First published: Fri Apr 22 2022(Updated: )
FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Freetype Freetype | <2.12.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
redhat/freetype | <2.12.0 | 2.12.0 |
<2.12.0 | ||
=34 | ||
=35 | ||
=36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-27406 is high, with a CVSS score of 7.5.
CVE-2022-27406 affects FreeType versions up to 2.12.0 and Fedora versions 34, 35, and 36.
The vulnerability in CVE-2022-27406 is a segmentation violation in the function FT_Request_Size of FreeType.
You can find more information about CVE-2022-27406 at the following references: http://freetype.com, https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140, https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
Yes, a fix for CVE-2022-27406 is available. Please refer to the relevant vendor or project for the fix details.