[USN-4593-1] FreeType vulnerability
Alex Murray
alex.murray at canonical.com
Tue Oct 20 12:10:53 UTC 2020
==========================================================================
Ubuntu Security Notice USN-4593-1
October 20, 2020
freetype vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
FreeType could be made to crash or run programs as your login if it
opened a specially crafted file.
Software Description:
- freetype: FreeType 2 is a font engine library
Details:
Sergei Glazunov discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
libfreetype6 2.10.1-2ubuntu0.1
Ubuntu 18.04 LTS:
libfreetype6 2.8.1-2ubuntu2.1
Ubuntu 16.04 LTS:
libfreetype6 2.6.1-0.1ubuntu2.5
After a standard system update you need to restart your session to make
all the necessary changes.
References:
https://usn.ubuntu.com/4593-1
CVE-2020-15999
Package Information:
https://launchpad.net/ubuntu/+source/freetype/2.10.1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/freetype/2.8.1-2ubuntu2.1
https://launchpad.net/ubuntu/+source/freetype/2.6.1-0.1ubuntu2.5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 524 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20201020/2420150f/attachment.sig>
More information about the ubuntu-security-announce
mailing list