First published: Tue Mar 06 2012(Updated: )
An integer divide by zero was found in the way FreeType font rendering engine performed arithmetic computations for certain fonts. A remote attacker could provide a specially-crafted font file, which once opened in an application linked against FreeType would lead to that application crash. Upstream bug report: [1] <a href="https://savannah.nongnu.org/bugs/?35660">https://savannah.nongnu.org/bugs/?35660</a> Upstream patch: [2] <a href="http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ba67957d5ead443f4b6b31805d6e780d54361ca4">http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ba67957d5ead443f4b6b31805d6e780d54361ca4</a> Acknowledgements: Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
FreeType |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-800606 is considered high due to the potential for remote denial of service.
To fix REDHAT-BUG-800606, you should update FreeType to the latest version where the vulnerability has been patched.
The vulnerability REDHAT-BUG-800606 is caused by an integer divide by zero error in the FreeType font rendering engine.
No, REDHAT-BUG-800606 primarily leads to application crashes rather than data exposure.
Any application that uses the FreeType library and is exposed to malicious specially-crafted font files is affected by REDHAT-BUG-800606.