==========================================================================
Ubuntu Security Notice USN-2510-1
February 24, 2015
freetype vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS
Summary:
FreeType could be made to crash or run programs as your login if it opened
a specially crafted file.
Software Description:
– freetype: FreeType 2 is a font engine library
Details:
Mateusz Jurczyk discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
libfreetype6 2.5.2-2ubuntu1.1
Ubuntu 14.04 LTS:
libfreetype6 2.5.2-1ubuntu2.4
Ubuntu 12.04 LTS:
libfreetype6 2.4.8-1ubuntu2.2
Ubuntu 10.04 LTS:
libfreetype6 2.3.11-1ubuntu2.8
After a standard system update you need to restart your session to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2510-1
CVE-2014-9656, CVE-2014-9657, CVE-2014-9658, CVE-2014-9659,
CVE-2014-9660, CVE-2014-9661, CVE-2014-9662, CVE-2014-9663,
CVE-2014-9664, CVE-2014-9665, CVE-2014-9666, CVE-2014-9667,
CVE-2014-9668, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671,
CVE-2014-9672, CVE-2014-9673, CVE-2014-9674, CVE-2014-9675
Package Information:
https://launchpad.net/ubuntu/+source/freetype/2.5.2-2ubuntu1.1
https://launchpad.net/ubuntu/+source/freetype/2.5.2-1ubuntu2.4
https://launchpad.net/ubuntu/+source/freetype/2.4.8-1ubuntu2.2
https://launchpad.net/ubuntu/+source/freetype/2.3.11-1ubuntu2.8
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=0NKe
—–END PGP SIGNATURE—–
—