First published: Fri Jul 30 2010(Updated: )
FreeType is a free, high-quality, portable font engine that can open and<br>manage font files. It also loads, hints, and renders individual glyphs<br>efficiently. The freetype packages for Red Hat Enterprise Linux 4 provide<br>both the FreeType 1 and FreeType 2 font engines. The freetype packages for<br>Red Hat Enterprise Linux 5 provide only the FreeType 2 font engine.<br>An invalid memory management flaw was found in the way the FreeType font<br>engine processed font files. If a user loaded a carefully-crafted font file<br>with an application linked against FreeType, it could cause the application<br>to crash or, possibly, execute arbitrary code with the privileges of the<br>user running the application. (CVE-2010-2498)<br>An integer overflow flaw was found in the way the FreeType font engine<br>processed font files. If a user loaded a carefully-crafted font file with<br>an application linked against FreeType, it could cause the application to<br>crash or, possibly, execute arbitrary code with the privileges of the user<br>running the application. (CVE-2010-2500)<br>Several buffer overflow flaws were found in the way the FreeType font<br>engine processed font files. If a user loaded a carefully-crafted font file<br>with an application linked against FreeType, it could cause the application<br>to crash or, possibly, execute arbitrary code with the privileges of the<br>user running the application. (CVE-2010-2499, CVE-2010-2519)<br>Several buffer overflow flaws were found in the FreeType demo applications.<br>If a user loaded a carefully-crafted font file with a demo application, it<br>could cause the application to crash or, possibly, execute arbitrary code<br>with the privileges of the user running the application. (CVE-2010-2527,<br>CVE-2010-2541)<br>Red Hat would like to thank Robert Swiecki of the Google Security Team for<br>the discovery of the CVE-2010-2498, CVE-2010-2500, CVE-2010-2499,<br>CVE-2010-2519, and CVE-2010-2527 issues.<br>Note: All of the issues in this erratum only affect the FreeType 2 font<br>engine.<br>Users are advised to upgrade to these updated packages, which contain<br>backported patches to correct these issues. The X server must be restarted<br>(log out, then log back in) for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/freetype | <2.2.1-25.el5_5 | 2.2.1-25.el5_5 |
redhat/freetype | <2.2.1-25.el5_5 | 2.2.1-25.el5_5 |
redhat/freetype-demos | <2.2.1-25.el5_5 | 2.2.1-25.el5_5 |
redhat/freetype-devel | <2.2.1-25.el5_5 | 2.2.1-25.el5_5 |
redhat/freetype-devel | <2.2.1-25.el5_5 | 2.2.1-25.el5_5 |
redhat/freetype-demos | <2.2.1-25.el5_5 | 2.2.1-25.el5_5 |
redhat/freetype | <2.1.9-14.el4.8 | 2.1.9-14.el4.8 |
redhat/freetype | <2.1.9-14.el4.8 | 2.1.9-14.el4.8 |
redhat/freetype-demos | <2.1.9-14.el4.8 | 2.1.9-14.el4.8 |
redhat/freetype-devel | <2.1.9-14.el4.8 | 2.1.9-14.el4.8 |
redhat/freetype-utils | <2.1.9-14.el4.8 | 2.1.9-14.el4.8 |
redhat/freetype-demos | <2.1.9-14.el4.8 | 2.1.9-14.el4.8 |
redhat/freetype-devel | <2.1.9-14.el4.8 | 2.1.9-14.el4.8 |
redhat/freetype-utils | <2.1.9-14.el4.8 | 2.1.9-14.el4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.