drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in FreeType
Name: |
Denial of Service in FreeType |
|
ID: |
USN-5453-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 ESM |
|
Datum: |
Mo, 30. Mai 2022, 22:50 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406 |
|
Applikationen: |
Freetype |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0253259981305606058== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------fEF6yWMM1BSBjLF84lT7AkBp"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------fEF6yWMM1BSBjLF84lT7AkBp Content-Type: multipart/mixed; boundary="------------egM9wNZnOxIxhzaEw2DSpczY"; protected-headers="v1" From: Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com> Reply-To: security@ubuntu.com To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <9737eaee-4c9e-2f8c-6bab-55dcd46fe15a@canonical.com> Subject: [USN-5453-1] FreeType vulnerability
--------------egM9wNZnOxIxhzaEw2DSpczY Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-5453-1 May 30, 2022
freetype vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
FreeType could be made to crash if it opened a specially crafted file.
Software Description: - freetype: FreeType 2 is a font engine library
Details:
It was discovered that FreeType incorrectly handled certain font files. An attacker could possibly use this issue to cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 ESM: libfreetype6 2.6.1-0.1ubuntu2.5+esm1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-5453-1 CVE-2022-27406 --------------egM9wNZnOxIxhzaEw2DSpczY--
--------------fEF6yWMM1BSBjLF84lT7AkBp Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmKU0aQFAwAAAAAACgkQZ0GeRcM5nt28 UggAh4+ILOICsCjI46hEFMZV8gRz4XMXmxw8G3rBRzkoEJHK9LI4ikaVo1tkcoNi+8MWgyuiGXSo 3jFsopvoGJ3TRM135vBHSW+ER6kKrB6BW3VeHwajFsCtqsoA52THXySuhrvNkpMETFvWesMxByUJ js20dU2Z0NabbAlPWFdBTWQ9jcEDu/bePU+XU4i9lNnSPGxzGIomO/NGVBY9kJXuo6hIhu9HesIb nqy/XdscJt/VTwh0Tm4zfWUuyLXBOwjJZOt/v2qpwN38qlFNWH0+CCAaIgehOk6FwDVZF7Cx1W9u ynBD9+LlldyDMqn/n4Cr5Pv7hNOHzZHgqO/q409Edg== =XpRX -----END PGP SIGNATURE-----
--------------fEF6yWMM1BSBjLF84lT7AkBp--
--===============0253259981305606058== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============0253259981305606058==--
|
|
|
|