diff options
author | Koop Mast <kwm@FreeBSD.org> | 2011-08-11 08:37:56 +0000 |
---|---|---|
committer | Koop Mast <kwm@FreeBSD.org> | 2011-08-11 08:37:56 +0000 |
commit | 89dc774c20aa8ea81df9a125d7271b282adb6e4e (patch) | |
tree | 96f3152990b67a529b6298dcf1b81cce11832aea | |
parent | 9228f960148d3a9967c30600205d41f6f134b6f8 (diff) | |
download | ports-89dc774c20aa8ea81df9a125d7271b282adb6e4e.tar.gz ports-89dc774c20aa8ea81df9a125d7271b282adb6e4e.zip |
Notes
-rw-r--r-- | security/vuxml/vuln.xml | 59 |
1 files changed, 59 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7d7acfa2ebdd..0d1d06aa3b89 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,65 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="304409c3-c3ef-11e0-8aa5-485d60cb5385"> + <topic>libXfont -- possible local privilege escalation</topic> + <affects> + <package> + <name>libXfont</name> + <range><lt>1.4.4,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Tomas Hoger reports:</p> + <blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=725760"> + <p>The compress/ LZW decompress implentation does notcorrectly handle + compressed streams that contain code words that were not yet added + to the decompression table. This may lead to arbitrary memory + corruption. Successfull exploitation may possible lead to a local + privilege escalation.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-2895</cvename> + <url>https://bugzilla.redhat.com/show_bug.cgi?id=725760</url> + </references> + <dates> + <discovery>2011-07-26</discovery> + <entry>2011-08-11</entry> + </dates> + </vuln> + + <vuln vid="5d374b01-c3ee-11e0-8aa5-485d60cb5385"> + <topic>freetype2 -- execute arbitrary code or cause denial of service</topic> + <affects> + <package> + <name>freetype2</name> + <range><lt>2.4.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Vincent Danen reports:</p> + <blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0226"> + <p>Due to an error within the t1_decoder_parse_charstrings() function + (src/psaux/t1decode.c) and can be exploited to corrupt memory by + tricking a user into processing a specially-crafted postscript + type1 font in an application that uses the freetype library.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-0226</cvename> + <url>https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0226</url> + </references> + <dates> + <discovery>2011-07-19</discovery> + <entry>2011-08-11</entry> + </dates> + </vuln> + <vuln vid="2c12ae0c-c38d-11e0-8eb7-001b2134ef46"> <topic>linux-flashplugin -- multiple vulnerabilities</topic> <affects> |