Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1191089 - (CVE-2014-9666) CVE-2014-9666 freetype: integer overflow in tt_sbit_decoder_init() leading to out-of-bounds read
CVE-2014-9666 freetype: integer overflow in tt_sbit_decoder_init() leading to...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20141124,reported=2...
: Security
Depends On: 1191099
Blocks: 1191102
  Show dependency treegraph
 
Reported: 2015-02-10 07:51 EST by Vasyl Kaigorodov
Modified: 2015-02-23 04:56 EST (History)
4 users (show)

See Also:
Fixed In Version: freetype 2.5.4
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-02-23 04:55:46 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vasyl Kaigorodov 2015-02-10 07:51:41 EST
Common Vulnerabilities and Exposures assigned CVE-2014-9666 to the following issue:

The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4
proceeds with a count-to-size association without restricting the count value,
which allows remote attackers to cause a denial of service (integer overflow and
out-of-bounds read) or possibly have unspecified other impact via a crafted
embedded bitmap.

http://code.google.com/p/google-security-research/issues/detail?id=167
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439
Comment 1 Vasyl Kaigorodov 2015-02-10 07:57:05 EST
Created freetype tracking bugs for this issue:

Affects: fedora-all [bug 1191099]
Comment 2 Fedora Update System 2015-02-19 13:01:20 EST
freetype-2.5.3-15.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 3 Fedora Update System 2015-02-20 03:30:55 EST
freetype-2.5.0-9.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 4 Tomas Hoger 2015-02-23 04:55:46 EST
Upstream bug is:
https://savannah.nongnu.org/bugs/?43591

Issue was fixed upstream in 2.5.4.

The issue is an integer overflow flaw in a check protecting against out-of-bounds reads.  The check was originally introduced in:

http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=88ab638e

Affected code is not build and used in the freetype packages in Red Hat Enterprise Linux.  In versions prior to 2.5, the code was only used when FT_CONFIG_OPTION_OLD_INTERNALS macro was not defined.  Upstream default was to define the macro and it only became undefined by default in upstream version 2.4.12:

http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=e4ecce3b

The freetype packages in Red Hat Enterprise Linux 7 are based on upstream version 2.4.11 or older and do not override this upstream default.

Statement:

This issue did not affect the versions of freetype as shipped with Red Hat Enterprise Linux 5, 6, and 7.

Note You need to log in before you can comment on or make changes to this bug.