First published: Fri May 22 2009(Updated: )
FreeType is a free, high-quality, portable font engine that can open and<br>manage font files. It also loads, hints, and renders individual glyphs<br>efficiently. These packages provide the FreeType 2 font engine.<br>Tavis Ormandy of the Google Security Team discovered several integer<br>overflow flaws in the FreeType 2 font engine. If a user loaded a<br>carefully-crafted font file with an application linked against FreeType 2,<br>it could cause the application to crash or, possibly, execute arbitrary<br>code with the privileges of the user running the application.<br>(CVE-2009-0946)<br>Users are advised to upgrade to these updated packages, which contain a<br>backported patch to correct these issues. The X server must be restarted<br>(log out, then log back in) for this update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/freetype | <2.2.1-21.el5_3 | 2.2.1-21.el5_3 |
redhat/freetype | <2.2.1-21.el5_3 | 2.2.1-21.el5_3 |
redhat/freetype-demos | <2.2.1-21.el5_3 | 2.2.1-21.el5_3 |
redhat/freetype-devel | <2.2.1-21.el5_3 | 2.2.1-21.el5_3 |
redhat/freetype-devel | <2.2.1-21.el5_3 | 2.2.1-21.el5_3 |
redhat/freetype-demos | <2.2.1-21.el5_3 | 2.2.1-21.el5_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The RHSA-2009:1061 vulnerability has been classified as important.
You can fix RHSA-2009:1061 by updating to the FreeType version 2.2.1-21.el5_3.
The affected software includes FreeType and its related packages such as freetype-devel and freetype-demos.
The vulnerability was discovered by Tavis Ormandy from the Google Security Team.
RHSA-2009:1061 is an integer overflow vulnerability in the FreeType font engine.