[ALAS2-2020-1565] Amazon Linux 2 2017.12 - ALAS2-2020-1565: important priority package update for freetype
Severity
Important
Affected Packages
12
CVEs
1
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2020-15999:
Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
1890210: CVE-2020-15999 freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png
- ID
- ALAS2-2020-1565
- Severity
- important
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2020-1565.html
- Published
-
2020-12-08T20:55:00
(3 years ago) - Modified
-
2020-12-08T22:21:00
(3 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALPINE:CVE-2020-15999
- ALSA-2020:4952
- ASA-202010-10
- ASA-202010-11
- ASA-202011-12
- ASB-A-171232105
- CISA-2021:1103
- DSA-4777-1
- DSA-4824-1
- ELSA-2020-4907
- ELSA-2020-4952
- FEDORA-2020-6299161e89
- FEDORA-2020-6b35849edd
- FEDORA-2020-768b1690f8
- FREEBSD:458DF97F-1440-11EB-AAEC-E0D55E2A8BF9
- FREEBSD:F4722927-1375-11EB-8711-3065EC8FD3EC
- GLSA-202010-07
- GLSA-202011-12
- GLSA-202012-04
- GLSA-202401-19
- MFSA-2020-50
- MFSA-2020-51
- MFSA-2020-52
- MS:CVE-2020-15999
- openSUSE-SU-2020:1718-1
- openSUSE-SU-2020:1731-1
- openSUSE-SU-2020:1734-1
- openSUSE-SU-2020:1737-1
- openSUSE-SU-2020:1744-1
- openSUSE-SU-2020:1829-1
- openSUSE-SU-2020:1952-1
- openSUSE-SU-2020:2020-1
- openSUSE-SU-2020:2031-1
- openSUSE-SU-2020:2096-1
- openSUSE-SU-2020:2187-1
- openSUSE-SU-2020:2315-1
- openSUSE-SU-2021:1134-1
- RHSA-2020:4351
- RHSA-2020:4907
- RHSA-2020:4952
- RLSA-2020:4952
- SSA:2020-294-01
- SUSE-SU-2020:2995-1
- SUSE-SU-2020:2998-1
- SUSE-SU-2020:3383-1
- SUSE-SU-2020:3458-1
- SUSE-SU-2020:3528-1
- SUSE-SU-2020:3548-1
- USN-4593-1
- USN-4593-2
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2020-15999 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/freetype?arch=x86_64&distro=amazonlinux-2 | amazonlinux | freetype | < 2.8-14.amzn2.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/freetype?arch=i686&distro=amazonlinux-2 | amazonlinux | freetype | < 2.8-14.amzn2.1 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/freetype?arch=aarch64&distro=amazonlinux-2 | amazonlinux | freetype | < 2.8-14.amzn2.1 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/freetype-devel?arch=x86_64&distro=amazonlinux-2 | amazonlinux | freetype-devel | < 2.8-14.amzn2.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/freetype-devel?arch=i686&distro=amazonlinux-2 | amazonlinux | freetype-devel | < 2.8-14.amzn2.1 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/freetype-devel?arch=aarch64&distro=amazonlinux-2 | amazonlinux | freetype-devel | < 2.8-14.amzn2.1 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/freetype-demos?arch=x86_64&distro=amazonlinux-2 | amazonlinux | freetype-demos | < 2.8-14.amzn2.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/freetype-demos?arch=i686&distro=amazonlinux-2 | amazonlinux | freetype-demos | < 2.8-14.amzn2.1 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/freetype-demos?arch=aarch64&distro=amazonlinux-2 | amazonlinux | freetype-demos | < 2.8-14.amzn2.1 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/freetype-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | freetype-debuginfo | < 2.8-14.amzn2.1 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/freetype-debuginfo?arch=i686&distro=amazonlinux-2 | amazonlinux | freetype-debuginfo | < 2.8-14.amzn2.1 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/freetype-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | freetype-debuginfo | < 2.8-14.amzn2.1 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |