drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Freetype
Name: |
Mehrere Probleme in Freetype |
|
ID: |
USN-1686-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 11.10, Ubuntu 12.04 LTS, Ubuntu 12.10 |
|
Datum: |
Di, 15. Januar 2013, 07:40 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670 |
|
Applikationen: |
Freetype |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============5856201033857285533== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigEBD672DFAC1EBC169CF09CD2"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigEBD672DFAC1EBC169CF09CD2 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1686-1 January 14, 2013
freetype vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS
Summary:
FreeType could be made to crash or run programs as your login if it opened a specially crafted file.
Software Description: - freetype: FreeType 2 is a font engine library
Details:
Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.10: libfreetype6 2.4.10-0ubuntu1.1
Ubuntu 12.04 LTS: libfreetype6 2.4.8-1ubuntu2.1
Ubuntu 11.10: libfreetype6 2.4.4-2ubuntu1.3
Ubuntu 10.04 LTS: libfreetype6 2.3.11-1ubuntu2.7
Ubuntu 8.04 LTS: libfreetype6 2.3.5-1ubuntu4.8.04.10
After a standard system update you need to restart your session to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1686-1 CVE-2012-5668, CVE-2012-5669, CVE-2012-5670
Package Information: https://launchpad.net/ubuntu/+source/freetype/2.4.10-0ubuntu1.1 https://launchpad.net/ubuntu/+source/freetype/2.4.8-1ubuntu2.1 https://launchpad.net/ubuntu/+source/freetype/2.4.4-2ubuntu1.3 https://launchpad.net/ubuntu/+source/freetype/2.3.11-1ubuntu2.7 https://launchpad.net/ubuntu/+source/freetype/2.3.5-1ubuntu4.8.04.10
--------------enigEBD672DFAC1EBC169CF09CD2 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJQ9EyjAAoJEGVp2FWnRL6TUxcP/jOg6nVW4gL0bnJV8T8jYz/p +BVoDm6sFfz8md/AGG6m44On3YB9WmdlspKm1yB03ovVsnuossr8QD036zwlTYDa R/2xRQHZpb66WqJtNjuBK37KWwkuU3XEmKwCcztRANlkEEm1zR6QkiZ92YSGYLAI 0P+zmg5xI/Cz5/svOUk9m3wqXsAD+Rvivwwvt4cMnf77qfiVwLKulYAEy8UbqWYP cRTjUbNg+tDr9DONa8cJ6u4/HLVr/GqyvmC3t8FgdEbsTjjxKqCJBcHKnY2mN/Nk igNCUCX55dKKb1J5LWrLmogEr1+ockEWCJkCyBORj7pyX7pEWW2TQTFvGRhCwE7R d88Fchbisskr6wi+zOCePfggdAMR6XA1ahFwnDhQxMGPT0fNM6XJYHFe41u0NKEj pRgECDfy99bpKKlOJWoA0Ye/6Iok4DsWw4PSubtG8QsP02yxIvueFW9TrmaKf02T V8cyfQ7RnHvggvuiIzR0FFpy0rMaDlLI25mUl6AZBlWDiY/rJ8463r7LqKrzT8jK QQh+n0esyM/kqiACH01b7Hvxy+cdU+eCZScJy1QthWJstQ0yEgD4CrIFJknAwD0Y Xgm0VWyFDCtsidNectyUpiqhVeUjxEU9IyRWpMSqIMKhURWdne14Ab53DD/TRIAY dMnC+NulukJMRknK8Ri2 =SGKu -----END PGP SIGNATURE-----
--------------enigEBD672DFAC1EBC169CF09CD2--
--===============5856201033857285533== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============5856201033857285533==--
|
|
|
|