You are here
Home > Preporuke > Višestruke ranjivosti programskog paketa freetype

Višestruke ranjivosti programskog paketa freetype

==========================================================================
Ubuntu Security Notice USN-2510-1
February 24, 2015

freetype vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS

Summary:

FreeType could be made to crash or run programs as your login if it opened
a specially crafted file.

Software Description:
– freetype: FreeType 2 is a font engine library

Details:

Mateusz Jurczyk discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
libfreetype6 2.5.2-2ubuntu1.1

Ubuntu 14.04 LTS:
libfreetype6 2.5.2-1ubuntu2.4

Ubuntu 12.04 LTS:
libfreetype6 2.4.8-1ubuntu2.2

Ubuntu 10.04 LTS:
libfreetype6 2.3.11-1ubuntu2.8

After a standard system update you need to restart your session to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2510-1
CVE-2014-9656, CVE-2014-9657, CVE-2014-9658, CVE-2014-9659,
CVE-2014-9660, CVE-2014-9661, CVE-2014-9662, CVE-2014-9663,
CVE-2014-9664, CVE-2014-9665, CVE-2014-9666, CVE-2014-9667,
CVE-2014-9668, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671,
CVE-2014-9672, CVE-2014-9673, CVE-2014-9674, CVE-2014-9675

Package Information:
https://launchpad.net/ubuntu/+source/freetype/2.5.2-2ubuntu1.1
https://launchpad.net/ubuntu/+source/freetype/2.5.2-1ubuntu2.4
https://launchpad.net/ubuntu/+source/freetype/2.4.8-1ubuntu2.2
https://launchpad.net/ubuntu/+source/freetype/2.3.11-1ubuntu2.8

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIcBAEBCgAGBQJU7Nr1AAoJEGVp2FWnRL6T+r8P/jM4ArqREiV7+9z2AViX8EtZ
tZ/zdIEH1ABfBVBycsUC3vx+rKghn5SkTJAwKKv++exnJmO5UoyYZGq1/SKQ1FhP
ggT1QdYBFwuBTXm+bgWNWW5UWPcSUAFVaCb3cSb/07/6RgdTPSVlYbrtVHg++YCg
Q4HSJwg7kYh9WTGwZgatat+RItXPUutHaZHO88z6gCeQevP7g5hIGrKKMpfJO6eq
8eFi9V7VdRKLGK80O3wSK81VX4YaTyeYKOxlnKGzvQ8uWZyiM8CzXybg0JBwnUjF
UV8R+R20pMZqHGSw883ZF30f6COkG3G/J0IndIT5ufG++XUHM5Tgy1UUSIXokhm6
bV0pWT+tXPsqF16kWIlU9ZtyHsZzlIIgu9RLO82eGv02RnWua0vLsPqYtrBa52j0
N7ACxZBNZEd67jEynYo6voFQc/MdDJj510S7+Li9Gritkkcwsi7sqJaWhuzh/xC2
POU5WgFrZuZ0ylhqGoX4ysiZYxTAIsWYAgsNHonYEJIdeKMSW2X4kh4mXVk5SC+2
WSMKkGrnPNYPDuM3ugJOvUta2rW1akivbKEDm5mXSgNy9NWRUQ9yzFIcsTbLFmYN
BByaazFaPJVDW+04/1kh8QQEKye+/C7oQh7uuDjLMQxwkDLcD+66bBN62LeQblQU
qE+oht4Zfoq6BB2sCl5Q
=0NKe
—–END PGP SIGNATURE—–

Top
More in Preporuke
Ranjivosti programskog paketa php5

Otkriveno je nekoliko ranjivosti programskog paketa php5 za SUSE LE. Ranjivosti su pronađene u funkcijama process_nested_data (ext/standard/var_unserializer.re) i exif_process_unicode (ext/exif/exif.c)...

Close