USN-7352-1 fixed a vulnerability in FreeType. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. This
update also fixes an additional vulnerability in Ubuntu 14.04 LTS.
Original advisory details:
It was discovered that FreeType incorrectly handled certain memory
operations when parsing font subglyph structures. A remote attacker could
use this issue to cause FreeType to crash, resulting in a denial of
service, or possibly execute arbitrary code. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2025-27363)
Additional advisory details:
It was discovered that FreeType incorrectly handled certain memory
operations during typical execution. An attacker could possibly use
this issue to cause FreeType to crash, resulting in a denial of
service. This issue only affected Ubuntu 14.04 LTS. (CVE-2022-27406)
More Stories
golang-github-openprinting-ipp-usb-0.9.30-1.fc41
FEDORA-2025-73800111e8 Packages in this update: golang-github-openprinting-ipp-usb-0.9.30-1.fc41 Update description: 0.9.30, rebuild due golang CVE-2025-22870 Read More
nodejs-nodemon-3.1.9-3.fc41
FEDORA-2025-0951177024 Packages in this update: nodejs-nodemon-3.1.9-3.fc41 Update description: Added patch for CVE-2024-4068 (rhbz#2280624) Read More
nodejs-nodemon-3.1.9-3.fc40
FEDORA-2025-9a278a7768 Packages in this update: nodejs-nodemon-3.1.9-3.fc40 Update description: Added patch for CVE-2024-4068 (rhbz#2280624) Read More
nodejs-nodemon-3.1.9-4.fc42
FEDORA-2025-7d7b644265 Packages in this update: nodejs-nodemon-3.1.9-4.fc42 Update description: Added patch for CVE-2024-4068 (rhbz#2280624) Read More
ZDI-25-148: (0Day) Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to...
USN-7354-1: djoser vulnerability
Diego Cebrián discovered that djoser did not properly handle user authentication. An attacker with valid credentials could possibly use this...