A heap based buffer overflow was found in the "ft_var_readpackedpoints()" function in src/truetype/ttgxvar.c when processing TrueType GX fonts. If a user opened a specially crafted TrueType GX font file, with an application complied with freetype library, it could cause denial of service (application crash) or potentially execute arbitrary code with the privileges of the user running that application. Upstream bug: https://savannah.nongnu.org/bugs/?31310 The following commit fixes this issue: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a Secunia: http://secunia.com/advisories/41738
Created attachment 454745 [details] upstream patch
Created freetype tracking bugs for this issue Affects: fedora-all [bug 651764]
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2010:0889 https://rhn.redhat.com/errata/RHSA-2010-0889.html