{"api_version":"1","generated_at":"2026-04-17T09:19:51+00:00","cve":"CVE-2022-27406","urls":{"html":"https://cve.report/CVE-2022-27406","api":"https://cve.report/api/cve/CVE-2022-27406.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-27406","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-27406"},"summary":{"title":"CVE-2022-27406","description":"FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-04-22 14:15:00","updated_at":"2023-11-07 03:45:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/","name":"FEDORA-2022-7ece4f6d74","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: mingw-freetype-2.12.1-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140","name":"https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140","refsource":"MISC","tags":[],"title":"another SEGV in FT_Set_Char_Size (#1140) · Issues · FreeType / FreeType · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/","name":"FEDORA-2022-80e1724780","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: freetype-2.11.0-6.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/","name":"FEDORA-2022-5e45671294","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: freetype-2.10.4-6.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/","name":"FEDORA-2022-2dd60f1f00","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: freetype-2.12.1-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/","name":"FEDORA-2022-80e1724780","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: freetype-2.11.0-6.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/","name":"FEDORA-2022-2dd60f1f00","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: freetype-2.12.1-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/","name":"FEDORA-2022-0985b0cb9f","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: mingw-freetype-2.11.0-2.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/","name":"FEDORA-2022-7ece4f6d74","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: mingw-freetype-2.12.1-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/","name":"FEDORA-2022-5e45671294","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: freetype-2.10.4-6.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://freetype.com","name":"http://freetype.com","refsource":"MISC","tags":[],"title":"Fonts.com | Find, Buy & Download Best Fonts","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/","name":"FEDORA-2022-0985b0cb9f","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: mingw-freetype-2.11.0-2.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-27406","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27406","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"27406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freetype","cpe5":"freetype","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-27406","qid":"160215","title":"Oracle Enterprise Linux Security Update for freetype (ELSA-2022-7745)"},{"cve":"CVE-2022-27406","qid":"160280","title":"Oracle Enterprise Linux Security Update for freetype (ELSA-2022-8340)"},{"cve":"CVE-2022-27406","qid":"180848","title":"Debian Security Update for freetype (CVE-2022-27406)"},{"cve":"CVE-2022-27406","qid":"198869","title":"Ubuntu Security Notification for FreeType Vulnerabilities (USN-5528-1)"},{"cve":"CVE-2022-27406","qid":"240834","title":"Red Hat Update for freetype (RHSA-2022:7745)"},{"cve":"CVE-2022-27406","qid":"240867","title":"Red Hat Update for freetype (RHSA-2022:8340)"},{"cve":"CVE-2022-27406","qid":"242743","title":"Red Hat Update for freetype (RHSA-2024:0420)"},{"cve":"CVE-2022-27406","qid":"282659","title":"Fedora Security Update for mingw (FEDORA-2022-0985b0cb9f)"},{"cve":"CVE-2022-27406","qid":"282716","title":"Fedora Security Update for mingw (FEDORA-2022-7ece4f6d74)"},{"cve":"CVE-2022-27406","qid":"282719","title":"Fedora Security Update for freetype (FEDORA-2022-2dd60f1f00)"},{"cve":"CVE-2022-27406","qid":"282742","title":"Fedora Security Update for freetype (FEDORA-2022-5e45671294)"},{"cve":"CVE-2022-27406","qid":"282743","title":"Fedora Security Update for freetype (FEDORA-2022-80e1724780)"},{"cve":"CVE-2022-27406","qid":"354399","title":"Amazon Linux Security Advisory for freetype : ALAS2022-2022-154"},{"cve":"CVE-2022-27406","qid":"354417","title":"Amazon Linux Security Advisory for freetype : ALAS2022-2022-238"},{"cve":"CVE-2022-27406","qid":"354569","title":"Amazon Linux Security Advisory for freetype : ALAS-2022-238"},{"cve":"CVE-2022-27406","qid":"354657","title":"Amazon Linux Security Advisory for freetype : ALAS2-2023-1909"},{"cve":"CVE-2022-27406","qid":"355187","title":"Amazon Linux Security Advisory for freetype : ALAS2023-2023-074"},{"cve":"CVE-2022-27406","qid":"355420","title":"Amazon Linux Security Advisory for freetype : ALAS2023-2023-188"},{"cve":"CVE-2022-27406","qid":"355431","title":"Amazon Linux Security Advisory for freetype : ALAS-2023-1764"},{"cve":"CVE-2022-27406","qid":"355517","title":"Amazon Linux Security Advisory for freetype : AL2012-2023-416"},{"cve":"CVE-2022-27406","qid":"500190","title":"Alpine Linux Security Update for freetype"},{"cve":"CVE-2022-27406","qid":"501405","title":"Alpine Linux Security Update for freetype"},{"cve":"CVE-2022-27406","qid":"501959","title":"Alpine Linux Security Update for freetype"},{"cve":"CVE-2022-27406","qid":"502439","title":"Alpine Linux Security Update for freetype"},{"cve":"CVE-2022-27406","qid":"502485","title":"Alpine Linux Security Update for qt5-qtwebengine"},{"cve":"CVE-2022-27406","qid":"502946","title":"Alpine Linux Security Update for qt5-qtwebengine"},{"cve":"CVE-2022-27406","qid":"503930","title":"Alpine Linux Security Update for freetype"},{"cve":"CVE-2022-27406","qid":"505816","title":"Alpine Linux Security Update for qt5-qtwebengine"},{"cve":"CVE-2022-27406","qid":"610502","title":"Google Android August 2023 Security Patch Missing for Huawei EMUI"},{"cve":"CVE-2022-27406","qid":"610504","title":"Google Android Devices July 2023 Security Patch Missing"},{"cve":"CVE-2022-27406","qid":"671885","title":"EulerOS Security Update for freetype (EulerOS-SA-2022-1928)"},{"cve":"CVE-2022-27406","qid":"671922","title":"EulerOS Security Update for freetype (EulerOS-SA-2022-1994)"},{"cve":"CVE-2022-27406","qid":"671940","title":"EulerOS Security Update for freetype (EulerOS-SA-2022-1964)"},{"cve":"CVE-2022-27406","qid":"671985","title":"EulerOS Security Update for freetype (EulerOS-SA-2022-2155)"},{"cve":"CVE-2022-27406","qid":"671994","title":"EulerOS Security Update for freetype (EulerOS-SA-2022-2130)"},{"cve":"CVE-2022-27406","qid":"710854","title":"Gentoo Linux FreeType Multiple Vulnerabilities (GLSA 202402-06)"},{"cve":"CVE-2022-27406","qid":"752575","title":"SUSE Enterprise Linux Security Update for freetype2 (SUSE-SU-2022:3252-1)"},{"cve":"CVE-2022-27406","qid":"752605","title":"SUSE Enterprise Linux Security Update for freetype2 (SUSE-SU-2022:3252-2)"},{"cve":"CVE-2022-27406","qid":"901289","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for freetype (9613)"},{"cve":"CVE-2022-27406","qid":"901850","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for freetype (9581)"},{"cve":"CVE-2022-27406","qid":"903719","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for freetype (9613-1)"},{"cve":"CVE-2022-27406","qid":"903885","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for freetype (9581-1)"},{"cve":"CVE-2022-27406","qid":"906934","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for qt5-qtbase (26759-1)"},{"cve":"CVE-2022-27406","qid":"940746","title":"AlmaLinux Security Update for freetype (ALSA-2022:7745)"},{"cve":"CVE-2022-27406","qid":"940791","title":"AlmaLinux Security Update for freetype (ALSA-2022:8340)"},{"cve":"CVE-2022-27406","qid":"960179","title":"Rocky Linux Security Update for freetype (RLSA-2022:7745)"},{"cve":"CVE-2022-27406","qid":"960605","title":"Rocky Linux Security Update for freetype (RLSA-2022:8340)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-27406","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"http://freetype.com","refsource":"MISC","name":"http://freetype.com"},{"url":"https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140","refsource":"MISC","name":"https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140"},{"refsource":"FEDORA","name":"FEDORA-2022-2dd60f1f00","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/"},{"refsource":"FEDORA","name":"FEDORA-2022-0985b0cb9f","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/"},{"refsource":"FEDORA","name":"FEDORA-2022-7ece4f6d74","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/"},{"refsource":"FEDORA","name":"FEDORA-2022-5e45671294","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/"},{"refsource":"FEDORA","name":"FEDORA-2022-80e1724780","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/"}]}},"nvd":{"publishedDate":"2022-04-22 14:15:00","lastModifiedDate":"2023-11-07 03:45:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","versionEndExcluding":"2.12.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}