Updated freetype2 packages fix security vulnerability
Publication date: 15 May 2022Modification date: 15 May 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-27404 , CVE-2022-27405 , CVE-2022-27406
Description
FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face. (CVE-2022-27404) FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request. (CVE-2022-27405) FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size. (CVE-2022-27406)
References
- https://bugs.mageia.org/show_bug.cgi?id=30395
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
SRPMS
8/core
- freetype2-2.10.4-2.1.mga8
8/tainted
- freetype2-2.10.4-2.1.mga8.tainted