drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in t1lib
Name: |
Mehrere Probleme in t1lib |
|
ID: |
201701-57 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Di, 24. Januar 2017, 07:20 |
|
Referenzen: |
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5244
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0764 |
|
Applikationen: |
t1lib |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --4D7kEgjcN5G898rKrWGOBLo8x3TUFwwFg Content-Type: multipart/mixed; boundary="Dd60eUjPuT2UasR8M2PxN8sardlrN8sQb" From: Aaron Bauman <bman@gentoo.org> To: gentoo-announce@lists.gentoo.org Message-ID: <b05c0b9d-a2dc-94fd-84cb-7863f998e3cb@gentoo.org> Subject: [ GLSA 201701-57 ] T1Lib: : Multiple vulnerabilities
--Dd60eUjPuT2UasR8M2PxN8sardlrN8sQb Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201701-57 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal Title: T1Lib: : Multiple vulnerabilities Date: January 23, 2017 Bugs: #358667 ID: 201701-57
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
Multiple vulnerabilities have been discovered in T1Lib, the worst of which could lead to remote execution of arbitrary code.
Background ==========
T1Lib is a library for rasterizing bitmaps from Adobe Type 1 fonts.
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 media-libs/t1lib < 5.1.2-r1 >= 5.1.2-r1
Description ===========
Multiple vulnerabilities have been discovered in T1Lib. Please review the CVE identifiers referenced below for details.
Impact ======
Remote attackers, by coercing users to process specially crafted AFM font or PDF file, could cause a Denial of Service condition or execute arbitrary code.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All T1Lib users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/t1lib-5.1.2-r1"
References ==========
[ 1 ] CVE-2010-2642 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642 [ 2 ] CVE-2011-0433 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0433 [ 3 ] CVE-2011-0764 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0764 [ 4 ] CVE-2011-1552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1552 [ 5 ] CVE-2011-1553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1553 [ 6 ] CVE-2011-1554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1554 [ 7 ] CVE-2011-5244 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5244
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201701-57
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License =======
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--Dd60eUjPuT2UasR8M2PxN8sardlrN8sQb--
--4D7kEgjcN5G898rKrWGOBLo8x3TUFwwFg Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQJ8BAEBCgBmBQJYhoaRXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ1OTcyRDI4NDhFOEE0NDYwRTdERTY4QUM5 RjI4QkQ4QkQxRTM5NUZGAAoJEJ8ovYvR45X/yYkP/3Ic3KG8rCk0JMrBgbm9NpMi 3sLl7j+ozSYMZ4o72hnBB0DXTHwpgrazXfWp6G2GxFBa3Zs0gQkQe2zU8MuGwOHZ 5UeA63+n8chIAb69fpoRVtE+CPPc+uizDzKzYufzcMx8pqf27oYIyNgK1SV/6e7N ABHnHsNeYvGreTYmNPKWpiYHe04hWFHs0zJu+8/kMlbrqBfAegIZ8ZoGfIF7juhG d2VHM38UWU9FmOCzWnK/BeywXw9GQeLsvNKq8EGJpdtialmV1QQeUqnYW/cL9KU3 ZkbjS17rFPEjary3FCFAHqOn3lsZdLJxhNQetifcthTIFHe9sZCjtc/6Kln/lx5z RCYe24XFzamJDzGiy5Di0defJKHeSIaUt/Q5wGW90q65AuQX57P45yO4htiMNsLn y7GCmWRSGiSHa3jwnw2qjd+QoJJFoZM3PTYRQ9EHvU6RMyR6lrUlCQTVU5OPF9Za gWMujZxiI5CJehxoFDNEnOKlJ/xGcUTG8PQsvnceUByWFJAneZDvWKIxoAajn3zV 4BKlQukUX/XrPEdSIzv9QllsAlOJQTuO8HB0UHamyFQ1aeXwAQ2mbDN92P8ktph1 cO63t+NDSe3k5jFADtBlzOyVGWWXoxdoPkTIoXqnYu6iuplmabk98vOeeGWarWVP +Ebdlsn1vktpNb0prhMe =Jx/Y -----END PGP SIGNATURE-----
--4D7kEgjcN5G898rKrWGOBLo8x3TUFwwFg--
|
|
|
|