Fedora Linux 8568 Published by

A mingw-freetype security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: mingw-freetype-2.11.0-2.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-0985b0cb9f
2022-05-08 01:45:04.718288
--------------------------------------------------------------------------------

Name : mingw-freetype
Product : Fedora 35
Version : 2.11.0
Release : 2.fc35
URL :   http://www.freetype.org
Summary : Free and portable font rendering engine
Description :
MinGW Windows Freetype library.

--------------------------------------------------------------------------------
Update Information:

Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406
--------------------------------------------------------------------------------
ChangeLog:

* Wed Apr 27 2022 Sandro Mani - 2.11.0-2
- Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2079182 - CVE-2022-27406 mingw-freetype: Freetype: Segmentation violation [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2079182
[ 2 ] Bug #2079204 - CVE-2022-27404 mingw-freetype: FreeType: Buffer Overflow [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2079204
[ 3 ] Bug #2079256 - CVE-2022-27405 mingw-freetype: FreeType: Segementation Fault [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2079256
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-0985b0cb9f' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________