Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0607

Опубликовано: 05 авг. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0607: freetype security update (IMPORTANT)

[2.1.1-26]

  • Add freetype-2.2.1-CVE-2010-1797.patch
  • Resolves: #CVE-2010-1797

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

freetype

2.2.1-26.el5_5

freetype-demos

2.2.1-26.el5_5

freetype-devel

2.2.1-26.el5_5

Oracle Linux x86_64

freetype

2.2.1-26.el5_5

freetype-demos

2.2.1-26.el5_5

freetype-devel

2.2.1-26.el5_5

Oracle Linux i386

freetype

2.2.1-26.el5_5

freetype-demos

2.2.1-26.el5_5

freetype-devel

2.2.1-26.el5_5

Связанные CVE

Связанные уязвимости

ubuntu
почти 15 лет назад

Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.

redhat
почти 15 лет назад

Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.

nvd
почти 15 лет назад

Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.

debian
почти 15 лет назад

Multiple stack-based buffer overflows in the cff_decoder_parse_charstr ...

github
около 3 лет назад

Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.