Ubuntu alert USN-7352-2 (freetype)
From: | John Breton <john.breton@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-7352-2] FreeType vulnerabilities | |
Date: | Mon, 17 Mar 2025 21:21:23 -0400 | |
Message-ID: | <9b563ac1-af3c-4827-a0d3-41cc1221d0e0@canonical.com> |
========================================================================== Ubuntu Security Notice USN-7352-2 March 17, 2025 freetype vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in FreeType. Software Description: - freetype: FreeType 2 is a font engine library Details: USN-7352-1 fixed a vulnerability in FreeType. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. This update also fixes an additional vulnerability in Ubuntu 14.04 LTS. Original advisory details: It was discovered that FreeType incorrectly handled certain memory operations when parsing font subglyph structures. A remote attacker could use this issue to cause FreeType to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2025-27363) Additional advisory details: It was discovered that FreeType incorrectly handled certain memory operations during typical execution. An attacker could possibly use this issue to cause FreeType to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2022-27406) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS libfreetype6 2.8.1-2ubuntu2.2+esm1 Available with Ubuntu Pro Ubuntu 16.04 LTS libfreetype6 2.6.1-0.1ubuntu2.5+esm2 Available with Ubuntu Pro Ubuntu 14.04 LTS libfreetype6 2.5.2-1ubuntu2.8+esm3 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7352-2 https://ubuntu.com/security/notices/USN-7352-1 CVE-2022-27406, CVE-2025-27363
Attachment: OpenPGP_signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- wsF4BAABCAAjFiEEyMDHOTG0YH5UsajI8pSCVQZYHygFAmfYypMFAwAAAAAACgkQ8pSCVQZYHygL VQ/43c410NMQ05IZGdtYbkJg7cmshLee/i6mYTbvSaDql0NQFnzdElHzPxn1Tok+5AWTUsYzvHEN x+8a09lGSHc9cvMedsMVSyv/3uUvoyF1U1zGkm+RIKXW1FwdlV+XWhEWMlGwl8HbJ8bArydl14Ah wPbnQRr/ijmG6W96Q7/JBlp4hfHVeMPmrqXJ6Gesj82gTtyes86pYooipvTS4/zxoQyMEBHeth+H OK8gshMcc79GmXpOrLHJXB7rt9camgnIUbs3tmf4vmXMWZIogE/yLWYDGzyXc7/bLGhoPY2FYpgK 2gxfR+CWSnPJw3jfKUi6ludj/Pxf8LReoiS+kxurKC4T/x77OWDMqn7r/KugkMA4nPxp3Io6gBF9 PntmfRpkHrF39vGOtnI0fffR4D3hlBszEw8IRzU4qdYzYPNfcTlUsXsAkEXJx0t9Moy03sxDtRip HPUFk4dodHC98T5WIYBoqeYvOnCwtUxkErzTxY2/sB9RTB45drgEvGwVYTykXtmAtjxahPd5aIEB Zf6JqEgGbBClOmzte0e1k3LjTDJiWMA3RNc1ru5uQ2I7iXR0Uyq0gbAFXsYljtBnJbuLk/opzE9S CtKVuLtBlji0tlXGiK+UOLfsHJEA3hBAI2VEtbtR75BcS7LYFNHX+vzV7WobSRX4cp6/hZmNPjo8 xA== =2nQE -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)