Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Ubuntu Security Notice USN-5528-1[6]
- Authored by Ubuntu[7] | Site security.ubuntu.com[8]
-
Ubuntu Security Notice 5528-1 - It was discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash, or possibly execute arbitrary code.
- systems | linux[9], ubuntu[10]
- advisories | CVE-2022-27404[11]
- SHA-256 |
e4399fee1fafb757db2cc7084bced0d8077ec2ee656c7d3e483d74589880986a
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
==========================================================================
Ubuntu Security Notice USN-5528-1
July 20, 2022
freetype vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in FreeType.
Software Description:
- freetype: FreeType 2 is a font engine library
Details:
It was discovered that FreeType did not correctly handle certain malformed
font files. If a user were tricked into using a specially crafted font
file, a remote attacker could cause FreeType to crash, or possibly execute
arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
libfreetype6 2.11.1+dfsg-1ubuntu0.1
Ubuntu 20.04 LTS:
libfreetype6 2.10.1-2ubuntu0.2
Ubuntu 18.04 LTS:
libfreetype6 2.8.1-2ubuntu2.2
After a standard system update you need to restart your session to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5528-1
CVE-2022-27404, CVE-2022-27405, CVE-2022-27406, CVE-2022-31782
Package Information:
https://launchpad.net/ubuntu/+source/freetype/2.11.1+dfsg-1ubuntu0.1
https://launchpad.net/ubuntu/+source/freetype/2.10.1-2ubuntu0.2
https://launchpad.net/ubuntu/+source/freetype/2.8.1-2ubuntu2.2
File Tags
- ActiveX[21] (932)
- Advisory[22] (77,770)
- Arbitrary[23] (15,164)
- BBS[24] (2,859)
- Bypass[25] (1,572)
- CGI[26] (1,012)
- Code Execution[27] (6,691)
- Conference[28] (671)
- Cracker[29] (797)
- CSRF[30] (3,272)
- DoS[31] (21,886)
- Encryption[32] (2,335)
- Exploit[33] (49,912)
- File Inclusion[34] (4,148)
- File Upload[35] (945)
- Firewall[36] (821)
- Info Disclosure[37] (2,551)
- Intrusion Detection[38] (856)
- Java[39] (2,794)
- JavaScript[40] (800)
- Kernel[41] (6,065)
- Local[42] (14,026)
- Magazine[43] (586)
- Overflow[44] (12,218)
- Perl[45] (1,411)
- PHP[46] (5,048)
- Proof of Concept[47] (2,283)
- Protocol[48] (3,321)
- Python[49] (1,404)
- Remote[50] (29,740)
- Root[51] (3,451)
- Ruby[52] (577)
- Scanner[53] (1,630)
- Security Tool[54] (7,706)
- Shell[55] (3,064)
- Shellcode[56] (1,203)
- Sniffer[57] (881)
- Spoof[58] (2,085)
- SQL Injection[59] (16,024)
- TCP[60] (2,362)
- Trojan[61] (676)
- UDP[62] (866)
- Virus[63] (659)
- Vulnerability[64] (30,495)
- Web[65] (9,048)
- Whitepaper[66] (3,719)
- x86[67] (943)
- XSS[68] (17,346)
- Other[69]
File Archives
- July 2022[70]
- June 2022[71]
- May 2022[72]
- April 2022[73]
- March 2022[74]
- February 2022[75]
- January 2022[76]
- December 2021[77]
- November 2021[78]
- October 2021[79]
- September 2021[80]
- August 2021[81]
- Older[82]
Systems
- AIX[83] (426)
- Apple[84] (1,883)
- BSD[85] (368)
- CentOS[86] (55)
- Cisco[87] (1,913)
- Debian[88] (5,948)
- Fedora[89] (1,690)
- FreeBSD[90] (1,241)
- Gentoo[91] (4,152)
- HPUX[92] (878)
- iOS[93] (318)
- iPhone[94] (108)
- IRIX[95] (220)
- Juniper[96] (67)
- Linux[97] (42,434)
- Mac OS X[98] (683)
- Mandriva[99] (3,105)
- NetBSD[100] (255)
- OpenBSD[101] (478)
- RedHat[102] (11,714)
- Slackware[103] (941)
- Solaris[104] (1,607)
- SUSE[105] (1,444)
- Ubuntu[106] (7,896)
- UNIX[107] (9,089)
- UnixWare[108] (185)
- Windows[109] (6,431)
- Other[110]
Read more https://packetstormsecurity.com/files/167774/USN-5528-1.txt