[RHSA-2020:4907] freetype security update
Severity
Important
Affected Packages
18
CVEs
1
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.
Security Fix(es):
- freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png (CVE-2020-15999)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2020:4907
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2020:4907
- Published
-
2020-11-04T00:00:00
(3 years ago) - Modified
-
2020-11-04T00:00:00
(3 years ago) - Rights
- Copyright 2020 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2020-1565
- ALPINE:CVE-2020-15999
- ALSA-2020:4952
- ASA-202010-10
- ASA-202010-11
- ASA-202011-12
- ASB-A-171232105
- CISA-2021:1103
- DSA-4777-1
- DSA-4824-1
- ELSA-2020-4907
- ELSA-2020-4952
- FEDORA-2020-6299161e89
- FEDORA-2020-6b35849edd
- FEDORA-2020-768b1690f8
- FREEBSD:458DF97F-1440-11EB-AAEC-E0D55E2A8BF9
- FREEBSD:F4722927-1375-11EB-8711-3065EC8FD3EC
- GLSA-202010-07
- GLSA-202011-12
- GLSA-202012-04
- GLSA-202401-19
- MFSA-2020-50
- MFSA-2020-51
- MFSA-2020-52
- MS:CVE-2020-15999
- openSUSE-SU-2020:1718-1
- openSUSE-SU-2020:1731-1
- openSUSE-SU-2020:1734-1
- openSUSE-SU-2020:1737-1
- openSUSE-SU-2020:1744-1
- openSUSE-SU-2020:1829-1
- openSUSE-SU-2020:1952-1
- openSUSE-SU-2020:2020-1
- openSUSE-SU-2020:2031-1
- openSUSE-SU-2020:2096-1
- openSUSE-SU-2020:2187-1
- openSUSE-SU-2020:2315-1
- openSUSE-SU-2021:1134-1
- RHSA-2020:4351
- RHSA-2020:4952
- RLSA-2020:4952
- SSA:2020-294-01
- SUSE-SU-2020:2995-1
- SUSE-SU-2020:2998-1
- SUSE-SU-2020:3383-1
- SUSE-SU-2020:3458-1
- SUSE-SU-2020:3528-1
- SUSE-SU-2020:3548-1
- USN-4593-1
- USN-4593-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1890210 | https://bugzilla.redhat.com/1890210 | |
RHSA | RHSA-2020:4907 | https://access.redhat.com/errata/RHSA-2020:4907 | |
CVE | CVE-2020-15999 | https://access.redhat.com/security/cve/CVE-2020-15999 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/freetype?arch=x86_64&distro=redhat-7.9 | redhat | freetype | < 2.8-14.el7_9.1 | redhat-7.9 | x86_64 | |
Affected | pkg:rpm/redhat/freetype?arch=s390x&distro=redhat-7.9 | redhat | freetype | < 2.8-14.el7_9.1 | redhat-7.9 | s390x | |
Affected | pkg:rpm/redhat/freetype?arch=s390&distro=redhat-7.9 | redhat | freetype | < 2.8-14.el7_9.1 | redhat-7.9 | s390 | |
Affected | pkg:rpm/redhat/freetype?arch=ppc64le&distro=redhat-7.9 | redhat | freetype | < 2.8-14.el7_9.1 | redhat-7.9 | ppc64le | |
Affected | pkg:rpm/redhat/freetype?arch=ppc64&distro=redhat-7.9 | redhat | freetype | < 2.8-14.el7_9.1 | redhat-7.9 | ppc64 | |
Affected | pkg:rpm/redhat/freetype?arch=ppc&distro=redhat-7.9 | redhat | freetype | < 2.8-14.el7_9.1 | redhat-7.9 | ppc | |
Affected | pkg:rpm/redhat/freetype?arch=i686&distro=redhat-7.9 | redhat | freetype | < 2.8-14.el7_9.1 | redhat-7.9 | i686 | |
Affected | pkg:rpm/redhat/freetype-devel?arch=x86_64&distro=redhat-7.9 | redhat | freetype-devel | < 2.8-14.el7_9.1 | redhat-7.9 | x86_64 | |
Affected | pkg:rpm/redhat/freetype-devel?arch=s390x&distro=redhat-7.9 | redhat | freetype-devel | < 2.8-14.el7_9.1 | redhat-7.9 | s390x | |
Affected | pkg:rpm/redhat/freetype-devel?arch=s390&distro=redhat-7.9 | redhat | freetype-devel | < 2.8-14.el7_9.1 | redhat-7.9 | s390 | |
Affected | pkg:rpm/redhat/freetype-devel?arch=ppc64le&distro=redhat-7.9 | redhat | freetype-devel | < 2.8-14.el7_9.1 | redhat-7.9 | ppc64le | |
Affected | pkg:rpm/redhat/freetype-devel?arch=ppc64&distro=redhat-7.9 | redhat | freetype-devel | < 2.8-14.el7_9.1 | redhat-7.9 | ppc64 | |
Affected | pkg:rpm/redhat/freetype-devel?arch=ppc&distro=redhat-7.9 | redhat | freetype-devel | < 2.8-14.el7_9.1 | redhat-7.9 | ppc | |
Affected | pkg:rpm/redhat/freetype-devel?arch=i686&distro=redhat-7.9 | redhat | freetype-devel | < 2.8-14.el7_9.1 | redhat-7.9 | i686 | |
Affected | pkg:rpm/redhat/freetype-demos?arch=x86_64&distro=redhat-7.9 | redhat | freetype-demos | < 2.8-14.el7_9.1 | redhat-7.9 | x86_64 | |
Affected | pkg:rpm/redhat/freetype-demos?arch=s390x&distro=redhat-7.9 | redhat | freetype-demos | < 2.8-14.el7_9.1 | redhat-7.9 | s390x | |
Affected | pkg:rpm/redhat/freetype-demos?arch=ppc64le&distro=redhat-7.9 | redhat | freetype-demos | < 2.8-14.el7_9.1 | redhat-7.9 | ppc64le | |
Affected | pkg:rpm/redhat/freetype-demos?arch=ppc64&distro=redhat-7.9 | redhat | freetype-demos | < 2.8-14.el7_9.1 | redhat-7.9 | ppc64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |