Integer signedness error in Java SE Development Kit (JDK) and Java Runtime
Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier,
allows remote attackers to access files or execute arbitrary code via
crafted glyph descriptions in a Type1 font, which bypasses a signed
comparison and triggers a buffer overflow.
kees> RedHat lists this as "OpenJDK: Type1 font processing buffer overflow vulnerability" and bug 492302.
kees> Sun's bug seems to be 6804999, from http://sunsolve.sun.com/search/document.do?assetkey=1-26-254571-1
(Sun Java only)
Updated: 2015-10-17 03:32:16 UTC (commit 10086)