[USN-1686-1] FreeType vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Mon Jan 14 18:21:23 UTC 2013

Ubuntu Security Notice USN-1686-1
January 14, 2013

freetype vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS


FreeType could be made to crash or run programs as your login if it opened
a specially crafted file.

Software Description:
- freetype: FreeType 2 is a font engine library


Mateusz Jurczyk discovered that FreeType did not correctly handle certain
malformed BDF font files. If a user were tricked into using a specially
crafted font file, a remote attacker could cause FreeType to crash or
possibly execute arbitrary code with user privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
  libfreetype6                    2.4.10-0ubuntu1.1

Ubuntu 12.04 LTS:
  libfreetype6                    2.4.8-1ubuntu2.1

Ubuntu 11.10:
  libfreetype6                    2.4.4-2ubuntu1.3

Ubuntu 10.04 LTS:
  libfreetype6                    2.3.11-1ubuntu2.7

Ubuntu 8.04 LTS:
  libfreetype6                    2.3.5-1ubuntu4.8.04.10

After a standard system update you need to restart your session to make all
the necessary changes.

  CVE-2012-5668, CVE-2012-5669, CVE-2012-5670

Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 899 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20130114/b3c1507e/attachment.pgp>

More information about the ubuntu-security-announce mailing list