First published: Fri Apr 22 2022(Updated: )
FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Freetype Freetype | <2.12.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
redhat/freetype | <2.12.0 | 2.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-27404.
The severity of CVE-2022-27404 is critical with a score of 9.8.
The software affected by CVE-2022-27404 includes FreeType (up to version 2.12.0) and Fedora (versions 34, 35, 36).
The CWE ID associated with CVE-2022-27404 is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-787 (Out-of-bounds Write).
To fix the vulnerability CVE-2022-27404, it is recommended to update FreeType to a version above 2.12.0 and apply the necessary patches provided by the vendor.