[USN-4126-2] FreeType vulnerabilities
Leonidas S. Barbosa
leo.barbosa at canonical.com
Mon Sep 9 19:17:59 UTC 2019
==========================================================================
Ubuntu Security Notice USN-4126-2
September 09, 2019
freetype vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
FreeType could be made to expose sensitive information if it opened a
specially crafted font file.
Software Description:
- freetype: FreeType 2 is a font engine library
Details:
USN-4126-1 fixed a vulnerability in FreeType. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
It was discovered that FreeType incorrectly handled certain font files.
An attacker could possibly use this issue to access sensitive information.
(CVE-2015-9381, CVE-2015-9382)
Original advisory details:
It was discovered that FreeType incorrectly handled certain font files.
An attacker could possibly use this issue to access sensitive information.
(CVE-2015-9383)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
libfreetype6 2.5.2-1ubuntu2.8+esm1
Ubuntu 12.04 ESM:
libfreetype6 2.4.8-1ubuntu2.7
After a standard system update you need to restart your session to make
all the necessary changes.
References:
https://usn.ubuntu.com/4126-2
https://usn.ubuntu.com/4126-1
CVE-2015-9381, CVE-2015-9382, CVE-2015-9383
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20190909/34d355de/attachment-0001.sig>
More information about the ubuntu-security-announce
mailing list