https://bugzilla.redhat.com/show_bug.cgi?id=1262377

            Bug ID: 1262377
           Summary: freetype: Infinite loop in parse_encoding in t1load.c
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: low
          Priority: low
          Assignee: security-response-t...@redhat.com
          Reporter: ama...@redhat.com
                CC: beh...@fedoraproject.org, erik-fed...@vanpienbroek.nl,
                    fedora-mi...@lists.fedoraproject.org,
                    fonts-b...@lists.fedoraproject.org,
                    ke...@tigcc.ticalc.org, lfar...@lfarkas.org,
                    mka...@redhat.com, rjo...@redhat.com



If the Postscript stream contains a broken number-with-base (e.g. "8#garbage")
the cursor doesn't advance and parse_encoding enters an infinite loop.

Upstream patch:

http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75

CVE request:

http://seclists.org/oss-sec/2015/q3/537

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=Q45dqAndJZ&a=cc_unsubscribe
_______________________________________________
mingw mailing list
mingw@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/mingw

Reply via email to