https://bugzilla.redhat.com/show_bug.cgi?id=1262377
Bug ID: 1262377 Summary: freetype: Infinite loop in parse_encoding in t1load.c Product: Security Response Component: vulnerability Keywords: Security Severity: low Priority: low Assignee: security-response-t...@redhat.com Reporter: ama...@redhat.com CC: beh...@fedoraproject.org, erik-fed...@vanpienbroek.nl, fedora-mi...@lists.fedoraproject.org, fonts-b...@lists.fedoraproject.org, ke...@tigcc.ticalc.org, lfar...@lfarkas.org, mka...@redhat.com, rjo...@redhat.com If the Postscript stream contains a broken number-with-base (e.g. "8#garbage") the cursor doesn't advance and parse_encoding enters an infinite loop. Upstream patch: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 CVE request: http://seclists.org/oss-sec/2015/q3/537 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=Q45dqAndJZ&a=cc_unsubscribe _______________________________________________ mingw mailing list mingw@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/mingw