USN-4593-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-4593-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4593-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4593-2
Related
Published
2020-10-22T14:48:01.180239Z
Modified
2020-10-22T14:48:01.180239Z
Summary
freetype vulnerability
Details

USN-4593-1 fixed a vulnerability in FreeType. This update provides the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

Sergei Glazunov discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges.

References

Affected packages

Ubuntu:Pro:14.04:LTS / freetype

Package

Name
freetype

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.2-1ubuntu2.8+esm2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "freetype2-demos": "2.5.2-1ubuntu2.8+esm2",
            "libfreetype6": "2.5.2-1ubuntu2.8+esm2",
            "libfreetype6-udeb": "2.5.2-1ubuntu2.8+esm2",
            "libfreetype6-dev": "2.5.2-1ubuntu2.8+esm2"
        }
    ]
}