Monday, March 17, 2025

[USN-7352-2] FreeType vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=2nQE
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7352-2
March 17, 2025

freetype vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in FreeType.

Software Description:
- freetype: FreeType 2 is a font engine library

Details:

USN-7352-1 fixed a vulnerability in FreeType. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. This
update also fixes an additional vulnerability in Ubuntu 14.04 LTS.

Original advisory details:

 It was discovered that FreeType incorrectly handled certain memory
 operations when parsing font subglyph structures. A remote attacker could
 use this issue to cause FreeType to crash, resulting in a denial of
 service, or possibly execute arbitrary code. This issue only affected
 Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2025-27363)

Additional advisory details:

 It was discovered that FreeType incorrectly handled certain memory
 operations during typical execution. An attacker could possibly use
 this issue to cause FreeType to crash, resulting in a denial of
 service. This issue only affected Ubuntu 14.04 LTS. (CVE-2022-27406)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
  libfreetype6                    2.8.1-2ubuntu2.2+esm1
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  libfreetype6                    2.6.1-0.1ubuntu2.5+esm2
                                  Available with Ubuntu Pro

Ubuntu 14.04 LTS
  libfreetype6                    2.5.2-1ubuntu2.8+esm3
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7352-2
  https://ubuntu.com/security/notices/USN-7352-1
  CVE-2022-27406, CVE-2025-27363

No comments:

Post a Comment