rhsa-2009_1062
Vulnerability from csaf_redhat
Published
2009-05-22 12:06
Modified
2024-11-22 02:41
Summary
Red Hat Security Advisory: freetype security update
Notes
Topic
Updated freetype packages that fix various security issues are now
available for Red Hat Enterprise Linux 2.1.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. These packages provide both the FreeType 1 and FreeType 2
font engines.
Tavis Ormandy of the Google Security Team discovered several integer
overflow flaws in the FreeType 2 font engine. If a user loaded a
carefully-crafted font file with an application linked against FreeType 2,
it could cause the application to crash or, possibly, execute arbitrary
code with the privileges of the user running the application.
(CVE-2009-0946)
Chris Evans discovered multiple integer overflow flaws in the FreeType font
engine. If a user loaded a carefully-crafted font file with an application
linked against FreeType, it could cause the application to crash or,
possibly, execute arbitrary code with the privileges of the user running
the application. (CVE-2006-1861)
An integer overflow flaw was found in the way the FreeType font engine
processed TrueType® Font (TTF) files. If a user loaded a carefully-crafted
font file with an application linked against FreeType, it could cause the
application to crash or, possibly, execute arbitrary code with the
privileges of the user running the application. (CVE-2007-2754)
Note: For the FreeType 2 font engine, the CVE-2006-1861 and CVE-2007-2754
flaws were addressed via RHSA-2006:0500 and RHSA-2007:0403 respectively.
This update provides corresponding updates for the FreeType 1 font engine,
included in the freetype packages distributed in Red Hat Enterprise Linux
2.1.
Users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix various security issues are now\navailable for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. These packages provide both the FreeType 1 and FreeType 2\nfont engines.\n\nTavis Ormandy of the Google Security Team discovered several integer\noverflow flaws in the FreeType 2 font engine. If a user loaded a\ncarefully-crafted font file with an application linked against FreeType 2,\nit could cause the application to crash or, possibly, execute arbitrary\ncode with the privileges of the user running the application.\n(CVE-2009-0946)\n\nChris Evans discovered multiple integer overflow flaws in the FreeType font\nengine. If a user loaded a carefully-crafted font file with an application\nlinked against FreeType, it could cause the application to crash or,\npossibly, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2006-1861)\n\nAn integer overflow flaw was found in the way the FreeType font engine\nprocessed TrueType\u00ae Font (TTF) files. If a user loaded a carefully-crafted\nfont file with an application linked against FreeType, it could cause the\napplication to crash or, possibly, execute arbitrary code with the\nprivileges of the user running the application. (CVE-2007-2754)\n\nNote: For the FreeType 2 font engine, the CVE-2006-1861 and CVE-2007-2754\nflaws were addressed via RHSA-2006:0500 and RHSA-2007:0403 respectively.\nThis update provides corresponding updates for the FreeType 1 font engine,\nincluded in the freetype packages distributed in Red Hat Enterprise Linux\n2.1.\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1062", "url": "https://access.redhat.com/errata/RHSA-2009:1062" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "240200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200" }, { "category": "external", "summary": "484437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437" }, { "category": "external", "summary": "491384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1062.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2024-11-22T02:41:42+00:00", "generator": { "date": "2024-11-22T02:41:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1062", "initial_release_date": "2009-05-22T12:06:00+00:00", "revision_history": [ { "date": "2009-05-22T12:06:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-05-22T08:06:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:41:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.0.3-17.el21.ia64", "product": { "name": "freetype-utils-0:2.0.3-17.el21.ia64", "product_id": "freetype-utils-0:2.0.3-17.el21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.0.3-17.el21?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.0.3-17.el21.ia64", "product": { "name": "freetype-devel-0:2.0.3-17.el21.ia64", "product_id": "freetype-devel-0:2.0.3-17.el21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.0.3-17.el21?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.0.3-17.el21.ia64", "product": { "name": "freetype-0:2.0.3-17.el21.ia64", "product_id": "freetype-0:2.0.3-17.el21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.0.3-17.el21?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.0.3-17.el21.src", "product": { "name": "freetype-0:2.0.3-17.el21.src", "product_id": "freetype-0:2.0.3-17.el21.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.0.3-17.el21?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.0.3-17.el21.i386", "product": { "name": "freetype-utils-0:2.0.3-17.el21.i386", "product_id": "freetype-utils-0:2.0.3-17.el21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.0.3-17.el21?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.0.3-17.el21.i386", "product": { "name": "freetype-devel-0:2.0.3-17.el21.i386", "product_id": "freetype-devel-0:2.0.3-17.el21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.0.3-17.el21?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.0.3-17.el21.i386", "product": { "name": "freetype-0:2.0.3-17.el21.i386", "product_id": "freetype-0:2.0.3-17.el21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.0.3-17.el21?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-0:2.0.3-17.el21.src" }, "product_reference": "freetype-0:2.0.3-17.el21.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-devel-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-utils-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-0:2.0.3-17.el21.src" }, "product_reference": "freetype-0:2.0.3-17.el21.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-devel-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-utils-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-0:2.0.3-17.el21.src" }, "product_reference": "freetype-0:2.0.3-17.el21.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-devel-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-utils-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-0:2.0.3-17.el21.src" }, "product_reference": "freetype-0:2.0.3-17.el21.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-devel-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-utils-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-1861", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2006-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "484437" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c. NOTE: item 4 was originally identified by CVE-2006-2493.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: multiple integer overflow vulnerabilities", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1861" }, { "category": "external", "summary": "RHBZ#484437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1861", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1861" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1861", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1861" } ], "release_date": "2006-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:06:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1062" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "freetype: multiple integer overflow vulnerabilities" }, { "cve": "CVE-2007-2754", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2007-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "240200" } ], "notes": [ { "category": "description", "text": "Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype integer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2754" }, { "category": "external", "summary": "RHBZ#240200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2754", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754" } ], "release_date": "2007-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:06:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1062" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "freetype integer overflow" }, { "cve": "CVE-2009-0946", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491384" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: multiple integer overflows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0946" }, { "category": "external", "summary": "RHBZ#491384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0946", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0946" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0946", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0946" } ], "release_date": "2009-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:06:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1062" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: multiple integer overflows" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.