First published: Tue Mar 06 2012(Updated: )
An array index error, leading to out-of stack-based buffer read flaw was found in the way FreeType font rendering engine processed certain glyph information for glyph bitmap distribution format (BDF) font files. A remote attacker could provide a specially-crafted BDF font file, which once opened in an application linked against FreeType would lead to that application crash. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35656">https://savannah.nongnu.org/bugs/?35656</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6ac022dc750d95296a6f731b9594f2e751d997fa">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6ac022dc750d95296a6f731b9594f2e751d997fa</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Freetype Freetype | <=2.4.8 | |
Freetype Freetype | =1.3.1 | |
Freetype Freetype | =2.0.0 | |
Freetype Freetype | =2.0.1 | |
Freetype Freetype | =2.0.2 | |
Freetype Freetype | =2.0.3 | |
Freetype Freetype | =2.0.4 | |
Freetype Freetype | =2.0.5 | |
Freetype Freetype | =2.0.6 | |
Freetype Freetype | =2.0.7 | |
Freetype Freetype | =2.0.8 | |
Freetype Freetype | =2.0.9 | |
Freetype Freetype | =2.1 | |
Freetype Freetype | =2.1.3 | |
Freetype Freetype | =2.1.4 | |
Freetype Freetype | =2.1.5 | |
Freetype Freetype | =2.1.6 | |
Freetype Freetype | =2.1.7 | |
Freetype Freetype | =2.1.8 | |
Freetype Freetype | =2.1.8-rc1 | |
Freetype Freetype | =2.1.9 | |
Freetype Freetype | =2.1.10 | |
Freetype Freetype | =2.2.0 | |
Freetype Freetype | =2.2.1 | |
Freetype Freetype | =2.3.0 | |
Freetype Freetype | =2.3.1 | |
Freetype Freetype | =2.3.2 | |
Freetype Freetype | =2.3.3 | |
Freetype Freetype | =2.3.4 | |
Freetype Freetype | =2.3.5 | |
Freetype Freetype | =2.3.6 | |
Freetype Freetype | =2.3.7 | |
Freetype Freetype | =2.3.8 | |
Freetype Freetype | =2.3.9 | |
Freetype Freetype | =2.3.10 | |
Freetype Freetype | =2.3.11 | |
Freetype Freetype | =2.3.12 | |
Freetype Freetype | =2.4.0 | |
Freetype Freetype | =2.4.1 | |
Freetype Freetype | =2.4.2 | |
Freetype Freetype | =2.4.3 | |
Freetype Freetype | =2.4.4 | |
Freetype Freetype | =2.4.5 | |
Freetype Freetype | =2.4.6 | |
Freetype Freetype | =2.4.7 | |
Mozilla Firefox Mobile | <=10.0.3 | |
Mozilla Firefox Mobile | =1.0 | |
Mozilla Firefox Mobile | =4.0 | |
Mozilla Firefox Mobile | =4.0-beta1 | |
Mozilla Firefox Mobile | =4.0-beta2 | |
Mozilla Firefox Mobile | =4.0-beta3 | |
Mozilla Firefox Mobile | =4.0-beta4 | |
Mozilla Firefox Mobile | =5.0 | |
Mozilla Firefox Mobile | =6.0 | |
Mozilla Firefox Mobile | =6.0.1 | |
Mozilla Firefox Mobile | =6.0.2 | |
Mozilla Firefox Mobile | =7.0 | |
Mozilla Firefox Mobile | =8.0 | |
Mozilla Firefox Mobile | =9.0 | |
Mozilla Firefox Mobile | =10.0 | |
Mozilla Firefox Mobile | =10.0.1 | |
Mozilla Firefox Mobile | =10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.