Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-4326

Опубликовано: 20 дек. 2019
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2019-4326: fribidi security update (IMPORTANT)

[1.0.2-1.1]

  • Security fix for CVE-2019-18397 Resolves: rhbz#1781224

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

fribidi

1.0.2-1.el7_7.1

fribidi-devel

1.0.2-1.el7_7.1

Oracle Linux x86_64

fribidi

1.0.2-1.el7_7.1

fribidi-devel

1.0.2-1.el7_7.1

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
redhat
больше 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
nvd
около 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
debian
около 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() functio ...

suse-cvrf
больше 4 лет назад

Security update for fribidi