Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=2a1b4bb97a66fc89f9d92dabde39af2d8eea079a
commit 2a1b4bb97a66fc89f9d92dabde39af2d8eea079a Author: Miklos Vajna <vmik...@frugalware.org> Date: Tue May 31 00:16:19 2011 +0200 FSA724-freetype2 diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index fa62d28..fbcac3f 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,20 @@ <fsas> <fsa> + <id>724</id> + <date>2011-05-31</date> + <author>Miklos Vajna</author> + <package>freetype2</package> + <vulnerable>2.4.2-1</vulnerable> + <unaffected>2.4.2-2nexon1</unaffected> + <bts>http://bugs.frugalware.org/task/4433</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855</cve> + <desc>Some vulnerabilities have been reported in FreeType, which can be exploited to cause a DoS (Denial of Service) or potentially compromise an application using the library. + 1) An error exists in the "ft_var_readpackedpoints()" function in src/truetype/ttgxvar.c when processing TrueType GX fonts and can be exploited to cause a heap-based buffer overflow via a specially crafted font. + 2) An error within the "Ins_SHZ()" function in src/truetype/ttinterp.c when handling the "SHZ" bytecode instruction can be exploited to cause a crash and potentially execute arbitrary code via a specially crafted font.</desc> + </fsa> + <fsa> <id>723</id> <date>2011-05-28</date> <author>Miklos Vajna</author> _______________________________________________ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git