MGASA-2022-0184

Source
https://advisories.mageia.org/MGASA-2022-0184.html
Import Source
https://advisories.mageia.org/MGASA-2022-0184.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0184
Related
Published
2022-05-15T10:06:40Z
Modified
2022-05-15T09:20:21Z
Summary
Updated freetype2 packages fix security vulnerability
Details

FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfntinitface. (CVE-2022-27404)

FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNTSizeRequest. (CVE-2022-27405)

FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FTRequestSize. (CVE-2022-27406)

References
Credits

Affected packages

Mageia:8 / freetype2

Package

Name
freetype2
Purl
pkg:rpm/mageia/freetype2?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.4-2.1.mga8.tainted

Ecosystem specific

{
    "section": "tainted"
}

Mageia:8 / freetype2

Package

Name
freetype2
Purl
pkg:rpm/mageia/freetype2?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.4-2.1.mga8

Ecosystem specific

{
    "section": "core"
}