lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200606121811.k5CIB0Wi000839@lambchop.rdu.rpath.com> Date: Mon Jun 12 19:11:11 2006 From: jmforbes at rpath.com (Justin M. Forbes) Subject: rPSA-2006-0100-1 freetype rPath Security Advisory: 2006-0100-1 Published: 2006-06-12 Products: rPath Linux 1 Rating: Major Exposure Level Classification: User Non-deterministic Weakness Updated Versions: freetype=/conary.rpath.com@rpl:devel//1/2.1.10-2.2-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661 http://issues.rpath.com/browse/RPL-429 Description: Previous versions of the freetype library contain multiple integer overflow weaknesses which allow remote providers of font files (which may include fonts embedded in documents such as PDF files) to cause applications to crash, and may possibly also allow them to execute arbitrary code as the user accessing the files.