| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <200606121811.k5CIB0Wi000839@lambchop.rdu.rpath.com>
Date: Mon Jun 12 19:11:11 2006
From: jmforbes at rpath.com (Justin M. Forbes)
Subject: rPSA-2006-0100-1 freetype
rPath Security Advisory: 2006-0100-1
Published: 2006-06-12
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
User Non-deterministic Weakness
Updated Versions:
freetype=/conary.rpath.com@rpl:devel//1/2.1.10-2.2-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661
http://issues.rpath.com/browse/RPL-429
Description:
Previous versions of the freetype library contain multiple integer
overflow weaknesses which allow remote providers of font files
(which may include fonts embedded in documents such as PDF files)
to cause applications to crash, and may possibly also allow them
to execute arbitrary code as the user accessing the files.