Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 16 Apr 2009 19:15:41 +0200
From: Tavis Ormandy <taviso@...gle.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
Cc: oss-security@...ts.openwall.com
Subject: Re: FreeType malformed compressed data issue

Hey, you're right, this one was just a non-exploitable crash, the
other issues were regular integer overflow. I didn't report this
particular one as a security issue, but it was fixed at the same time,
sorry for the confusion :-)

Thanks, Tavis.

2009/4/16 Steven M. Christey <coley@...us.mitre.org>:
>
> I'm processing CVE-2009-0946 for the various integer overflows found by
> Tavis Ormandy for FreeType, as captured in:
>
>  https://bugzilla.redhat.com/show_bug.cgi?id=491384
>
> But there's also this commit:
>
>    http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0a05ba257b6ddd87dacf8d54b626e4b360e0a596
>
> This bug doesn't smell exactly like an integer overflow, but there's not
> enough immediate context to tell.  Is this a different bug type?  If so,
> it needs a new CVE.
>
> - Steve
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.