Bug 555831 (CVE-2010-0421)

Summary: CVE-2010-0421 libpangoft2 segfaults on forged font files
Product: [Other] Security Response Reporter: Marc Schoenefeld <mschoene>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aris, behdad, jlieskov, mjc, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-19 09:09:58 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 558933, 558934, 558936, 559168, 559169, 566491, 568150, 573883, 833948    
Bug Blocks:    

Description Marc Schoenefeld 2010-01-15 17:08:04 UTC
Marc Schoenefeld found an improper input sanitization, leading to
array indexing error, in the way Pango font rendering library
synthesized Glyph Definition Table (GDEF) from the font's character
map and the Unicode property database. If a local user was tricked
into loading a specially-crafted font file in an application,
using the Pango font rendering library, it could lead to denial
of service (relevant application crash).

Comment 11 errata-xmlrpc 2010-03-15 23:14:58 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3
  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 4

Via RHSA-2010:0140 https://rhn.redhat.com/errata/RHSA-2010-0140.html