An out-of heap-based buffer read flaw was found in the way FreeType font rendering engine performed:
1) adding of properties,
2) parsing of properties,
3) checking if particular property is an atom
for Glyph bitmap distribution format (BDF) fonts. A remote attacker could provide a specially-crafted BDF font file, which once processed in an application linked against FreeType would lead to that application crash.
Upstream bug reports:
[1] https://savannah.nongnu.org/bugs/?35597
[2] https://savannah.nongnu.org/bugs/?35598
Upstream patch:
[3] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=320d4976d1d010b5abe9d61a7423d8ca06bc34df
Acknowledgements:
Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
This issue affects the versions of the freetype package, as shipped with Red Hat Enterprise Linux 5 and 6.
--
This issue affects the versions of the freetype package, as shipped with Fedora release of 15 and 16.
Comment 6Huzaifa S. Sidhpurwala
2012-03-20 06:11:46 UTC