The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a “broken number-with-base” in a Postscript stream, as demonstrated by 8#garbage.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 12.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 15.04 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 7.0 | |
freetype | le | 2.5.2 | |
opensuse | eq | 13.1 |
git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
lists.opensuse.org/opensuse-updates/2015-10/msg00017.html
savannah.nongnu.org/bugs/index.php?41590
www.debian.org/security/2015/dsa-3370
www.securityfocus.com/bid/76727
www.securitytracker.com/id/1033536
www.ubuntu.com/usn/USN-2739-1
bugs.launchpad.net/ubuntu/+source/freetype/+bug/1492124
code.google.com/p/chromium/issues/detail?id=459050