An out-of heap-based buffer write flaw was found in the way TrueType bytecode / opcode interpreter of the FreeType font rendering engine performed moving of zone2 pointer point by execution of 'SHift Contour' (SHC) instruction. A remote attacker could provide a specially-crafted font file, which once opened in an application linked against FreeType would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application. Upstream bug report: [1] https://savannah.nongnu.org/bugs/?35689 Upstream patch: [2] http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0fc8debeb6c2f6a8a9a2b97332a7c8a0a1bd9e85 Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Added CVE as per http://www.openwall.com/lists/oss-security/2012/03/06/16
(In reply to comment #0) > An out-of heap-based buffer write flaw was found in the way TrueType bytecode / > opcode interpreter of the FreeType font rendering engine performed moving of > zone2 pointer point by execution of 'SHift Contour' (SHC) instruction. Bytecode interpreter (BCI) is where the problem surfaced, but it was addressed in a TTF loading code that is not BCI specific. BCI support is disabled in Red Hat Enterprise Linux freetype packages and is only enabled upstream by default starting with version 2.4.
Created mingw32-freetype tracking bugs for this issue Affects: fedora-all [bug 806271]
Created freetype tracking bugs for this issue Affects: fedora-all [bug 806270]
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2012:0467 https://rhn.redhat.com/errata/RHSA-2012-0467.html