First published: Fri Jul 09 2010(Updated: )
Robert Swiecki reported an invalid free flaw, that could possibly corrupt the heap, in freetype. This could cause applications linked against freetype to crash (SIGABRT) or, possibly, lead to the execution of arbitrary code if an attacker were able to get a victim to load a malicious font file. The affected code is not present in Red Hat Enterprise Linux 3 (freetype 2.1.4). In Red Hat Enterprise Linux 4 and 5 this code is present, but does not cause a crash. This issue has been given the name <a href="https://access.redhat.com/security/cve/CVE-2010-2498">CVE-2010-2498</a>. Upstream bug report: <a href="http://savannah.nongnu.org/bugs/index.php?30106">http://savannah.nongnu.org/bugs/index.php?30106</a> Upstream commit that fixes the issue: <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2</a> Acknowledgements: Red Hat would like to thank Robert Święcki of the Google Security Team for the discovery of this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | >=2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-613160 is considered high due to its potential to crash applications or allow execution of arbitrary code.
To fix REDHAT-BUG-613160, update the freetype package to the latest version that addresses the invalid free flaw.
Applications linked against freetype versions 2.1.4 and later may be affected by REDHAT-BUG-613160.
REDHAT-BUG-613160 is classified as an invalid free flaw that can lead to heap corruption.
If REDHAT-BUG-613160 is exploited, it could cause application crashes or potentially allow attackers to execute arbitrary code.