USN-1013-1: FreeType vulnerabilities
4 November 2010
Releases
Packages
- freetype -
Details
Marc Schoenefeld discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges. This issue only affected
Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3311)
Chris Evans discovered that FreeType did not correctly handle certain
malformed TrueType font files. If a user were tricked into using a
specially crafted TrueType file, a remote attacker could cause FreeType to
crash or possibly execute arbitrary code with user privileges. This issue
only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. (CVE-2010-3814)
It was discovered that FreeType did not correctly handle certain malformed
TrueType font files. If a user were tricked into using a specially crafted
TrueType file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges. (CVE-2010-3855)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 9.10
Ubuntu 8.04
Ubuntu 6.06
Ubuntu 10.10
Ubuntu 10.04
After a standard system update you need to restart your session to make all
the necessary changes.