Skip to navigation

Security Advisory Important: freetype security update

Advisory: RHSA-2012:0467-1
Type: Security Advisory
Severity: Important
Issued on: 2012-04-10
Last updated on: 2012-04-10
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2012-1126
CVE-2012-1127
CVE-2012-1130
CVE-2012-1131
CVE-2012-1132
CVE-2012-1134
CVE-2012-1136
CVE-2012-1137
CVE-2012-1139
CVE-2012-1140
CVE-2012-1141
CVE-2012-1142
CVE-2012-1143
CVE-2012-1144

Details

Updated freetype packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently.

Multiple flaws were found in the way FreeType handled TrueType Font (TTF),
Glyph Bitmap Distribution Format (BDF), Windows .fnt and .fon, and
PostScript Type 1 fonts. If a specially-crafted font file was loaded by an
application linked against FreeType, it could cause the application to
crash or, potentially, execute arbitrary code with the privileges of the
user running the application. (CVE-2012-1134, CVE-2012-1136, CVE-2012-1142,
CVE-2012-1144)

Multiple flaws were found in the way FreeType handled fonts in various
formats. If a specially-crafted font file was loaded by an application
linked against FreeType, it could cause the application to crash.
(CVE-2012-1126, CVE-2012-1127, CVE-2012-1130, CVE-2012-1131, CVE-2012-1132,
CVE-2012-1137, CVE-2012-1139, CVE-2012-1140, CVE-2012-1141, CVE-2012-1143)

Red Hat would like to thank Mateusz Jurczyk of the Google Security Team for
reporting these issues.

Users are advised to upgrade to these updated packages, which contain a
backported patch to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
freetype-2.2.1-31.el5_8.1.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: 96fe8e7908a683b561beddb9d0548f5d
SHA-256: ab12d7d0a6f0aad4d0144badd94ec80cacae9dbebb6c484f320a95725616ab45
 
IA-32:
freetype-demos-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: 752273fffa9ec3420daf469c2030dab0
SHA-256: 63959d108252670b81478021c43a57382c5fcdc213000f000ce30f06c4d79de6
freetype-devel-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: 4a6d06797a2766c3954b0076c185a1fa
SHA-256: 46d60af38c2071159950a39d03e185a9676e840a7129cc01b39f3b696d1738c2
 
x86_64:
freetype-demos-2.2.1-31.el5_8.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 32d9da9832adb2c46102d998ee6ba55d
SHA-256: 7141abd62ea77f3b04cc0308f3409f2f5e0f9f2f9667bb89459e836adbc6d682
freetype-devel-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: 4a6d06797a2766c3954b0076c185a1fa
SHA-256: 46d60af38c2071159950a39d03e185a9676e840a7129cc01b39f3b696d1738c2
freetype-devel-2.2.1-31.el5_8.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 498431337acde0ab3506f8ae8d4b6515
SHA-256: 620e72fbbc7a9f821fb49728f7db547c973bd828e3ec3d05a3869fa00b82e6c6
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
freetype-2.2.1-31.el5_8.1.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: 96fe8e7908a683b561beddb9d0548f5d
SHA-256: ab12d7d0a6f0aad4d0144badd94ec80cacae9dbebb6c484f320a95725616ab45
 
IA-32:
freetype-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: feb6ee606de03d5ee8217a9fd3373fe7
SHA-256: 943361fd7e04355891331f9d56eba613dd948f99045c39232e897fac1d2d5802
freetype-demos-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: 752273fffa9ec3420daf469c2030dab0
SHA-256: 63959d108252670b81478021c43a57382c5fcdc213000f000ce30f06c4d79de6
freetype-devel-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: 4a6d06797a2766c3954b0076c185a1fa
SHA-256: 46d60af38c2071159950a39d03e185a9676e840a7129cc01b39f3b696d1738c2
 
IA-64:
freetype-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: feb6ee606de03d5ee8217a9fd3373fe7
SHA-256: 943361fd7e04355891331f9d56eba613dd948f99045c39232e897fac1d2d5802
freetype-2.2.1-31.el5_8.1.ia64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 57db9cfc993895fa6c8602c096d4de06
SHA-256: 14f23bf973adbcb6923758856e0fa525ed4e4bd8896028f2b07e15e5eb19ed1e
freetype-demos-2.2.1-31.el5_8.1.ia64.rpm
File outdated by:  RHSA-2013:0216
    MD5: bd3f1d3358f273d0d99f73d671abb562
SHA-256: 1326ce29bfcaad48613c4167701e90238c709d96609c27412ad762a75801aeb0
freetype-devel-2.2.1-31.el5_8.1.ia64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a188df016925e462cdb1db31c66f386c
SHA-256: fe2c4e0a4ee93097d42798fb0b9feb3132fb2b402cd18b63a9e3658086f30747
 
PPC:
freetype-2.2.1-31.el5_8.1.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: 1234db43fd4e80e315961a6ba87a313f
SHA-256: 5a0c0c8d43893265ef61c22d59b9dd286ff08bfe6b1c1ef61fba1e435108d76a
freetype-2.2.1-31.el5_8.1.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: c7d9a814ddf395a09af7d58b7b383414
SHA-256: b40d53cdc79f125c3254ba6cb02c2283868e1cb98308a9eb9d74f0ee38bc8c97
freetype-demos-2.2.1-31.el5_8.1.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: e7b44029cc6f297cb836440eb991bef5
SHA-256: 3907f8a7ee3b74d6515b79244f3f5ca1e56205e775b7048a7036fb0c613dea0a
freetype-devel-2.2.1-31.el5_8.1.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: 204b624c765c51ef04302b2564140320
SHA-256: dd824518051a40716ed0c84093fe6c8462987bd9ccb561d732f231de4a0f05dd
freetype-devel-2.2.1-31.el5_8.1.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: d086e86bb1dec677480bea1cadc80e83
SHA-256: e6c3b184e51d2e3d1bf4deae2842642f8dabecd2e43da9b3b42d9e0451e5a1b3
 
s390x:
freetype-2.2.1-31.el5_8.1.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: 961634b93291ac74aec814c9b6cd3ceb
SHA-256: ad7d63ac19cb321280cb6351233804a2496fb87959cef6dbe4328d585a0edbc3
freetype-2.2.1-31.el5_8.1.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: d6648b1085d6b864fe0f1a4b8831979e
SHA-256: d7151cc96ebaa30501bc73669f815d80d20d5e62a1160a9f586ca7e96c30da41
freetype-demos-2.2.1-31.el5_8.1.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: 56b8f83b914f23e99ade01efcefab1a1
SHA-256: d3fdc818620bfcc04eefe9a07a671aafa7a4f028fb9495824d0950ee9b095cd1
freetype-devel-2.2.1-31.el5_8.1.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: e7c4bdd31f48cd3784bf813e323d9257
SHA-256: fcaa31cbcd734588c4a24d1fe104a6c83a2af78e863cb036825c8ae29516bd8b
freetype-devel-2.2.1-31.el5_8.1.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: f3ed764d769a0e1b9b9546132a610752
SHA-256: 14962eb9014bc80bfa455d2f0bb7f060aeed707869b654982a7c559d88b353f2
 
x86_64:
freetype-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: feb6ee606de03d5ee8217a9fd3373fe7
SHA-256: 943361fd7e04355891331f9d56eba613dd948f99045c39232e897fac1d2d5802
freetype-2.2.1-31.el5_8.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: d138f0d51e7dacd22107c39221993fe5
SHA-256: 11035bfd23a41069b9a99da890e8776345f94906ada91ae68b5849210a2c4998
freetype-demos-2.2.1-31.el5_8.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 32d9da9832adb2c46102d998ee6ba55d
SHA-256: 7141abd62ea77f3b04cc0308f3409f2f5e0f9f2f9667bb89459e836adbc6d682
freetype-devel-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: 4a6d06797a2766c3954b0076c185a1fa
SHA-256: 46d60af38c2071159950a39d03e185a9676e840a7129cc01b39f3b696d1738c2
freetype-devel-2.2.1-31.el5_8.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 498431337acde0ab3506f8ae8d4b6515
SHA-256: 620e72fbbc7a9f821fb49728f7db547c973bd828e3ec3d05a3869fa00b82e6c6
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
freetype-2.2.1-31.el5_8.1.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: 96fe8e7908a683b561beddb9d0548f5d
SHA-256: ab12d7d0a6f0aad4d0144badd94ec80cacae9dbebb6c484f320a95725616ab45
 
IA-32:
freetype-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: feb6ee606de03d5ee8217a9fd3373fe7
SHA-256: 943361fd7e04355891331f9d56eba613dd948f99045c39232e897fac1d2d5802
 
x86_64:
freetype-2.2.1-31.el5_8.1.i386.rpm
File outdated by:  RHSA-2013:0216
    MD5: feb6ee606de03d5ee8217a9fd3373fe7
SHA-256: 943361fd7e04355891331f9d56eba613dd948f99045c39232e897fac1d2d5802
freetype-2.2.1-31.el5_8.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: d138f0d51e7dacd22107c39221993fe5
SHA-256: 11035bfd23a41069b9a99da890e8776345f94906ada91ae68b5849210a2c4998
 
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
freetype-2.3.11-6.el6_2.9.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e0df2ab7e37d001c876a081dfd93bbd0
SHA-256: 1ed505559265ef8ab40c46c4f728f1ca9c9aa99cc1b11fe9f9a00debb7fbe5f4
 
IA-32:
freetype-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-demos-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 03460e06268305aeec25127d25219145
SHA-256: 2b12008049cf06a94e9bc6d139abb0d5c21d7519d0f0e00c8a612e25f2e43968
freetype-devel-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
 
x86_64:
freetype-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 07719c02a5e4e38be2f7fbcccc3d9bf5
SHA-256: b96191eb0401e4c1cc59076f4b8d3f3c2f4125e8c3bd2104ac6d8168b37570a4
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-debuginfo-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 064ef58b04b5f186c603fe079527ada3
SHA-256: 02f157c85299ff801b8633b27c4093381a4729715a251732671bc523126d782d
freetype-demos-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a8571fa5477433aac8c1a4a7358777fb
SHA-256: 1aa84d8ac8b8af2ef6a6a10b8a1314079912a1800f650cafdfe1c311a37bcad8
freetype-devel-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
freetype-devel-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: ccce6aeab8899f607ff5ef165cf5bc2e
SHA-256: 50a1f14147acdc77c2bf49331abd76309888516eae8dd32078b3284e7eff824c
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
freetype-2.3.11-6.el6_2.9.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e0df2ab7e37d001c876a081dfd93bbd0
SHA-256: 1ed505559265ef8ab40c46c4f728f1ca9c9aa99cc1b11fe9f9a00debb7fbe5f4
 
x86_64:
freetype-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 07719c02a5e4e38be2f7fbcccc3d9bf5
SHA-256: b96191eb0401e4c1cc59076f4b8d3f3c2f4125e8c3bd2104ac6d8168b37570a4
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-debuginfo-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 064ef58b04b5f186c603fe079527ada3
SHA-256: 02f157c85299ff801b8633b27c4093381a4729715a251732671bc523126d782d
freetype-demos-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a8571fa5477433aac8c1a4a7358777fb
SHA-256: 1aa84d8ac8b8af2ef6a6a10b8a1314079912a1800f650cafdfe1c311a37bcad8
freetype-devel-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
freetype-devel-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: ccce6aeab8899f607ff5ef165cf5bc2e
SHA-256: 50a1f14147acdc77c2bf49331abd76309888516eae8dd32078b3284e7eff824c
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
freetype-2.3.11-6.el6_2.9.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e0df2ab7e37d001c876a081dfd93bbd0
SHA-256: 1ed505559265ef8ab40c46c4f728f1ca9c9aa99cc1b11fe9f9a00debb7fbe5f4
 
IA-32:
freetype-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-demos-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 03460e06268305aeec25127d25219145
SHA-256: 2b12008049cf06a94e9bc6d139abb0d5c21d7519d0f0e00c8a612e25f2e43968
freetype-devel-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
 
PPC:
freetype-2.3.11-6.el6_2.9.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: e3b212dec036027d9fe1ca1cb03cf59e
SHA-256: 434bdef8a101e7a05b8fc6c003b7e1711ba5caa90c0484a149674ef0a6feac13
freetype-2.3.11-6.el6_2.9.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: dca3057be55ea158b45138b00c299a70
SHA-256: a5ff769b0bf74b9f96cc0881083384162ff3733f4064423e426631f0589d6e38
freetype-debuginfo-2.3.11-6.el6_2.9.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: 8a76430c40425d7db2a837a66563487a
SHA-256: d7cc9ba24ee4fd95ea932eed2c05d39864cbb0132b240bf4d37ec7cdbb75a2f0
freetype-debuginfo-2.3.11-6.el6_2.9.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: d0f6a47db375e9491c7ca72a810230b1
SHA-256: 3a4a2060bb535621041959cea2cec1a3e7ac96f53de257e1c72c452c6a7089be
freetype-demos-2.3.11-6.el6_2.9.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: f7db1086a31ad586b8610e3eb0349c61
SHA-256: 56ed08f3fd3d5b99026da35052cd5bec494c577eb020497e33338b16639d090d
freetype-devel-2.3.11-6.el6_2.9.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: 68b97a11d9112bee59e2403ee081b10f
SHA-256: fb080c098212aadf61ad9a937fb1774fe8fedaca9a4fce6340b4e9187a652d56
freetype-devel-2.3.11-6.el6_2.9.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 151927fd303845c6781da628ca68a4ef
SHA-256: 88b69741b6528a02d340747ae5d2963d294678b2731a34fff352ea829f215a2a
 
s390x:
freetype-2.3.11-6.el6_2.9.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: 62fcbdcc44d25eee8a4cfb3360d73c99
SHA-256: 92170f0dc59072379d494cbdebb7430dc7426117a46b620c64188b9a0a6f3745
freetype-2.3.11-6.el6_2.9.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: c7e5b23627f7af96eb8a2369d6ee1bba
SHA-256: 89ef279389239fcf0e8ebe8fc6638500ab83ea25ecc70496d20c23b40105547a
freetype-debuginfo-2.3.11-6.el6_2.9.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: e701f44b2b633112066dd2addbd2d5ce
SHA-256: 53e1f60111419c15fb45a21b7a3181c50637406f9b8e166ac1cf726105cb19d4
freetype-debuginfo-2.3.11-6.el6_2.9.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: 66be9661036efd703ccba1425f5c406b
SHA-256: 4aaf68d0b15056da2edb2746fc0dd39269b1d4f0251576b1d191d2097bddd3f2
freetype-demos-2.3.11-6.el6_2.9.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: bc3e7030c5f4f65324b9632686f61c84
SHA-256: da93f8223a808b664e65b200c6a541484e21122e01761263fa4ca1b9ee2189db
freetype-devel-2.3.11-6.el6_2.9.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: dd9759446f4e7881a850e14864a94d07
SHA-256: 551460cd1da0134f0a6e70abec837e595482152d840bd357e5fd9f604fe52fa5
freetype-devel-2.3.11-6.el6_2.9.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9527438e726293459f36c4f4882e1f66
SHA-256: 4144b8c96b38c330c9af2285ec03bfb07c62af6385b26b6b40691c6e06099972
 
x86_64:
freetype-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 07719c02a5e4e38be2f7fbcccc3d9bf5
SHA-256: b96191eb0401e4c1cc59076f4b8d3f3c2f4125e8c3bd2104ac6d8168b37570a4
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-debuginfo-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 064ef58b04b5f186c603fe079527ada3
SHA-256: 02f157c85299ff801b8633b27c4093381a4729715a251732671bc523126d782d
freetype-demos-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a8571fa5477433aac8c1a4a7358777fb
SHA-256: 1aa84d8ac8b8af2ef6a6a10b8a1314079912a1800f650cafdfe1c311a37bcad8
freetype-devel-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
freetype-devel-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: ccce6aeab8899f607ff5ef165cf5bc2e
SHA-256: 50a1f14147acdc77c2bf49331abd76309888516eae8dd32078b3284e7eff824c
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
freetype-2.3.11-6.el6_2.9.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e0df2ab7e37d001c876a081dfd93bbd0
SHA-256: 1ed505559265ef8ab40c46c4f728f1ca9c9aa99cc1b11fe9f9a00debb7fbe5f4
 
x86_64:
freetype-2.3.11-6.el6_2.9.i686.rpm     MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-2.3.11-6.el6_2.9.x86_64.rpm     MD5: 07719c02a5e4e38be2f7fbcccc3d9bf5
SHA-256: b96191eb0401e4c1cc59076f4b8d3f3c2f4125e8c3bd2104ac6d8168b37570a4
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm     MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-debuginfo-2.3.11-6.el6_2.9.x86_64.rpm     MD5: 064ef58b04b5f186c603fe079527ada3
SHA-256: 02f157c85299ff801b8633b27c4093381a4729715a251732671bc523126d782d
freetype-demos-2.3.11-6.el6_2.9.x86_64.rpm     MD5: a8571fa5477433aac8c1a4a7358777fb
SHA-256: 1aa84d8ac8b8af2ef6a6a10b8a1314079912a1800f650cafdfe1c311a37bcad8
freetype-devel-2.3.11-6.el6_2.9.i686.rpm     MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
freetype-devel-2.3.11-6.el6_2.9.x86_64.rpm     MD5: ccce6aeab8899f607ff5ef165cf5bc2e
SHA-256: 50a1f14147acdc77c2bf49331abd76309888516eae8dd32078b3284e7eff824c
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
freetype-2.3.11-6.el6_2.9.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e0df2ab7e37d001c876a081dfd93bbd0
SHA-256: 1ed505559265ef8ab40c46c4f728f1ca9c9aa99cc1b11fe9f9a00debb7fbe5f4
 
IA-32:
freetype-2.3.11-6.el6_2.9.i686.rpm     MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm     MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-demos-2.3.11-6.el6_2.9.i686.rpm     MD5: 03460e06268305aeec25127d25219145
SHA-256: 2b12008049cf06a94e9bc6d139abb0d5c21d7519d0f0e00c8a612e25f2e43968
freetype-devel-2.3.11-6.el6_2.9.i686.rpm     MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
 
PPC:
freetype-2.3.11-6.el6_2.9.ppc.rpm     MD5: e3b212dec036027d9fe1ca1cb03cf59e
SHA-256: 434bdef8a101e7a05b8fc6c003b7e1711ba5caa90c0484a149674ef0a6feac13
freetype-2.3.11-6.el6_2.9.ppc64.rpm     MD5: dca3057be55ea158b45138b00c299a70
SHA-256: a5ff769b0bf74b9f96cc0881083384162ff3733f4064423e426631f0589d6e38
freetype-debuginfo-2.3.11-6.el6_2.9.ppc.rpm     MD5: 8a76430c40425d7db2a837a66563487a
SHA-256: d7cc9ba24ee4fd95ea932eed2c05d39864cbb0132b240bf4d37ec7cdbb75a2f0
freetype-debuginfo-2.3.11-6.el6_2.9.ppc64.rpm     MD5: d0f6a47db375e9491c7ca72a810230b1
SHA-256: 3a4a2060bb535621041959cea2cec1a3e7ac96f53de257e1c72c452c6a7089be
freetype-demos-2.3.11-6.el6_2.9.ppc64.rpm     MD5: f7db1086a31ad586b8610e3eb0349c61
SHA-256: 56ed08f3fd3d5b99026da35052cd5bec494c577eb020497e33338b16639d090d
freetype-devel-2.3.11-6.el6_2.9.ppc.rpm     MD5: 68b97a11d9112bee59e2403ee081b10f
SHA-256: fb080c098212aadf61ad9a937fb1774fe8fedaca9a4fce6340b4e9187a652d56
freetype-devel-2.3.11-6.el6_2.9.ppc64.rpm     MD5: 151927fd303845c6781da628ca68a4ef
SHA-256: 88b69741b6528a02d340747ae5d2963d294678b2731a34fff352ea829f215a2a
 
s390x:
freetype-2.3.11-6.el6_2.9.s390.rpm     MD5: 62fcbdcc44d25eee8a4cfb3360d73c99
SHA-256: 92170f0dc59072379d494cbdebb7430dc7426117a46b620c64188b9a0a6f3745
freetype-2.3.11-6.el6_2.9.s390x.rpm     MD5: c7e5b23627f7af96eb8a2369d6ee1bba
SHA-256: 89ef279389239fcf0e8ebe8fc6638500ab83ea25ecc70496d20c23b40105547a
freetype-debuginfo-2.3.11-6.el6_2.9.s390.rpm     MD5: e701f44b2b633112066dd2addbd2d5ce
SHA-256: 53e1f60111419c15fb45a21b7a3181c50637406f9b8e166ac1cf726105cb19d4
freetype-debuginfo-2.3.11-6.el6_2.9.s390x.rpm     MD5: 66be9661036efd703ccba1425f5c406b
SHA-256: 4aaf68d0b15056da2edb2746fc0dd39269b1d4f0251576b1d191d2097bddd3f2
freetype-demos-2.3.11-6.el6_2.9.s390x.rpm     MD5: bc3e7030c5f4f65324b9632686f61c84
SHA-256: da93f8223a808b664e65b200c6a541484e21122e01761263fa4ca1b9ee2189db
freetype-devel-2.3.11-6.el6_2.9.s390.rpm     MD5: dd9759446f4e7881a850e14864a94d07
SHA-256: 551460cd1da0134f0a6e70abec837e595482152d840bd357e5fd9f604fe52fa5
freetype-devel-2.3.11-6.el6_2.9.s390x.rpm     MD5: 9527438e726293459f36c4f4882e1f66
SHA-256: 4144b8c96b38c330c9af2285ec03bfb07c62af6385b26b6b40691c6e06099972
 
x86_64:
freetype-2.3.11-6.el6_2.9.i686.rpm     MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-2.3.11-6.el6_2.9.x86_64.rpm     MD5: 07719c02a5e4e38be2f7fbcccc3d9bf5
SHA-256: b96191eb0401e4c1cc59076f4b8d3f3c2f4125e8c3bd2104ac6d8168b37570a4
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm     MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-debuginfo-2.3.11-6.el6_2.9.x86_64.rpm     MD5: 064ef58b04b5f186c603fe079527ada3
SHA-256: 02f157c85299ff801b8633b27c4093381a4729715a251732671bc523126d782d
freetype-demos-2.3.11-6.el6_2.9.x86_64.rpm     MD5: a8571fa5477433aac8c1a4a7358777fb
SHA-256: 1aa84d8ac8b8af2ef6a6a10b8a1314079912a1800f650cafdfe1c311a37bcad8
freetype-devel-2.3.11-6.el6_2.9.i686.rpm     MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
freetype-devel-2.3.11-6.el6_2.9.x86_64.rpm     MD5: ccce6aeab8899f607ff5ef165cf5bc2e
SHA-256: 50a1f14147acdc77c2bf49331abd76309888516eae8dd32078b3284e7eff824c
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
freetype-2.3.11-6.el6_2.9.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e0df2ab7e37d001c876a081dfd93bbd0
SHA-256: 1ed505559265ef8ab40c46c4f728f1ca9c9aa99cc1b11fe9f9a00debb7fbe5f4
 
IA-32:
freetype-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-demos-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 03460e06268305aeec25127d25219145
SHA-256: 2b12008049cf06a94e9bc6d139abb0d5c21d7519d0f0e00c8a612e25f2e43968
freetype-devel-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
 
x86_64:
freetype-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ae9c73b72019266854eafc44214eef2
SHA-256: ee891243f33182f1dfb155523eddd2f14389c07375f036e43fcffc6210a71268
freetype-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 07719c02a5e4e38be2f7fbcccc3d9bf5
SHA-256: b96191eb0401e4c1cc59076f4b8d3f3c2f4125e8c3bd2104ac6d8168b37570a4
freetype-debuginfo-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 24f86383fed73fa5d18b3c7b3ad367aa
SHA-256: 8cd9d0719802d69621196e90fe8f23178be98fd33b206d929ed3013ce4cad823
freetype-debuginfo-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 064ef58b04b5f186c603fe079527ada3
SHA-256: 02f157c85299ff801b8633b27c4093381a4729715a251732671bc523126d782d
freetype-demos-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a8571fa5477433aac8c1a4a7358777fb
SHA-256: 1aa84d8ac8b8af2ef6a6a10b8a1314079912a1800f650cafdfe1c311a37bcad8
freetype-devel-2.3.11-6.el6_2.9.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b844d1eaa492ab725d7371a31f96e8cb
SHA-256: 26d10b257eddda30030292d328f077897fc2ccce8a68893140d775ab5bf8ca4f
freetype-devel-2.3.11-6.el6_2.9.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: ccce6aeab8899f607ff5ef165cf5bc2e
SHA-256: 50a1f14147acdc77c2bf49331abd76309888516eae8dd32078b3284e7eff824c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

800581 - CVE-2012-1126 freetype: heap buffer over-read in BDF parsing _bdf_is_atom() (#35597, #35598)
800583 - CVE-2012-1127 freetype: heap buffer over-read in BDF parsing _bdf_parse_glyphs() (#35599, #35600)
800587 - CVE-2012-1130 freetype: heap buffer over-read in PCF parser pcf_get_properties() (#35603)
800589 - CVE-2012-1131 freetype: incorrect type cast allowing input sanity check bypass in ft_smooth_render_generic() (#35604)
800590 - CVE-2012-1132 freetype: heap buffer over-read in Type1 parser parse_subrs() (#35606)
800592 - CVE-2012-1134 freetype: limited heap buffer overflow in Type1 parser T1_Get_Private_Dict() (#35608)
800594 - CVE-2012-1136 freetype: uninitialized pointer use in BDF parser _bdf_parse_glyphs() (#35641)
800595 - CVE-2012-1137 freetype: heap buffer off-by-one in BDF parsing _bdf_list_ensure() (#35643)
800598 - CVE-2012-1139 freetype: data buffer underflow in BDF parser _bdf_parse_glyphs() (#35656)
800600 - CVE-2012-1140 freetype: multiple buffer over-read in PS parser conversion functions (#35657)
800602 - CVE-2012-1141 freetype: BDF parser _bdf_list_split() fails to properly initialize field array (#35658)
800604 - CVE-2012-1142 freetype: incorrect computation of number of glyphs in FNT_Face_Init() for FNT/FON files (#35659)
800606 - CVE-2012-1143 freetype: integer divide by zero in FT_DivFix() (#35660)
800607 - CVE-2012-1144 freetype: insufficient checking of first outline point in TTF parser (#35689)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/