~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
PublicDateAtUSN: 2015-02-08
Candidate: CVE-2014-9666
PublicDate: 2015-02-08
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
 http://www.ubuntu.com/usn/usn-2510-1
Description:
 The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4
 proceeds with a count-to-size association without restricting the count
 value, which allows remote attackers to cause a denial of service (integer
 overflow and out-of-bounds read) or possibly have unspecified other impact
 via a crafted embedded bitmap.
Ubuntu-Description:
Notes:
 mdeslaur> in precise, this is in src/sfnt/ttsbit0.c
Bugs:
 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
 http://savannah.nongnu.org/bugs/?43591
 http://code.google.com/p/google-security-research/issues/detail?id=167
Priority: medium
Discovered-by: Mateusz Jurczyk
Assigned-to: mdeslaur

Patches_freetype:
 upstream: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439
upstream_freetype: released (2.5.4)
lucid_freetype: released (2.3.11-1ubuntu2.8)
precise_freetype: released (2.4.8-1ubuntu2.2)
trusty_freetype: released (2.5.2-1ubuntu2.4)
utopic_freetype: released (2.5.2-2ubuntu1.1)
devel_freetype: released (2.5.2-2ubuntu3)