[ALSA-2022:7745] Moderate: freetype security update
Type:
security
Severity:
moderate
Release date:
2022-11-14
Description:
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404) * FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405) * Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 freetype-devel-2.9.1-9.el8.aarch64.rpm 9a329be66f45a1b05e538cc87e205079c7b69beb674618ebbc7fb15f4d85c4f1
aarch64 freetype-2.9.1-9.el8.aarch64.rpm b3727812396e6cf26d48dee1465b220acfc996736d328261007a376b8f06231f
i686 freetype-2.9.1-9.el8.i686.rpm a4b5a7093ebab5cd3e144715832faa8cbe5447549adc6fcc7ba96ae98677a913
i686 freetype-devel-2.9.1-9.el8.i686.rpm b5d7582425d53fa1b991e1b3c9d615a7e408f82f9717d17a2890941248213296
ppc64le freetype-devel-2.9.1-9.el8.ppc64le.rpm 8fac7a22b887d4b2fa62f728981f863b45df108bf358c03f481efa5b846fea6f
ppc64le freetype-2.9.1-9.el8.ppc64le.rpm dec37f03fc90846fd9e93564d7136cd64f50b65f007acf030260f50e9432738c
s390x freetype-2.9.1-9.el8.s390x.rpm 8f3a66ed2b631577639fafb693549282ad7401f619afa049b2ed0f5e419962da
s390x freetype-devel-2.9.1-9.el8.s390x.rpm e81cc576c631668ae0fc8cc94481a15e0c73be80f7fc52bc53b2f53ffb071901
x86_64 freetype-devel-2.9.1-9.el8.x86_64.rpm 745f653aee0dede42ff50aeb06ec7f33ee86c776f3b4f59dfa7e3b0c7e851a41
x86_64 freetype-2.9.1-9.el8.x86_64.rpm da3f3d84b8a58ea2fd72adb588d4c0e481bf23b342d043878834be0bbbe1bb85
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.