Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Freetype
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Freetype
ID: USN-1686-1
Distribution: Ubuntu
Plattformen: Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 11.10, Ubuntu 12.04 LTS, Ubuntu 12.10
Datum: Di, 15. Januar 2013, 07:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670
Applikationen: Freetype

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============5856201033857285533==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enigEBD672DFAC1EBC169CF09CD2"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigEBD672DFAC1EBC169CF09CD2
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1686-1
January 14, 2013

freetype vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS

Summary:

FreeType could be made to crash or run programs as your login if it opened
a specially crafted file.

Software Description:
- freetype: FreeType 2 is a font engine library

Details:

Mateusz Jurczyk discovered that FreeType did not correctly handle certain
malformed BDF font files. If a user were tricked into using a specially
crafted font file, a remote attacker could cause FreeType to crash or
possibly execute arbitrary code with user privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
libfreetype6 2.4.10-0ubuntu1.1

Ubuntu 12.04 LTS:
libfreetype6 2.4.8-1ubuntu2.1

Ubuntu 11.10:
libfreetype6 2.4.4-2ubuntu1.3

Ubuntu 10.04 LTS:
libfreetype6 2.3.11-1ubuntu2.7

Ubuntu 8.04 LTS:
libfreetype6 2.3.5-1ubuntu4.8.04.10

After a standard system update you need to restart your session to make all
the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1686-1
CVE-2012-5668, CVE-2012-5669, CVE-2012-5670

Package Information:
https://launchpad.net/ubuntu/+source/freetype/2.4.10-0ubuntu1.1
https://launchpad.net/ubuntu/+source/freetype/2.4.8-1ubuntu2.1
https://launchpad.net/ubuntu/+source/freetype/2.4.4-2ubuntu1.3
https://launchpad.net/ubuntu/+source/freetype/2.3.11-1ubuntu2.7
https://launchpad.net/ubuntu/+source/freetype/2.3.5-1ubuntu4.8.04.10



--------------enigEBD672DFAC1EBC169CF09CD2
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=SGKu
-----END PGP SIGNATURE-----

--------------enigEBD672DFAC1EBC169CF09CD2--


--===============5856201033857285533==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============5856201033857285533==--
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung