On Thu, Dec 22, 2011 at 11:54 AM, Tyler Hicks <tyhi...@canonical.com> wrote:
> Package: t1lib
> Version: 5.1.2-3
> Severity: grave
> Tags: patch security
> Justification: user security hole
> User: ubuntu-de...@lists.ubuntu.com
> Usertags: origin-ubuntu precise ubuntu-patch
>
>
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
>
> *** /tmp/tmpP7Dzmm
> In Ubuntu, the attached patch was applied to achieve the following:
>
> Prevents an invalid pointer from being dereferenced when using a
> maliciously crafted font.
>
>  * SECURITY UPDATE: Arbitrary code execution via crafted Type 1 font
>    - lib/type1/type1.c: Only use ppoints when it is a valid pointer
>    - CVE-2011-0764

Hi,

Thanks for sending the patch this way.  Do you have any idea how this
CVE relates to CVE-2011-1552 through CVE-2011-1554 [0]?  According to
mitre's description they are all "different vulnerability than
CVE-2011-0764", but then the only useful reference is a link to the
CVE-2011-0764 toucan advisory.

Best wishes,
Mike

[0] http://security-tracker.debian.org/tracker/source-package/t1lib



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to