CVE-2014-9668

Publication date 8 February 2015

Last updated 24 July 2024


Ubuntu priority

The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.

Status

Package Ubuntu Release Status
freetype 14.10 utopic
Fixed 2.5.2-2ubuntu1.1
14.04 LTS trusty
Fixed 2.5.2-1ubuntu2.4
12.04 LTS precise
Not affected
10.04 LTS lucid
Not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
freetype

References

Related Ubuntu Security Notices (USN)

    • USN-2510-1
    • FreeType vulnerabilities
    • 24 February 2015

Other references