Bug 1980

Summary: CVE-2010-4259 FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header
Product: Mageia Reporter: Nicolas Vigier <boklm>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact:
Severity: normal    
Priority: Normal CC: dmorganec, doktor5000, eeeemail, jani.valimaa, pterjan, qa-bugs, sysadmin-bugs, thomas
Version: 1Keywords: validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Source RPM: fontforge-1.0-0.20090923.5.mga1.src.rpm CVE:
Status comment:

Description Nicolas Vigier 2011-06-30 23:51:47 CEST
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4259

Stack-based buffer overflow in FontForge 20100501 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long CHARSET_REGISTRY header in a BDF font file. 

exploit :
http://www.securityfocus.com/bid/45162/exploit

Patch from redhat bugzilla :
https://bugzilla.redhat.com/attachment.cgi?id=464658
https://bugzilla.redhat.com/show_bug.cgi?id=659359
Manuel Hiebel 2011-08-30 10:03:54 CEST

CC: (none) => boklm, jani.valimaa, pterjan, thomas

Comment 1 Florian Hubold 2011-09-03 18:39:16 CEST
Taking this one.

CC: (none) => doktor5000
Assignee: bugsquad => doktor5000

Florian Hubold 2011-09-03 18:39:26 CEST

Status: NEW => ASSIGNED

Comment 2 Florian Hubold 2011-09-03 20:29:49 CEST
Should be fixed. Also needed to fix compilation with python-2.7. Please tell me how to proceed, as this is my first security update. I think the only thing missing from the commit is subrel.

I've tested that the old fontforge package was affected by that CVE, it crashed when opening the exploit: http://www.securityfocus.com/data/vulnerabilities/exploits/45162.poc

After applying the patch, it does not crash anymore but displays the font table, this is on x86_64.

Advisory:

This security update fixes CVE-2010-4259: "Stack-based buffer overflow in FontForge 20100501 allows remote attackers to
cause a denial of service (application crash) or possibly execute arbitrary
code via a long CHARSET_REGISTRY header in a BDF font file."
Remco Rijnders 2011-09-05 07:57:44 CEST

CC: (none) => qa-bugs

Comment 3 claire robinson 2011-09-05 09:53:50 CEST
This is not on the testing repo's to test yet Florian, can you check please.

CC: (none) => eeeemail

Comment 4 claire robinson 2011-09-05 10:37:20 CEST
Confirmed POC crash in existing version but need the update candidate to test the fix. Thanks.
Comment 5 Florian Hubold 2011-09-05 13:01:36 CEST
Yes, i know it is not in updates_testing as this was not submitted yet,
as i'm waiting for my mentor to review this security fix.

I would have assigned it to QA if it would be ready for testing.
Sorry for the delay, but can't do anything about that.
Comment 6 claire robinson 2011-09-05 15:06:39 CEST
Ahh that'll be why then :o)

QA was added to CC so it came through for testing. Ready when you are.
Comment 7 Manuel Hiebel 2011-09-05 21:30:25 CEST
fontforge is now in updates_testing
Manuel Hiebel 2011-09-05 21:30:47 CEST

Assignee: doktor5000 => qa-bugs

Comment 8 Florian Hubold 2011-09-05 21:33:13 CEST
Damn you're fast, you posted before i could, i even had the bug already open :)
Comment 9 Florian Hubold 2011-09-05 21:34:11 CEST
Also, can somebody please check if the cauldron fontforge packages are also affected?
Comment 10 claire robinson 2011-09-06 10:25:59 CEST
Crash reproduced and fix tested x86_64.

I don't have a cauldron setup to check that Florian, sorry.
Comment 11 claire robinson 2011-09-06 13:38:24 CEST
i586 tested Ok

Update Validated



Advisory:

----------

This security update fixes CVE-2010-4259: "Stack-based buffer overflow in FontForge 20100501 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long CHARSET_REGISTRY header in a BDF font file."

----------

Source RPM: fontforge-1.0-0.20090923.5.1.mga1.src.rpm


Could somebody from sysadmin please push this from core/updates_testing to core/updates.

Thankyou!

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 12 D Morgan 2011-09-06 14:48:38 CEST
update pushed.

Status: ASSIGNED => RESOLVED
CC: (none) => dmorganec
Resolution: (none) => FIXED

Comment 13 Florian Hubold 2011-09-06 16:44:20 CEST
Can somebody please check if Cauldron is affected?

Status: RESOLVED => REOPENED
Resolution: FIXED => (none)

Comment 14 D Morgan 2011-09-06 23:53:00 CEST
i look now
Comment 15 D Morgan 2011-09-07 00:09:54 CEST
OK in cauldron.

Status: REOPENED => RESOLVED
Resolution: (none) => FIXED

Nicolas Vigier 2014-05-08 18:04:51 CEST

CC: boklm => (none)