漏洞信息详情
FreeType 缓冲区错误漏洞
漏洞简介
FreeType是一款使用C语言编写的开源字体渲染库。
FreeType 2.6.1之前版本中的type1/t1parse.c文件的T1_Get_Private_Dict存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://www.freetype.org
参考网址
来源:UBUNTU
链接:https://usn.ubuntu.com/4126-2/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
来源:MISC
链接:https://savannah.nongnu.org/bugs/?45955
来源:git.savannah.gnu.org
链接:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:4254
来源:security-tracker.debian.org
链接:https://security-tracker.debian.org/tracker/DLA-1909-1
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2015-9381
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-has-announced-a-release-for-ibm-security-identity-governance-and-intelligence-in-response-to-security-vulnerabilities-cve-2015-9381-cve-2015-9382/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/FreeType-three-vulnerabilities-30244
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2015-9381
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155706/Red-Hat-Security-Advisory-2019-4254-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3358/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154400/Ubuntu-Security-Notice-USN-4126-2.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4699/
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/44297
受影响实体
暂无
补丁
- FreeType 缓冲区错误漏洞的修复措施<!--2019-9-3-->
还没有评论,来说两句吧...