Bug 491384 (CVE-2009-0946) - CVE-2009-0946 freetype: multiple integer overflows
Summary: CVE-2009-0946 freetype: multiple integer overflows
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-0946
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 484441 484442 484443 484444 496111 496112 502577 806287
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-03-20 17:55 UTC by Vincent Danen
Modified: 2019-09-29 12:29 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-10-25 21:44:56 UTC
Embargoed:


Attachments (Terms of Use)
Tavis' patch for 2.3.8 (3.55 KB, patch)
2009-03-20 17:58 UTC, Vincent Danen
no flags Details | Diff
backported patch to 2.3.5 (3.20 KB, patch)
2009-03-20 17:59 UTC, Vincent Danen
no flags Details | Diff
backported patch to 2.2.1 (3.17 KB, patch)
2009-03-20 17:59 UTC, Vincent Danen
no flags Details | Diff
upstream patch from git (4.82 KB, patch)
2009-04-15 15:24 UTC, Vincent Danen
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:0329 0 normal SHIPPED_LIVE Important: freetype security update 2009-05-22 12:21:55 UTC
Red Hat Product Errata RHSA-2009:1061 0 normal SHIPPED_LIVE Important: freetype security update 2009-05-22 12:11:52 UTC
Red Hat Product Errata RHSA-2009:1062 0 normal SHIPPED_LIVE Important: freetype security update 2009-05-22 12:06:25 UTC

Comment 2 Vincent Danen 2009-03-20 17:58:03 UTC
Created attachment 336091 [details]
Tavis' patch for 2.3.8

Comment 3 Vincent Danen 2009-03-20 17:59:18 UTC
Created attachment 336092 [details]
backported patch to 2.3.5

Comment 4 Vincent Danen 2009-03-20 17:59:43 UTC
Created attachment 336093 [details]
backported patch to 2.2.1

Comment 8 Vincent Danen 2009-04-15 04:19:59 UTC
This issue has been assigned the CVE name CVE-2009-0946

Comment 9 Vincent Danen 2009-04-15 15:24:52 UTC
Created attachment 339698 [details]
upstream patch from git

The upstream patch is sufficiently different from Tavis' original patch that we should backport it instead.  This is a patch of the four git commits with the changelog changes removed.

Comment 13 Tomas Hoger 2009-04-17 06:53:13 UTC
CVE-2009-0946:
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote
attackers to execute arbitrary code via vectors related to large
values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c,
and (3) cff/cffload.c.

Comment 15 errata-xmlrpc 2009-05-22 12:06:30 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 2.1

Via RHSA-2009:1062 https://rhn.redhat.com/errata/RHSA-2009-1062.html

Comment 16 errata-xmlrpc 2009-05-22 12:12:03 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2009:1061 https://rhn.redhat.com/errata/RHSA-2009-1061.html

Comment 17 errata-xmlrpc 2009-05-22 12:22:16 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3
  Red Hat Enterprise Linux 4

Via RHSA-2009:0329 https://rhn.redhat.com/errata/RHSA-2009-0329.html

Comment 18 Tomas Hoger 2009-05-26 08:39:31 UTC
There is no fixed upstream version yet.  Issue affects latest upstream version 2.3.9, new version with fixes from git (comment #7) has not been released yet.

Comment 20 Vincent Danen 2009-12-04 19:19:26 UTC
This was fixed upstream in 2.3.10 according to the changelog, but the site does not list this as a release to fix security issues.

This still affects Fedora 10, 11, and 12.  Fedora 12 has 2.3.11 in testing, which would correct the issue, but the current release is 2.3.9 for current Fedora 11 and 12, and 2.3.7 for Fedora 10.

It does not look as though Fedora has been patched for this, and it really should be.  Behdad, can you take care of this please?

Comment 23 Vincent Danen 2009-12-10 15:50:49 UTC
Fedora 12 currently has freetype-2.3.11-3.fc12 (FEDORA-2009-12629) so this issue has been corrected there.


Note You need to log in before you can comment on or make changes to this bug.