[USN-4593-1] FreeType vulnerability

Alex Murray alex.murray at canonical.com
Tue Oct 20 12:10:53 UTC 2020


==========================================================================
Ubuntu Security Notice USN-4593-1
October 20, 2020

freetype vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

FreeType could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- freetype: FreeType 2 is a font engine library

Details:

Sergei Glazunov discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  libfreetype6                    2.10.1-2ubuntu0.1

Ubuntu 18.04 LTS:
  libfreetype6                    2.8.1-2ubuntu2.1

Ubuntu 16.04 LTS:
  libfreetype6                    2.6.1-0.1ubuntu2.5

After a standard system update you need to restart your session to make
all the necessary changes.

References:
  https://usn.ubuntu.com/4593-1
  CVE-2020-15999

Package Information:
  https://launchpad.net/ubuntu/+source/freetype/2.10.1-2ubuntu0.1
  https://launchpad.net/ubuntu/+source/freetype/2.8.1-2ubuntu2.1
  https://launchpad.net/ubuntu/+source/freetype/2.6.1-0.1ubuntu2.5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 524 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20201020/2420150f/attachment.sig>


More information about the ubuntu-security-announce mailing list