Mageia 2022-0184: freetype2 security update
Summary
FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to
contain a heap buffer overflow via the function sfnt_init_face.
(CVE-2022-27404)
FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to
contain a segmentation violation via the function FNT_Size_Request.
(CVE-2022-27405)
FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to
contain a segmentation violation via the function FT_Request_Size.
(CVE-2022-27406)
References
- https://bugs.mageia.org/show_bug.cgi?id=30395
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
Resolution
MGASA-2022-0184 - Updated freetype2 packages fix security vulnerability
SRPMS
- 8/tainted/freetype2-2.10.4-2.1.mga8.tainted
- 8/core/freetype2-2.10.4-2.1.mga8