{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an \"input sanitization flaw.\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2012-09-05T23:00:00.000Z"},"references":[{"name":"[oss-security] 20110923 Re: CVE Request: X.org ProcRenderGlyps input sanitation issue","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2011/09/23/5"},{"name":"RHSA-2011:1359","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2011-1359.html"},{"name":"RHSA-2011:1360","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2011-1360.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=28801"},{"tags":["x_refsource_CONFIRM"],"url":"http://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718"},{"tags":["x_refsource_CONFIRM"],"url":"http://aix.software.ibm.com/aix/efixes/security/X_advisory2.asc"},{"name":"1026149","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1026149"},{"name":"[oss-security] 20110922 CVE Request: X.org ProcRenderGlyps input sanitation issue","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2011/09/22/8"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T04:02:29.647Z"},"title":"CVE Program Container","references":[{"name":"[oss-security] 20110923 Re: CVE Request: X.org ProcRenderGlyps input sanitation issue","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2011/09/23/5"},{"name":"RHSA-2011:1359","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2011-1359.html"},{"name":"RHSA-2011:1360","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2011-1360.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=28801"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://aix.software.ibm.com/aix/efixes/security/X_advisory2.asc"},{"name":"1026149","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1026149"},{"name":"[oss-security] 20110922 CVE Request: X.org ProcRenderGlyps input sanitation issue","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2011/09/22/8"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2010-4819","state":"PUBLISHED","dateReserved":"2011-08-19T00:00:00.000Z","datePublished":"2012-09-05T23:00:00.000Z","dateUpdated":"2024-08-07T04:02:29.647Z"},"dataType":"CVE_RECORD","dataVersion":"5.1"}