Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 407257 (CVE-2012-1126) - <media-libs/freetype-2.4.9 Multiple Vulnerabilities (CVE-2012-{1126,1127,1128,1129,1130,1131,1132,1133,1134,1135,1136,1137,1138,1139,1140,1141,1142,1143,1144})
Summary: <media-libs/freetype-2.4.9 Multiple Vulnerabilities (CVE-2012-{1126,1127,1128...
Status: RESOLVED FIXED
Alias: CVE-2012-1126
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B2 [glsa]
Keywords:
: 407533 (view as bug list)
Depends on:
Blocks:
 
Reported: 2012-03-07 11:16 UTC by Michael Harrison
Modified: 2012-04-17 23:12 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michael Harrison 2012-03-07 11:16:28 UTC
An out-of heap-based buffer read flaw was found in
the way FreeType font rendering engine performed:
1) adding of properties,
2) parsing of properties,
3) checking if particular property is an atom

for Glyph bitmap distribution format (BDF) fonts. A remote attacker could
provide a specially-crafted BDF font file, which once processed in an
application linked against FreeType would lead to that application crash.

Upstream bug reports:
[1] https://savannah.nongnu.org/bugs/?35597
[2] https://savannah.nongnu.org/bugs/?35598

Upstream patch:
[3]
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=320d4976d1d010b5abe9d61a7423d8ca06bc34df
Comment 1 Michael Harrison 2012-03-07 11:28:44 UTC
CVE-2012-1126 FreeType 2.4.8 Out-of heap-based buffer read by parsing,
adding properties in BDF

CVE-2012-1127 FreeType 2.4.8 Out-of heap-based buffer read by parsing
glyph information and bitmaps for BDF fonts

CVE-2012-1128 FreeType 2.4.8 NULL pointer dereference by moving zone2
pointer point for certain TrueType font

CVE-2012-1129 FreeType 2.4.8 Out-of heap-based buffer read when parsing
certain SFNT strings by Type42 font parser

CVE-2012-1130 FreeType 2.4.8 Out-of heap-based buffer read by loading
properties of PCF fonts

CVE-2012-1131 FreeType 2.4.8 freetype (64-bit specific): Out-of
heap-based buffer read by attempt to record current cell into the cell table

CVE-2012-1132 FreeType 2.4.8 Out-of heap-based buffer read flaw in Type1
font loader by parsing font dictionary entries

CVE-2012-1133 FreeType 2.4.8 Out-of heap-based buffer write by parsing
BDF glyph information and bitmaps

CVE-2012-1134 FreeType 2.4.8 Out-of heap-based buffer write in Type1
font parser by retrieving font's private dictionary

CVE-2012-1135 FreeType 2.4.8 Out-of heap-based buffer read in TrueType
bytecode interpreter by executing NPUSHB and NPUSHW instructions

CVE-2012-1136 FreeType 2.4.8 Out-of heap-based buffer write by parsing
BDF glyph and bitmaps information with missing ENCODING field

Sorry guys, not sure if I missed this before or I beat the ML
Reference in detail:
http://www.openwall.com/lists/oss-security/2012/03/06/13

CVE-2012-1137 FreeType 2.4.8 Out-of heap-based buffer read by parsing
BDF font header

CVE-2012-1138 FreeType 2.4.8 Out-of heap-based buffer read in the
TrueType bytecode interpreter by executing the MIRP instruction

CVE-2012-1139 FreeType 2.4.8 Array index error, leading to out-of stack
based buffer read by parsing BDF font glyph information

CVE-2012-1140 FreeType 2.4.8 Out-of heap-based buffer read by conversion
of PostScript font objects

CVE-2012-1141 FreeType 2.4.8 Out-of heap-based buffer read flaw by
conversion of an ASCII string into a signed short integer by processing
BDF fonts

CVE-2012-1142 FreeType 2.4.8 Out-of heap-based buffer write by retrieval
of advance values for glyph outlines

CVE-2012-1143 FreeType 2.4.8 Integer divide by zero by performing
arithmetic computations for certain fonts

CVE-2012-1144 FreeType 2.4.8 Out-of heap-based buffer write in the
TrueType bytecode interpreter by moving zone2 pointer point
Comment 2 Sean Amoss (RETIRED) gentoo-dev Security 2012-03-09 14:34:55 UTC
*** Bug 407533 has been marked as a duplicate of this bug. ***
Comment 3 Ryan Hill (RETIRED) gentoo-dev 2012-03-10 01:39:00 UTC
*freetype-2.4.9 (10 Mar 2012)

  10 Mar 2012; Ryan Hill <dirtyepic@gentoo.org> -freetype-2.4.7.ebuild,
  +freetype-2.4.9.ebuild:
  Version bump for CVE-2012-1126, CVE-2012-1127, CVE-2012-1128, CVE-2012-1129,
  CVE-2012-1130, CVE-2012-1131, CVE-2012-1132, CVE-2012-1133, CVE-2012-1134,
  CVE-2012-1135, CVE-2012-1136, CVE-2012-1137, CVE-2012-1138, CVE-2012-1139,
  CVE-2012-1140, CVE-2012-1141, CVE-2012-1142, CVE-2012-1143, and
  CVE-2012-1144 (bug #407533).  You should probably upgrade.
  
  Stop using autotools-utils.eclass (bug #392099).  Remove old.
Comment 4 Aidan Marks 2012-03-10 20:42:20 UTC
Where did the static-libs use flag go in 2.4.9?  splashutils needs this so I can upgrade.
Comment 5 Ryan Hill (RETIRED) gentoo-dev 2012-03-10 20:57:19 UTC
Resync your tree.
Comment 6 Tim Sammut (RETIRED) gentoo-dev 2012-03-11 06:36:33 UTC
Thanks much.

Arches, please test and mark stable:
=media-libs/freetype-2.4.9
Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"
Comment 7 Jeff (JD) Horelick (RETIRED) gentoo-dev 2012-03-11 07:24:48 UTC
x86 stable
Comment 8 Brent Baude (RETIRED) gentoo-dev 2012-03-11 13:53:05 UTC
ppc64 done
Comment 9 Agostino Sarubbo gentoo-dev 2012-03-11 15:39:14 UTC
amd64 stable
Comment 10 Brent Baude (RETIRED) gentoo-dev 2012-03-12 17:34:43 UTC
ppc done
Comment 11 Jeroen Roovers (RETIRED) gentoo-dev 2012-03-13 10:18:14 UTC
Stable for HPPA.
Comment 12 Maxim Kammerer 2012-03-13 15:31:26 UTC
(In reply to comment #11)
> Stable for HPPA.

Please don't break the portage tree.

 * Digest verification failed:
 * /usr/portage/media-libs/freetype/freetype-2.4.9.ebuild
 * Reason: Filesize does not match recorded size
 * Got: 3836
 * Expected: 3840

This is now in latest portage snapshot for 24 hours.
Comment 13 Raúl Porcel (RETIRED) gentoo-dev 2012-03-17 17:40:05 UTC
alpha/arm/ia64/m68k/s390/sh/sparc stable
Comment 14 Sean Amoss (RETIRED) gentoo-dev Security 2012-03-17 18:43:36 UTC
Thanks, everyone. 

These could result in RCE, so re-rating as B2 and filing GLSA request.
Comment 15 GLSAMaker/CVETool Bot gentoo-dev 2012-04-17 23:12:56 UTC
This issue was resolved and addressed in
 GLSA 201204-04 at http://security.gentoo.org/glsa/glsa-201204-04.xml
by GLSA coordinator Sean Amoss (ackle).