Important CentOS freetype Security Update

Metadata

high
7.5
freetype-2.3.11-15.el6_6.1.i686.rpm, freetype-2.3.11-15.el6_6.1.src.rpm, freetype-2.3.11-15.el6_6.1.x86_64.rpm, freetype-2.4.11-10.el7_1.1.i686.rpm, freetype-2.4.11-10.el7_1.1.src.rpm, freetype-2.4.11-10.el7_1.1.x86_64.rpm, freetype-demos-2.3.11-15.el6_6.1.i686.rpm, freetype-demos-2.3.11-15.el6_6.1.x86_64.rpm, freetype-demos-2.4.11-10.el7_1.1.x86_64.rpm, freetype-devel-2.3.11-15.el6_6.1.i686.rpm, freetype-devel-2.3.11-15.el6_6.1.x86_64.rpm, freetype-devel-2.4.11-10.el7_1.1.i686.rpm, freetype-devel-2.4.11-10.el7_1.1.x86_64.rpm
CVE-2014-9657, CVE-2014-9658, CVE-2014-9660, CVE-2014-9661, CVE-2014-9663, CVE-2014-9664, CVE-2014-9667, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671, CVE-2014-9673, CVE-2014-9674, CVE-2014-9675
rhn.redhat.com, lists.centos.org, lists.centos.org, lists.centos.org
2015-04-01
2017-07-27 19:08
ALAS-2015-502
CVE-2014-9674 freetype
CVE-2014-9670 freetype
CVE-2014-9671 freetype
CVE-2014-9657 freetype
CVE-2014-9669 freetype
CVE-2014-9673 freetype
CVE-2014-9667 freetype
CVE-2014-9660 freetype
CVE-2014-9661 freetype
CVE-2014-9664 freetype
CVE-2014-9663 freetype
CVE-2014-9675 freetype
CVE-2014-9658 freetype
CVE-2014-9669
CVE-2014-9658
CVE-2014-9664
CVE-2014-9674
CVE-2014-9661
CVE-2014-9670
CVE-2014-9675
CVE-2014-9660
CVE-2014-9667
CVE-2014-9663
CVE-2014-9671
CVE-2014-9657
CVE-2014-9673
2017-04-01 19:08
2017-01-05 20:13

Description


Updated freetype packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently.

Multiple integer overflow flaws and an integer signedness flaw, leading to
heap-based buffer overflows, were found in the way FreeType handled Mac
fonts. If a specially crafted font file was loaded by an application linked
against FreeType, it could cause the application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
application. (CVE-2014-9673, CVE-2014-9674)

Multiple flaws were found in the way FreeType handled fonts in various
formats. If a specially crafted font file was loaded by an application
linked against FreeType, it could cause the application to crash or,
possibly, disclose a portion of the application memory. (CVE-2014-9657,
CVE-2014-9658, CVE-2014-9660, CVE-2014-9661, CVE-2014-9663, CVE-2014-9664,
CVE-2014-9667, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671, CVE-2014-9675)

All freetype users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The X server must be
restarted (log out, then log back in) for this update to take effect.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 freetype freetype-2.3.11-15.el6_6.1.i686.rpm
freetype freetype-2.3.11-15.el6_6.1.src.rpm
freetype freetype-2.3.11-15.el6_6.1.x86_64.rpm
freetype-demos freetype-demos-2.3.11-15.el6_6.1.i686.rpm
freetype-demos freetype-demos-2.3.11-15.el6_6.1.x86_64.rpm
freetype-devel freetype-devel-2.3.11-15.el6_6.1.x86_64.rpm
freetype-devel freetype-devel-2.3.11-15.el6_6.1.i686.rpm
7 freetype freetype-2.4.11-10.el7_1.1.src.rpm
freetype freetype-2.4.11-10.el7_1.1.i686.rpm
freetype freetype-2.4.11-10.el7_1.1.x86_64.rpm
freetype-demos freetype-demos-2.4.11-10.el7_1.1.x86_64.rpm
freetype-devel freetype-devel-2.4.11-10.el7_1.1.x86_64.rpm
freetype-devel freetype-devel-2.4.11-10.el7_1.1.i686.rpm