|
|
Log in / Subscribe / Register

freetype: arbitrary code execution

Package(s):freetype CVE #(s):CVE-2009-0946
Created:April 28, 2009 Updated:December 7, 2009
Description: From the Ubuntu advisory: Tavis Ormandy discovered that FreeType did not correctly handle certain large values in font files. If a user were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user privileges.
Alerts:
Gentoo 201412-08 insight, perl-tk, sourcenav, tk, partimage, bitdefender-console, mlmmj, acl, xinit, gzip, ncompress, liblzw, splashutils, m4, kdm, gtk+, kget, dvipng, beanstalkd, pmount, pam_krb5, gv, lftp, uzbl, slim, iputils, dvbstreamer 2014-12-11
Mandriva MDVSA-2009:243-2 freetype2 2009-12-05
Mandriva MDVSA-2009:243-1 freetype2 2009-09-22
Mandriva MDVSA-2009:243 freetype2 2009-09-22
Gentoo 200905-05 freetype 2009-05-24
CentOS CESA-2009:1061 freetype 2009-05-22
CentOS CESA-2009:0329 freetype 2009-05-22
Red Hat RHSA-2009:1062-01 freetype 2009-05-22
Red Hat RHSA-2009:1061-02 freetype 2009-05-22
Red Hat RHSA-2009:0329-02 freetype 2009-05-22
SuSE SUSE-SR:2009:010 firefox apport evolution freetype2 java_1_4_2-ibm kdegraphics3 libopenssl libsoup xulrunner opensc python-crypto unbound xpdf 2009-05-12
Debian DSA-1784-1 freetype 2009-04-30
Ubuntu USN-767-1 freetype 2009-04-27

to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds