[Bug 651764] New: CVE-2010-3855 Freetype : Heap based buffer overflow in ft_var_readpackedpoints() [fedora-all]

bugzilla at redhat.com bugzilla at redhat.com
Wed Nov 10 08:58:24 UTC 2010


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.

Summary: CVE-2010-3855 Freetype : Heap based buffer overflow in ft_var_readpackedpoints() [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=651764

           Summary: CVE-2010-3855 Freetype : Heap based buffer overflow in
                    ft_var_readpackedpoints() [fedora-all]
           Product: Fedora
           Version: 13
          Platform: All
        OS/Version: Linux
            Status: NEW
          Keywords: Security, SecurityTracking
          Severity: high
          Priority: high
         Component: freetype
        AssignedTo: mkasik at redhat.com
        ReportedBy: huzaifas at redhat.com
         QAContact: extras-qa at fedoraproject.org
                CC: behdad at fedoraproject.org, kevin at tigcc.ticalc.org,
                    fonts-bugs at lists.fedoraproject.org, mkasik at redhat.com
            Blocks: 645275
    Classification: Fedora
    Target Release: ---



This is an automatically created tracking bug!  It was created to ensure
that one or more security vulnerabilities are fixed in affected Fedora
versions.

For comments that are specific to the vulnerability please use bugs filed
against "Security Response" product referenced in the "Blocks" field.

For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs

When creating a Bodhi update request, please include the bug IDs of the
respective parent bugs filed against the "Security Response" product.
Please mention CVE ids in the RPM changelog when available.

Bodhi update submission link:
https://admin.fedoraproject.org/updates/new/?type_=security&bugs=645275

Please note: this issue affects multiple supported versions of Fedora.
Only one tracking bug has been filed; please only close it when all
affected versions are fixed.


[bug automatically created by: add-tracking-bugs]

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the fonts-bugs mailing list