You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa freetype

Sigurnosni nedostaci programskog paketa freetype

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-
Debian Security Advisory DSA-3188-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 15, 2015 http://www.debian.org/security/faq
– ————————————————————————-

Package : freetype
CVE ID : CVE-2014-9656 CVE-2014-9657 CVE-2014-9658 CVE-2014-9660
CVE-2014-9661 CVE-2014-9663 CVE-2014-9664 CVE-2014-9666
CVE-2014-9667 CVE-2014-9669 CVE-2014-9670 CVE-2014-9671
CVE-2014-9672 CVE-2014-9673 CVE-2014-9675

Mateusz Jurczyk discovered multiple vulnerabilities in Freetype. Opening
malformed fonts may result in denial of service or the execution of
arbitrary code.

For the stable distribution (wheezy), these problems have been fixed in
version 2.4.9-1.1+deb7u1.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 2.5.2-3.

For the unstable distribution (sid), these problems have been fixed in
version 2.5.2-3.

We recommend that you upgrade your freetype packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=dRlW
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20150315194903.GA20059@pisco.westfalen.local

AutorMarko Stanec
Cert idNCERT-REF-2015-03-0048-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa libav

Otkriveni su sigurnosni nedostaci u programskom paketu libav za operacijski sustav Debian. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanja...

Close