Bug 190693 - freetype memory allocaton integer overflow
freetype memory allocaton integer overflow
Status: CLOSED DUPLICATE of bug 190593
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: freetype (Show other bugs)
4.0
All Linux
high Severity high
: ---
: ---
Assigned To: Carl Worth
Brock Organ
source=vendorsec,reported=20060305,im...
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2006-05-04 11:02 EDT by Josh Bressers
Modified: 2007-11-30 17:07 EST (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2006-05-04 12:42:23 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)
Patch extracted from upstream CVS (57.34 KB, patch)
2006-05-04 11:02 EDT, Josh Bressers
no flags Details | Diff

  None (edit)
Description Josh Bressers 2006-05-04 11:02:37 EDT
Upstream has fixed a number of potential integer overflows when allocating
memory by modifying how memory is now allocated.

The patch take from CVS, then clean up is very large.  I don't know the source
well enough to determine how much of this is needed for our packages.
Comment 1 Josh Bressers 2006-05-04 11:02:39 EDT
Created attachment 128606 [details]
Patch extracted from upstream CVS
Comment 2 Josh Bressers 2006-05-04 12:42:23 EDT
We're including this as part of CVE-2006-1861 so I'm marking this a duplicate of
bug 190593

*** This bug has been marked as a duplicate of 190593 ***
Comment 3 Josh Bressers 2006-05-27 16:46:01 EDT
Lifting embargo

Note You need to log in before you can comment on or make changes to this bug.