Bug 1262377 (CVE-2014-9745)

Summary: CVE-2014-9745 freetype: Infinite loop in parse_encoding in t1load.c
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: behdad, erik-fedora, fedora-mingw, fonts-bugs, kevin, lfarkas, mkasik, rjones, sardella
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-09-14 07:25:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1262380, 1262381, 1262382    
Bug Blocks: 1262379    

Description Adam Mariš 2015-09-11 13:55:49 UTC
If the Postscript stream contains a broken number-with-base (e.g. "8#garbage") the cursor doesn't advance and parse_encoding enters an infinite loop.

Upstream patch:

http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75

CVE request:

http://seclists.org/oss-sec/2015/q3/537

Comment 1 Adam Mariš 2015-09-11 13:58:22 UTC
Created freetype tracking bugs for this issue:

Affects: fedora-all [bug 1262381]

Comment 2 Adam Mariš 2015-09-11 13:58:25 UTC
Created mingw-freetype tracking bugs for this issue:

Affects: fedora-all [bug 1262380]
Affects: epel-7 [bug 1262382]

Comment 3 Marek Kašík 2015-09-11 14:51:57 UTC
It seems to me that this is already fixed in all maintained versions of Fedora. Check it please.

Comment 4 Huzaifa S. Sidhpurwala 2015-09-14 07:23:38 UTC
Upstream freetype git suggests that this issue was addressed in freetype-2.5.3.

Therefore this issue is already fixed in all the maintained versions of Fedora.