|
Message-ID: <4F567653.4080009@redhat.com> Date: Tue, 06 Mar 2012 13:40:51 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Jan Lieskovsky <jlieskov@...hat.com>, "Steven M. Christey" <coley@...us.mitre.org>, Mateusz Jurczyk <mjurczyk@...gle.com>, Werner Lemberg <wl@....org>, Moritz Muehlenhoff <jmm@...ian.org>, Moritz Muehlenhoff <jmm@...til.org> Subject: Re: CVE Request -- FreeType: Multiple security flaws to be fixed in v2.4.9 On 03/06/2012 12:57 PM, Jan Lieskovsky wrote: > Hello Kurt, Steve, vendors, A summary will also be posted at the end of this email. I gotta say this is the best mass CVE request I've ever seen! > we have been notified by Mateusz Jurczyk of the Google Security Team, > about the following FreeType security flaws, which are going to be fixed > in v2.4.9 version. > > Credit: Mateusz Jurczyk, Google Security Team > > Note: Though some the issues below might look like related / the same, I > have > checked that each of them exclude themselves (IOW each of them is > different > issue like the another. But was lazy to cross-reference those, > which of them > is different from which another. > > Reproducers are attached to relevant upstream bug reports. > > Have Cc-ed Werner Lemberg of FreeType upstream on this post too, > so he could > collect CVE identifiers prior FreeType v2.4.9 release. > > Yet, requesting CVE identifier even for the NULL ptr dereference > and floating > point exception / integer divide by zero issue below, even if Red > Hat would not > consider these to be security flaws. But other distributions might > be doing so, > thus will let Steve to decide, if these two desire CVE identifiers > or not. > > And finally, due the count of the issues, not including full > issues description > under each entry (to shorten the request). Only particular Red Hat > Bugzilla entry > summary is included with relevant links to upstream bugs and > commits. Further issue > description can be found under particular Red Hat Bugzilla entry > for each of them > in initial comment (#c0). > > Kurt, Steve, could you allocate CVE identifiers for these? > > Thank you && Regards, Jan. > -- > Jan iankko Lieskovsky / Red Hat Security Response Team > > > > > Issue #1: > ========= > freetype: Out-of heap-based buffer read by parsing, adding properties > in BDF > fonts, or validating if property being an atom (FU#35597, FU#35598) > > Upstream bug reports: > [1] https://savannah.nongnu.org/bugs/?35597 > [2] https://savannah.nongnu.org/bugs/?35598 > > Upstream patch: > [3] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=320d4976d1d010b5abe9d61a7423d8ca06bc34df > > > Red Hat Bugzilla entry: > [4] https://bugzilla.redhat.com/show_bug.cgi?id=800581 Please use CVE-2012-1126 for this issue. > Issue #2: > ========= > freetype: Out-of heap-based buffer read by parsing glyph information and > bitmaps for BDF fonts (FU#35599, FU#35600) > > Upstream bug reports: > [1] https://savannah.nongnu.org/bugs/?35599 > [2] https://savannah.nongnu.org/bugs/?35600 > > Upstream patch: > [3] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0b1c0c6b20bf121096afff206d570f26183402b3 > > > Red Hat Bugzilla entry: > [4] https://bugzilla.redhat.com/show_bug.cgi?id=800583 Please use CVE-2012-1127 for this issue. > Issue #3: > ========= > freetype: NULL pointer dereference by moving zone2 pointer point for > certain > TrueType font (FU#35601) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35601 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=96cddb8d1d32d6738b06552083db9d6cee5b5cb4 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800584 Please use CVE-2012-1128 for this issue. > Issue #4: > ========= > freetype: Out-of heap-based buffer read when parsing certain SFNT strings > by Type42 font parser (FU#35602) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35602 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=82365c0dead99dd119d9e7117cf4f36ce1d1cbe1 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800585 Please use CVE-2012-1129 for this issue. > Issue #5: > ========= > freetype: Out-of heap-based buffer read by loading properties of PCF > fonts (FU#35603) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35603 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c776fc17bfeaa607405fc96620e9445e7a0965c3 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800587 Please use CVE-2012-1130 for this issue. > Issue #6: > ========= > freetype (64-bit specific): Out-of heap-based buffer read by attempt to > record current cell into the cell table (FU#35604) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35604 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=fcbc82e69e7b114b0db75e955896107d611898e6 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800589 Please use CVE-2012-1131 for this issue. > Issue #7: > ========= > freetype: Out-of heap-based buffer read flaw in Type1 font loader by > parsing font dictionary entries (FU#35606) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35606 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=58cbc465d2ccd904dee755cff791fbb3a866646d > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800590 Please use CVE-2012-1132 for this issue. > Issue #8: > ========= > freetype: Out-of heap-based buffer write by parsing BDF glyph information > and bitmaps (FU#35607) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35607 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=28dd2c45957278e962f95633157b6139de8170aa > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800591 Please use CVE-2012-1133 for this issue. > Issue #9: > ========= > freetype: Out-of heap-based buffer write in Type1 font parser by > retrieving > font's private dictionary (FU#35608) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35608 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=d9577add645c8c05460c7d60ad486c021394b82e > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800592 Please use CVE-2012-1134 for this issue. > Issue #10: > ========== > freetype: Out-of heap-based buffer read in TrueType bytecode interpreter > by executing NPUSHB and NPUSHW instructions (FU#35640) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35640 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5dddcc45a03b336860436a180aec5b358517336b > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800593 Please use CVE-2012-1135 for this issue. > Issue #11: > ========== > freetype: Out-of heap-based buffer write by parsing BDF glyph and bitmaps > information with missing ENCODING field (FU#35641) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35641 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=4086fb7caf41e33137e548e43a49a97b127cd369 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800594 Please use CVE-2012-1136 for this issue. > Issue #12: > ========== > freetype: Out-of heap-based buffer read by parsing BDF font header > (FU#35643) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35643 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=cee5d593582801f65c5e127d9de9ca24ebcdc747 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800595 Please use CVE-2012-1137 for this issue. > Issue #13: > ========== > freetype: Out-of heap-based buffer read in the TrueType bytecode > interpreter by executing the MIRP instruction (FU#35646) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35646 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a33c013fe2dc6e65de2879682201d9c155292349 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800597 Please use CVE-2012-1138 for this issue. > Issue #14: > ========== > freetype: Array index error, leading to out-of stack based buffer > read by parsing BDF font glyph information (FU#35656) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35656 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6ac022dc750d95296a6f731b9594f2e751d997fa > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800598 Please use CVE-2012-1139 for this issue. > Issue #15: > ========== > freetype: Out-of heap-based buffer read by conversion of PostScript > font objects (FU#35657) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35657 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=292144b44a15c1a72f2ef76475d65b7a3a3fba67 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800600 Please use CVE-2012-1140 for this issue. > Issue #16: > ========== > freetype: Out-of heap-based buffer read flaw by conversion of an ASCII > string into a signed short integer by processing BDF fonts (FU#35658) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35658 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=d9c1659610f9cd5e103790cb5963483d65cf0d2d > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800602 Please use CVE-2012-1141 for this issue. > Issue #17: > ========== > freetype: Out-of heap-based buffer write by retrieval of advance values > for glyph outlines (FU#35659) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35659 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d35a7dc7cc621538a1f4a63c83ebf223aace0b0 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800604 Please use CVE-2012-1142 for this issue. > Issue #18: > ========== > freetype: Integer divide by zero by performing arithmetic > computations for certain fonts (FU#35660) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35660 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ba67957d5ead443f4b6b31805d6e780d54361ca4 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800606 Please use CVE-2012-1143 for this issue. > Issue #19: > ========== > freetype: Out-of heap-based buffer write in the TrueType bytecode > interpreter by moving zone2 pointer point (FU#35689) > > Upstream bug report: > [1] https://savannah.nongnu.org/bugs/?35689 > > Upstream patch: > [2] > http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0fc8debeb6c2f6a8a9a2b97332a7c8a0a1bd9e85 > > > Red Hat Bugzilla entry: > [3] https://bugzilla.redhat.com/show_bug.cgi?id=800607 Please use CVE-2012-1144 for this issue. Summary: CVE-2012-1126 FreeType 2.4.8 Out-of heap-based buffer read by parsing, adding properties in BDF CVE-2012-1127 FreeType 2.4.8 Out-of heap-based buffer read by parsing glyph information and bitmaps for BDF fonts CVE-2012-1128 FreeType 2.4.8 NULL pointer dereference by moving zone2 pointer point for certain TrueType font CVE-2012-1129 FreeType 2.4.8 Out-of heap-based buffer read when parsing certain SFNT strings by Type42 font parser CVE-2012-1130 FreeType 2.4.8 Out-of heap-based buffer read by loading properties of PCF fonts CVE-2012-1131 FreeType 2.4.8 freetype (64-bit specific): Out-of heap-based buffer read by attempt to record current cell into the cell table CVE-2012-1132 FreeType 2.4.8 Out-of heap-based buffer read flaw in Type1 font loader by parsing font dictionary entries CVE-2012-1133 FreeType 2.4.8 Out-of heap-based buffer write by parsing BDF glyph information and bitmaps CVE-2012-1134 FreeType 2.4.8 Out-of heap-based buffer write in Type1 font parser by retrieving font's private dictionary CVE-2012-1135 FreeType 2.4.8 Out-of heap-based buffer read in TrueType bytecode interpreter by executing NPUSHB and NPUSHW instructions CVE-2012-1136 FreeType 2.4.8 Out-of heap-based buffer write by parsing BDF glyph and bitmaps information with missing ENCODING field CVE-2012-1137 FreeType 2.4.8 Out-of heap-based buffer read by parsing BDF font header CVE-2012-1138 FreeType 2.4.8 Out-of heap-based buffer read in the TrueType bytecode interpreter by executing the MIRP instruction CVE-2012-1139 FreeType 2.4.8 Array index error, leading to out-of stack based buffer read by parsing BDF font glyph information CVE-2012-1140 FreeType 2.4.8 Out-of heap-based buffer read by conversion of PostScript font objects CVE-2012-1141 FreeType 2.4.8 Out-of heap-based buffer read flaw by conversion of an ASCII string into a signed short integer by processing BDF fonts CVE-2012-1142 FreeType 2.4.8 Out-of heap-based buffer write by retrieval of advance values for glyph outlines CVE-2012-1143 FreeType 2.4.8 Integer divide by zero by performing arithmetic computations for certain fonts CVE-2012-1144 FreeType 2.4.8 Out-of heap-based buffer write in the TrueType bytecode interpreter by moving zone2 pointer point -- Kurt Seifried Red Hat Security Response Team (SRT)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.