Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Freetype
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Freetype
ID: USN-2510-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10
Datum: Di, 24. Februar 2015, 22:52
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
Applikationen: Freetype

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2540289765169327062==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="19wT36EBNs6HAjjBJjKtfmTdN0Hmh7uw5"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--19wT36EBNs6HAjjBJjKtfmTdN0Hmh7uw5
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2510-1
February 24, 2015

freetype vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

FreeType could be made to crash or run programs as your login if it opened
a specially crafted file.

Software Description:
- freetype: FreeType 2 is a font engine library

Details:

Mateusz Jurczyk discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
libfreetype6 2.5.2-2ubuntu1.1

Ubuntu 14.04 LTS:
libfreetype6 2.5.2-1ubuntu2.4

Ubuntu 12.04 LTS:
libfreetype6 2.4.8-1ubuntu2.2

Ubuntu 10.04 LTS:
libfreetype6 2.3.11-1ubuntu2.8

After a standard system update you need to restart your session to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2510-1
CVE-2014-9656, CVE-2014-9657, CVE-2014-9658, CVE-2014-9659,
CVE-2014-9660, CVE-2014-9661, CVE-2014-9662, CVE-2014-9663,
CVE-2014-9664, CVE-2014-9665, CVE-2014-9666, CVE-2014-9667,
CVE-2014-9668, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671,
CVE-2014-9672, CVE-2014-9673, CVE-2014-9674, CVE-2014-9675

Package Information:
https://launchpad.net/ubuntu/+source/freetype/2.5.2-2ubuntu1.1
https://launchpad.net/ubuntu/+source/freetype/2.5.2-1ubuntu2.4
https://launchpad.net/ubuntu/+source/freetype/2.4.8-1ubuntu2.2
https://launchpad.net/ubuntu/+source/freetype/2.3.11-1ubuntu2.8



--19wT36EBNs6HAjjBJjKtfmTdN0Hmh7uw5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=0NKe
-----END PGP SIGNATURE-----

--19wT36EBNs6HAjjBJjKtfmTdN0Hmh7uw5--


--===============2540289765169327062==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============2540289765169327062==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung