Users of Ubuntu Security Notice USN-963 please be advised of a FreeType vulnerabilities that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
USN-963-1: USN-963-1 FreeType vulnerabilities
Ubuntu Security Notice USN-963
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
libfreetype6 2.1.10-1ubuntu2.7
Ubuntu 8.04 LTS:
libfreetype6 2.3.5-1ubuntu4.8.04.3
Ubuntu 9.04:
libfreetype6 2.3.9-4ubuntu0.2
Ubuntu 9.10:
libfreetype6 2.3.9-5ubuntu0.1
Ubuntu 10.04 LTS:
libfreetype6 2.3.11-1ubuntu2.1
After a standard system update you need to restart your session to make
all the necessary changes.
Details follow:
Robert Swiecki discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could execute arbitrary code with user
privileges.
Read more at www.criticalwatch.com
See this Amp at http://bit.ly/agLH8B

No comments:
Post a Comment