Packages
- freetype -
Details
Marc Schoenefeld discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges. This issue only affected
Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3311)
Chris Evans discovered that FreeType did not correctly handle certain
malformed TrueType font files. If a user were tricked into using a
specially crafted TrueType file, a remote attacker could cause FreeType to
crash or possibly execute arbitrary code with user privileges. This issue
only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. (CVE-2010-3814)
It was discovered that FreeType did not correctly handle certain malformed
TrueType font files. If a user were tricked into using a specially...
Marc Schoenefeld discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges. This issue only affected
Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3311)
Chris Evans discovered that FreeType did not correctly handle certain
malformed TrueType font files. If a user were tricked into using a
specially crafted TrueType file, a remote attacker could cause FreeType to
crash or possibly execute arbitrary code with user privileges. This issue
only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. (CVE-2010-3814)
It was discovered that FreeType did not correctly handle certain malformed
TrueType font files. If a user were tricked into using a specially crafted
TrueType file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges. (CVE-2010-3855)
Update instructions
After a standard system update you need to restart your session to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
9.10 karmic | libfreetype6 – 2.3.9-5ubuntu0.4 | ||
8.04 hardy | libfreetype6 – 2.3.5-1ubuntu4.8.04.6 | ||
6.06 dapper | libfreetype6 – 2.1.10-1ubuntu2.10 | ||
10.10 maverick | libfreetype6 – 2.4.2-2ubuntu0.1 | ||
10.04 lucid | libfreetype6 – 2.3.11-1ubuntu2.4 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.