Gentoo Linux Security Advisory 201006-14 - A heap-based buffer overflow in the Newt library might allow remote, user-assisted attackers to execute arbitrary code. Miroslav Lichvar reported that Newt is prone to a heap-based buffer overflow in textbox.c. Versions less than 0.52.10-r1 are affected.
d26dd5ce18cb42e1188a02715aaf676e3ad92b9d358481af0a4e4f52703424a4
VMware Security Advisory - Updates have been issues for ESX Service Console newt, nfs-utils, and glib2 packages. vMA updates for newt, nfs-util, glib2, kpartx, libvolume-id, device-mapper-multipath, fipscheck, dbus, dbus-libs, ed, openssl, bind, expat, openssh, ntp and kernel packages have also been issued.
0ae5770077c762418cfd24f3ee041e3030eda4c4cf779c13c8b5a0c5d3c879ca
Mandriva Linux Security Advisory 2009-249 - A heap-based buffer overflow flaw was found in the way newt processes content that is to be displayed in a text dialog box. A local attacker could issue a specially-crafted text dialog box display request (direct or via a custom application), leading to a denial of service (application crash) or, potentially, arbitrary code execution with the privileges of the user running the application using the newt library. This update provides a solution to this vulnerability. Packages for 2008.0 are being provided due to extended support for Corporate products.
26b658d0a05250bbe7b160ea6507527db8763b67a61be417a6a94d04698278b4
Mandriva Linux Security Advisory 2009-249 - A heap-based buffer overflow flaw was found in the way newt processes content that is to be displayed in a text dialog box. A local attacker could issue a specially-crafted text dialog box display request (direct or via a custom application), leading to a denial of service (application crash) or, potentially, arbitrary code execution with the privileges of the user running the application using the newt library. This update provides a solution to this vulnerability.
5a8d696b1d8c9730946ced0e5d8d9d1083dd141321c71aee601072d28fae0143
Debian Security Advisory 1894-1 - Miroslav Lichvar discovered that newt, a windowing toolkit, is prone to a buffer overflow in the content processing code, which can lead to the execution of arbitrary code.
96323d6582be083e70c7ddf004194f5155a8cf56bd6df2b1cad95f09f821ffb1
Ubuntu Security Notice USN-837-1 - Miroslav Lichvar discovered that Newt incorrectly handled rendering in a text box. An attacker could exploit this and cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program.
ceb74117bb882a05caa0cd032d138bd04bde11aa8d88d8b0405db872f9ecdc9d