First published: Fri Jul 09 2010(Updated: )
Robert Swiecki reported an integer overflow flaw in freetype with how it processes certain fonts. This could cause applications linked against freetype to crash or, possibly, lead to the execution of arbitrary code if an attacker were able to get a victim to load a malicious font file. The code in question goes back to the version of freetype in Red Hat Enterprise Linux 3, and can only be triggered when MALLOC_CHECK_=3 is set. This issue has been given the name <a href="https://access.redhat.com/security/cve/CVE-2010-2500">CVE-2010-2500</a>. Upstream bug reports: <a href="http://savannah.nongnu.org/bugs/index.php?30263">http://savannah.nongnu.org/bugs/index.php?30263</a> Upstream commit that fixes the issue: <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee</a> Acknowledgements: Red Hat would like to thank Robert Święcki of the Google Security Team for the discovery of this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType | >=0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-613167 is considered critical due to the potential for application crashes and arbitrary code execution.
To fix REDHAT-BUG-613167, update the freetype package to the latest available version provided by Red Hat.
If REDHAT-BUG-613167 is not addressed, it may allow attackers to execute arbitrary code on the affected system.
REDHAT-BUG-613167 affects systems that use the freetype library, especially if they process malicious font files.
REDHAT-BUG-613167 was reported by security researcher Robert Swiecki.