Affects: fedora-all [bug 1191191] freetype-2.5.3-15.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report. freetype-2.5.0-9.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. (Private) upstream bug: https://savannah.nongnu.org/bugs/?43538 Issue was fixed upstream in 2.5.4. There are multiple integer overflow issues in the Mac_Read_POST_Resource() function. They can cause freetype to allocate buffer of insufficient size and later write data past its boundaries. This will lead to memory corruption that can cause crash and possibly code execution. These flaw make it possible to bypass boundary check added to address CVE-2010-2808 (see bug 621907). This is related to issue tracked via bug 1191096, and the following patches were applied to address problems reported via these two bugs: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=240c94a http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=35252ae http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=4533167 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=1720e81 http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=cd4a5a2 Unified diff for all the above changes: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/diff/src/base/ftobjs.c?id2=5aff853&id=cd4a5a2 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2015:0696 https://rhn.redhat.com/errata/RHSA-2015-0696.html |