Important CentOS freetype Security Update

Metadata

high
unknown
freetype-2.3.11-15.el6_6.1.i686.rpm, freetype-2.3.11-15.el6_6.1.src.rpm, freetype-2.3.11-15.el6_6.1.x86_64.rpm, freetype-2.4.11-10.el7_1.1.i686.rpm, freetype-2.4.11-10.el7_1.1.src.rpm, freetype-2.4.11-10.el7_1.1.x86_64.rpm, freetype-demos-2.3.11-15.el6_6.1.i686.rpm, freetype-demos-2.3.11-15.el6_6.1.x86_64.rpm, freetype-demos-2.4.11-10.el7_1.1.x86_64.rpm, freetype-devel-2.3.11-15.el6_6.1.i686.rpm, freetype-devel-2.3.11-15.el6_6.1.x86_64.rpm, freetype-devel-2.4.11-10.el7_1.1.i686.rpm, freetype-devel-2.4.11-10.el7_1.1.x86_64.rpm
rhn.redhat.com, lists.centos.org, lists.centos.org, lists.centos.org
2015-04-01
2018-01-18 11:09
2017-07-27 19:08
2017-04-01 19:08
2017-01-05 20:13

Description


Updated freetype packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently.

Multiple integer overflow flaws and an integer signedness flaw, leading to
heap-based buffer overflows, were found in the way FreeType handled Mac
fonts. If a specially crafted font file was loaded by an application linked
against FreeType, it could cause the application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
application. (CVE-2014-9673, CVE-2014-9674)

Multiple flaws were found in the way FreeType handled fonts in various
formats. If a specially crafted font file was loaded by an application
linked against FreeType, it could cause the application to crash or,
possibly, disclose a portion of the application memory. (CVE-2014-9657,
CVE-2014-9658, CVE-2014-9660, CVE-2014-9661, CVE-2014-9663, CVE-2014-9664,
CVE-2014-9667, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671, CVE-2014-9675)

All freetype users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The X server must be
restarted (log out, then log back in) for this update to take effect.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 freetype freetype-2.3.11-15.el6_6.1.i686.rpm
freetype freetype-2.3.11-15.el6_6.1.src.rpm
freetype freetype-2.3.11-15.el6_6.1.x86_64.rpm
freetype-demos freetype-demos-2.3.11-15.el6_6.1.i686.rpm
freetype-demos freetype-demos-2.3.11-15.el6_6.1.x86_64.rpm
freetype-devel freetype-devel-2.3.11-15.el6_6.1.x86_64.rpm
freetype-devel freetype-devel-2.3.11-15.el6_6.1.i686.rpm
7 freetype freetype-2.4.11-10.el7_1.1.src.rpm
freetype freetype-2.4.11-10.el7_1.1.i686.rpm
freetype freetype-2.4.11-10.el7_1.1.x86_64.rpm
freetype-demos freetype-demos-2.4.11-10.el7_1.1.x86_64.rpm
freetype-devel freetype-devel-2.4.11-10.el7_1.1.x86_64.rpm
freetype-devel freetype-devel-2.4.11-10.el7_1.1.i686.rpm