--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2022-0985b0cb9f
2022-05-08 01:45:04.718288
--------------------------------------------------------------------------------Name        : mingw-freetype
Product     : Fedora 35
Version     : 2.11.0
Release     : 2.fc35
URL         : http://www.freetype.org
Summary     : Free and portable font rendering engine
Description :
MinGW Windows Freetype library.

--------------------------------------------------------------------------------Update Information:

Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406
--------------------------------------------------------------------------------ChangeLog:

* Wed Apr 27 2022 Sandro Mani  - 2.11.0-2
- Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #2079182 - CVE-2022-27406 mingw-freetype: Freetype: Segmentation violation [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2079182
  [ 2 ] Bug #2079204 - CVE-2022-27404 mingw-freetype: FreeType: Buffer Overflow [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2079204
  [ 3 ] Bug #2079256 - CVE-2022-27405 mingw-freetype: FreeType: Segementation Fault [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2079256
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-0985b0cb9f' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 35: mingw-freetype 2022-0985b0cb9f

May 7, 2022
Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406

Summary

MinGW Windows Freetype library.

Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406

* Wed Apr 27 2022 Sandro Mani - 2.11.0-2

- Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406

[ 1 ] Bug #2079182 - CVE-2022-27406 mingw-freetype: Freetype: Segmentation violation [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=2079182

[ 2 ] Bug #2079204 - CVE-2022-27404 mingw-freetype: FreeType: Buffer Overflow [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=2079204

[ 3 ] Bug #2079256 - CVE-2022-27405 mingw-freetype: FreeType: Segementation Fault [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=2079256

su -c 'dnf upgrade --advisory FEDORA-2022-0985b0cb9f' at the command

line. For more information, refer to the dnf documentation available at

http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/keys

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

FEDORA-2022-0985b0cb9f 2022-05-08 01:45:04.718288 Product : Fedora 35 Version : 2.11.0 Release : 2.fc35 URL : http://www.freetype.org Summary : Free and portable font rendering engine Description : MinGW Windows Freetype library. Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406 * Wed Apr 27 2022 Sandro Mani - 2.11.0-2 - Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406 [ 1 ] Bug #2079182 - CVE-2022-27406 mingw-freetype: Freetype: Segmentation violation [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2079182 [ 2 ] Bug #2079204 - CVE-2022-27404 mingw-freetype: FreeType: Buffer Overflow [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2079204 [ 3 ] Bug #2079256 - CVE-2022-27405 mingw-freetype: FreeType: Segementation Fault [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2079256 su -c 'dnf upgrade --advisory FEDORA-2022-0985b0cb9f' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Change Log

References

Update Instructions

Severity
Product : Fedora 35
Version : 2.11.0
Release : 2.fc35
URL : http://www.freetype.org
Summary : Free and portable font rendering engine

Related News