Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:7745 - Security Advisory
Issued:
2022-11-08
Updated:
2022-11-08

RHSA-2022:7745 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: freetype security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for freetype is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.

Security Fix(es):

  • FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404)
  • FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405)
  • Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The X server must be restarted (log out, then log back in) for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64

Fixes

  • BZ - 2077985 - CVE-2022-27406 Freetype: Segmentation violation via FT_Request_Size
  • BZ - 2077989 - CVE-2022-27404 FreeType: Buffer overflow in sfnt_init_face
  • BZ - 2077991 - CVE-2022-27405 FreeType: Segmentation violation via FNT_Size_Request

CVEs

  • CVE-2022-27404
  • CVE-2022-27405
  • CVE-2022-27406

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
x86_64
freetype-2.9.1-9.el8.i686.rpm SHA-256: b05be435f46b8bd175cb4f99e99f1c49922bce7ad834c6a78b2ec2ed397bb3cb
freetype-2.9.1-9.el8.x86_64.rpm SHA-256: d106458cafffa042800cd00f226a3ea2d38a7f41e07aeab749bde8fb5dbea43e
freetype-debuginfo-2.9.1-9.el8.i686.rpm SHA-256: ec57b24c81808ef407531e007b1f670ad2c3199872e1072ef71af67034c952bd
freetype-debuginfo-2.9.1-9.el8.x86_64.rpm SHA-256: 986816e93e0cdb4a6b0955d6111439199d46725dd88577cf42607638583e69c3
freetype-debugsource-2.9.1-9.el8.i686.rpm SHA-256: ce64d990c0dc9b402189d063fe6475139b48e05545e71f6d16d1def8fce29cbe
freetype-debugsource-2.9.1-9.el8.x86_64.rpm SHA-256: 5e15d29efa8cfa58ddd1760f7f9bee821e54d1581e56772d4808c22eac07a17f
freetype-demos-debuginfo-2.9.1-9.el8.i686.rpm SHA-256: 0b1ae23d35cceee6c4ed87e013c1ea3542e09e9417c6d73ab35ed318d1679873
freetype-demos-debuginfo-2.9.1-9.el8.x86_64.rpm SHA-256: 2b872fd73f2710eb710a213258a8d02be4baabb4f68ffcf3e084f9a4c5073f77
freetype-devel-2.9.1-9.el8.i686.rpm SHA-256: becb3f0f08608bb4bb91ae132556157691a626f2cff11cc66c1d14eb7987e1dc
freetype-devel-2.9.1-9.el8.x86_64.rpm SHA-256: f70bf1dbad1ec39407cb8fa4c01a10bb5fb10ca5c3a9272614bfdd9df8e00c0b

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
x86_64
freetype-2.9.1-9.el8.i686.rpm SHA-256: b05be435f46b8bd175cb4f99e99f1c49922bce7ad834c6a78b2ec2ed397bb3cb
freetype-2.9.1-9.el8.x86_64.rpm SHA-256: d106458cafffa042800cd00f226a3ea2d38a7f41e07aeab749bde8fb5dbea43e
freetype-debuginfo-2.9.1-9.el8.i686.rpm SHA-256: ec57b24c81808ef407531e007b1f670ad2c3199872e1072ef71af67034c952bd
freetype-debuginfo-2.9.1-9.el8.x86_64.rpm SHA-256: 986816e93e0cdb4a6b0955d6111439199d46725dd88577cf42607638583e69c3
freetype-debugsource-2.9.1-9.el8.i686.rpm SHA-256: ce64d990c0dc9b402189d063fe6475139b48e05545e71f6d16d1def8fce29cbe
freetype-debugsource-2.9.1-9.el8.x86_64.rpm SHA-256: 5e15d29efa8cfa58ddd1760f7f9bee821e54d1581e56772d4808c22eac07a17f
freetype-demos-debuginfo-2.9.1-9.el8.i686.rpm SHA-256: 0b1ae23d35cceee6c4ed87e013c1ea3542e09e9417c6d73ab35ed318d1679873
freetype-demos-debuginfo-2.9.1-9.el8.x86_64.rpm SHA-256: 2b872fd73f2710eb710a213258a8d02be4baabb4f68ffcf3e084f9a4c5073f77
freetype-devel-2.9.1-9.el8.i686.rpm SHA-256: becb3f0f08608bb4bb91ae132556157691a626f2cff11cc66c1d14eb7987e1dc
freetype-devel-2.9.1-9.el8.x86_64.rpm SHA-256: f70bf1dbad1ec39407cb8fa4c01a10bb5fb10ca5c3a9272614bfdd9df8e00c0b

Red Hat Enterprise Linux for IBM z Systems 8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
s390x
freetype-2.9.1-9.el8.s390x.rpm SHA-256: 174a3b6a133a3b44a45fe37e9647385b43f306b25a810f6cf40cf2ddbc1b517f
freetype-debuginfo-2.9.1-9.el8.s390x.rpm SHA-256: 8835a83187e85ccab9e9a190267d415e169ce98c4c5583170e1a49ca001d3c22
freetype-debugsource-2.9.1-9.el8.s390x.rpm SHA-256: 1863aa57ac3667a452b0e83a503620133438eb654c91ad0db326efbdae3e1fe4
freetype-demos-debuginfo-2.9.1-9.el8.s390x.rpm SHA-256: ab2392af74f7bc2171ecfc9e0d9831c9c06eba0f67a3a68d3633468b17404ba5
freetype-devel-2.9.1-9.el8.s390x.rpm SHA-256: 9c367c434dd07f5800a1432f1156d4694221fbc775d1b8f09045d4285ac5cf62

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
s390x
freetype-2.9.1-9.el8.s390x.rpm SHA-256: 174a3b6a133a3b44a45fe37e9647385b43f306b25a810f6cf40cf2ddbc1b517f
freetype-debuginfo-2.9.1-9.el8.s390x.rpm SHA-256: 8835a83187e85ccab9e9a190267d415e169ce98c4c5583170e1a49ca001d3c22
freetype-debugsource-2.9.1-9.el8.s390x.rpm SHA-256: 1863aa57ac3667a452b0e83a503620133438eb654c91ad0db326efbdae3e1fe4
freetype-demos-debuginfo-2.9.1-9.el8.s390x.rpm SHA-256: ab2392af74f7bc2171ecfc9e0d9831c9c06eba0f67a3a68d3633468b17404ba5
freetype-devel-2.9.1-9.el8.s390x.rpm SHA-256: 9c367c434dd07f5800a1432f1156d4694221fbc775d1b8f09045d4285ac5cf62

Red Hat Enterprise Linux for Power, little endian 8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
ppc64le
freetype-2.9.1-9.el8.ppc64le.rpm SHA-256: 10fec02ce2aa9f275aa1e32ad357ce223f4605af29c46625bb172c1d37de579b
freetype-debuginfo-2.9.1-9.el8.ppc64le.rpm SHA-256: 6fc896a6b376a8f982716c750fa31ad7ed7640541dddf8a3b9e369aad0e7ef00
freetype-debugsource-2.9.1-9.el8.ppc64le.rpm SHA-256: 03a2f46ef8ab4f1f10743947af66df0550753ad46e1e49000ff6093648b3abf6
freetype-demos-debuginfo-2.9.1-9.el8.ppc64le.rpm SHA-256: 619cac82aaad0a79e863ecca02903dd762a83efab7b790dc632c9835dce36ae3
freetype-devel-2.9.1-9.el8.ppc64le.rpm SHA-256: 407350e3517947cc81ba41c5d398e8bab63eb36baf96209827675bb366019883

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
ppc64le
freetype-2.9.1-9.el8.ppc64le.rpm SHA-256: 10fec02ce2aa9f275aa1e32ad357ce223f4605af29c46625bb172c1d37de579b
freetype-debuginfo-2.9.1-9.el8.ppc64le.rpm SHA-256: 6fc896a6b376a8f982716c750fa31ad7ed7640541dddf8a3b9e369aad0e7ef00
freetype-debugsource-2.9.1-9.el8.ppc64le.rpm SHA-256: 03a2f46ef8ab4f1f10743947af66df0550753ad46e1e49000ff6093648b3abf6
freetype-demos-debuginfo-2.9.1-9.el8.ppc64le.rpm SHA-256: 619cac82aaad0a79e863ecca02903dd762a83efab7b790dc632c9835dce36ae3
freetype-devel-2.9.1-9.el8.ppc64le.rpm SHA-256: 407350e3517947cc81ba41c5d398e8bab63eb36baf96209827675bb366019883

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
x86_64
freetype-2.9.1-9.el8.i686.rpm SHA-256: b05be435f46b8bd175cb4f99e99f1c49922bce7ad834c6a78b2ec2ed397bb3cb
freetype-2.9.1-9.el8.x86_64.rpm SHA-256: d106458cafffa042800cd00f226a3ea2d38a7f41e07aeab749bde8fb5dbea43e
freetype-debuginfo-2.9.1-9.el8.i686.rpm SHA-256: ec57b24c81808ef407531e007b1f670ad2c3199872e1072ef71af67034c952bd
freetype-debuginfo-2.9.1-9.el8.x86_64.rpm SHA-256: 986816e93e0cdb4a6b0955d6111439199d46725dd88577cf42607638583e69c3
freetype-debugsource-2.9.1-9.el8.i686.rpm SHA-256: ce64d990c0dc9b402189d063fe6475139b48e05545e71f6d16d1def8fce29cbe
freetype-debugsource-2.9.1-9.el8.x86_64.rpm SHA-256: 5e15d29efa8cfa58ddd1760f7f9bee821e54d1581e56772d4808c22eac07a17f
freetype-demos-debuginfo-2.9.1-9.el8.i686.rpm SHA-256: 0b1ae23d35cceee6c4ed87e013c1ea3542e09e9417c6d73ab35ed318d1679873
freetype-demos-debuginfo-2.9.1-9.el8.x86_64.rpm SHA-256: 2b872fd73f2710eb710a213258a8d02be4baabb4f68ffcf3e084f9a4c5073f77
freetype-devel-2.9.1-9.el8.i686.rpm SHA-256: becb3f0f08608bb4bb91ae132556157691a626f2cff11cc66c1d14eb7987e1dc
freetype-devel-2.9.1-9.el8.x86_64.rpm SHA-256: f70bf1dbad1ec39407cb8fa4c01a10bb5fb10ca5c3a9272614bfdd9df8e00c0b

Red Hat Enterprise Linux for ARM 64 8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
aarch64
freetype-2.9.1-9.el8.aarch64.rpm SHA-256: 4156bfa683a8a85dc127227893239a0bc68455ab7b22811687560a375c779c2c
freetype-debuginfo-2.9.1-9.el8.aarch64.rpm SHA-256: 6d32dee2daedb4075853fe384b99636bc79adee4c69d41656990285a82db5dd1
freetype-debugsource-2.9.1-9.el8.aarch64.rpm SHA-256: 9f49327c787406c0beeec58c60c19473c3c36f0464995c75d8d04d0cca5c42f8
freetype-demos-debuginfo-2.9.1-9.el8.aarch64.rpm SHA-256: b8b766998abf47db268d71baff47d56a4308a34a5edea5b9c4a27ac616ec8d1a
freetype-devel-2.9.1-9.el8.aarch64.rpm SHA-256: 4ed5537b18160eb983402f13acf84bc06a7a8f1c01a1adc8dd3cc95107660849

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
aarch64
freetype-2.9.1-9.el8.aarch64.rpm SHA-256: 4156bfa683a8a85dc127227893239a0bc68455ab7b22811687560a375c779c2c
freetype-debuginfo-2.9.1-9.el8.aarch64.rpm SHA-256: 6d32dee2daedb4075853fe384b99636bc79adee4c69d41656990285a82db5dd1
freetype-debugsource-2.9.1-9.el8.aarch64.rpm SHA-256: 9f49327c787406c0beeec58c60c19473c3c36f0464995c75d8d04d0cca5c42f8
freetype-demos-debuginfo-2.9.1-9.el8.aarch64.rpm SHA-256: b8b766998abf47db268d71baff47d56a4308a34a5edea5b9c4a27ac616ec8d1a
freetype-devel-2.9.1-9.el8.aarch64.rpm SHA-256: 4ed5537b18160eb983402f13acf84bc06a7a8f1c01a1adc8dd3cc95107660849

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
ppc64le
freetype-2.9.1-9.el8.ppc64le.rpm SHA-256: 10fec02ce2aa9f275aa1e32ad357ce223f4605af29c46625bb172c1d37de579b
freetype-debuginfo-2.9.1-9.el8.ppc64le.rpm SHA-256: 6fc896a6b376a8f982716c750fa31ad7ed7640541dddf8a3b9e369aad0e7ef00
freetype-debugsource-2.9.1-9.el8.ppc64le.rpm SHA-256: 03a2f46ef8ab4f1f10743947af66df0550753ad46e1e49000ff6093648b3abf6
freetype-demos-debuginfo-2.9.1-9.el8.ppc64le.rpm SHA-256: 619cac82aaad0a79e863ecca02903dd762a83efab7b790dc632c9835dce36ae3
freetype-devel-2.9.1-9.el8.ppc64le.rpm SHA-256: 407350e3517947cc81ba41c5d398e8bab63eb36baf96209827675bb366019883

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
freetype-2.9.1-9.el8.src.rpm SHA-256: 0b6cd37d7b0f45bd99eb6f59a535bb9f953173d482430e9149c25c0a0ad6ebf0
x86_64
freetype-2.9.1-9.el8.i686.rpm SHA-256: b05be435f46b8bd175cb4f99e99f1c49922bce7ad834c6a78b2ec2ed397bb3cb
freetype-2.9.1-9.el8.x86_64.rpm SHA-256: d106458cafffa042800cd00f226a3ea2d38a7f41e07aeab749bde8fb5dbea43e
freetype-debuginfo-2.9.1-9.el8.i686.rpm SHA-256: ec57b24c81808ef407531e007b1f670ad2c3199872e1072ef71af67034c952bd
freetype-debuginfo-2.9.1-9.el8.x86_64.rpm SHA-256: 986816e93e0cdb4a6b0955d6111439199d46725dd88577cf42607638583e69c3
freetype-debugsource-2.9.1-9.el8.i686.rpm SHA-256: ce64d990c0dc9b402189d063fe6475139b48e05545e71f6d16d1def8fce29cbe
freetype-debugsource-2.9.1-9.el8.x86_64.rpm SHA-256: 5e15d29efa8cfa58ddd1760f7f9bee821e54d1581e56772d4808c22eac07a17f
freetype-demos-debuginfo-2.9.1-9.el8.i686.rpm SHA-256: 0b1ae23d35cceee6c4ed87e013c1ea3542e09e9417c6d73ab35ed318d1679873
freetype-demos-debuginfo-2.9.1-9.el8.x86_64.rpm SHA-256: 2b872fd73f2710eb710a213258a8d02be4baabb4f68ffcf3e084f9a4c5073f77
freetype-devel-2.9.1-9.el8.i686.rpm SHA-256: becb3f0f08608bb4bb91ae132556157691a626f2cff11cc66c1d14eb7987e1dc
freetype-devel-2.9.1-9.el8.x86_64.rpm SHA-256: f70bf1dbad1ec39407cb8fa4c01a10bb5fb10ca5c3a9272614bfdd9df8e00c0b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility