About the security content of the iOS 3.2.2 Update for iPad
This document describes the security content of the iOS 3.2.2 Update for iPad, which can be downloaded and installed using iTunes.
This document describes the security content of the iOS 3.2.2 Update for iPad, which can be downloaded and installed using iTunes.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates".
iOS 3.2.2 Update for iPad
FreeType
CVE-ID: CVE-2010-1797
Available for: iOS 3.2 and 3.2.1 for iPad
Impact: Viewing a PDF document with maliciously crafted embedded fonts may allow arbitrary code execution
Description: A stack buffer overflow exists in FreeType's handling of CFF opcodes. Viewing a PDF document with maliciously crafted embedded fonts may allow arbitrary code execution. This issue is addressed through improved bounds checking.
IOSurface
CVE-ID: CVE-2010-2973
Available for: iOS 3.2 and 3.2.1 for iPad
Impact: Malicious code running as the user may gain system privileges
Description: An integer overflow exists in the handling of IOSurface properties, which may allow malicious code running as the user to gain system privileges. This issue is addressed through improved bounds checking.
Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.