First published: Tue Jul 18 2017(Updated: )
An out of bounds read flaw related to "graphite2::Silf::getClassGlyph" has been reported in graphite2. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 | |
debian/graphite2 | 1.3.13-7 1.3.14-1 | |
redhat/graphite2 | <1.3.10 | 1.3.10 |
Mozilla Firefox | <54.0 | |
Graphite | <1.3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7776 has a moderate severity level due to its potential for causing application crashes or disclosing sensitive information.
To resolve CVE-2017-7776, update Firefox to version 118.0.2-1 or Firefox ESR to an acceptable patched version.
CVE-2017-7776 affects Firefox versions prior to 54 and the Graphite2 library versions before 1.3.10.
Yes, CVE-2017-7776 can potentially be exploited by attackers to access sensitive memory remotely.
Yes, to mitigate CVE-2017-7776, you should update Graphite2 to at least versions 1.3.13-7 or 1.3.14-1.