Skip to navigation

Security Advisory Important: freetype security update

Advisory: RHSA-2010:0577-1
Type: Security Advisory
Severity: Important
Issued on: 2010-07-30
Last updated on: 2010-07-30
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2010-2500
CVE-2010-2527
CVE-2010-2541

Details

Updated freetype packages that fix various security issues are now
available for Red Hat Enterprise Linux 3.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. These packages provide both the FreeType 1 and FreeType 2 font
engines.

An integer overflow flaw was found in the way the FreeType font engine
processed font files. If a user loaded a carefully-crafted font file with
an application linked against FreeType, it could cause the application to
crash or, possibly, execute arbitrary code with the privileges of the user
running the application. (CVE-2010-2500)

Several buffer overflow flaws were found in the FreeType demo applications.
If a user loaded a carefully-crafted font file with a demo application, it
could cause the application to crash or, possibly, execute arbitrary code
with the privileges of the user running the application. (CVE-2010-2527,
CVE-2010-2541)

Red Hat would like to thank Robert Swiecki of the Google Security Team for
the discovery of the CVE-2010-2500 and CVE-2010-2527 issues.

Note: All of the issues in this erratum only affect the FreeType 2 font
engine.

Users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
freetype-2.1.4-15.el3.src.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6556149cb1dd46de72db818b958d5f3b
SHA-256: 2a353b39efe546567d87a6def351c2b994936a9bb58aa18b2606d71633f999ed
 
IA-32:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-devel-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: d2d1fe7067b41c2eef382bd9dd9c55ae
SHA-256: ab6c1ab603a4aed257c8107946e7fe4a2064244508721c6ee8da844c17e06c8d
 
x86_64:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-2.1.4-15.el3.x86_64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 0cf7a18d003cbea69f527284c71fe73c
SHA-256: 2bcb8e539a257df6bff3cab8f5d4d9aea589de0601ca9b678aef9ad8e150e079
freetype-devel-2.1.4-15.el3.x86_64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 1652b9f61804602c6382d78e4d898bf4
SHA-256: e40d31c2473878fad5f6adf3f801169520745c4dfd9c8756c554ad0536cf8fae
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
freetype-2.1.4-15.el3.src.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6556149cb1dd46de72db818b958d5f3b
SHA-256: 2a353b39efe546567d87a6def351c2b994936a9bb58aa18b2606d71633f999ed
 
IA-32:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-devel-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: d2d1fe7067b41c2eef382bd9dd9c55ae
SHA-256: ab6c1ab603a4aed257c8107946e7fe4a2064244508721c6ee8da844c17e06c8d
 
IA-64:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-2.1.4-15.el3.ia64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 07b01eda2d818e9c2b18e48f22615d33
SHA-256: 7a93708f793499d9fc225ffb25f5359dc72cc409896e290ef02a12003c99a5c4
freetype-devel-2.1.4-15.el3.ia64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 3ed158e9eba3f5bc92abf78fe82309ec
SHA-256: 895a6a57318dc18a45325296667aaf58bc794a2b3d9a28d149aec4ef366972b2
 
PPC:
freetype-2.1.4-15.el3.ppc.rpm
File outdated by:  RHSA-2010:0736
    MD5: dc36186db040a1f515ac2cda54932dfe
SHA-256: c9c7261f0ea59860118ee3bf2b36aa08b8746e7dc2f8d7dfe11944f4a028e132
freetype-2.1.4-15.el3.ppc64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 086c3aa082907ea1f604a8b0dc0fca61
SHA-256: d2af5c0e3d4c8ac257a165b73a563b57b894691e2dace7bb381c9e4d61a44e02
freetype-devel-2.1.4-15.el3.ppc.rpm
File outdated by:  RHSA-2010:0736
    MD5: 8c9fd8fb0f17230ad07417cb50cce80b
SHA-256: ecfa47c1b9bc8c89268356f277a9f24309b0b263df041502031178193565b7fb
 
s390:
freetype-2.1.4-15.el3.s390.rpm
File outdated by:  RHSA-2010:0736
    MD5: 144b8a8107201030ce447febcffd7124
SHA-256: 754535896d7c00eac093942785e31c2f63a345413a5188a43569c9c1a6a46155
freetype-devel-2.1.4-15.el3.s390.rpm
File outdated by:  RHSA-2010:0736
    MD5: 3cedf64c592d5c7cbdb297b8e79335c6
SHA-256: 270466d5eb297c58d15ad11cf546a50a484bb0207ba477b434a6be438372ac2c
 
s390x:
freetype-2.1.4-15.el3.s390.rpm
File outdated by:  RHSA-2010:0736
    MD5: 144b8a8107201030ce447febcffd7124
SHA-256: 754535896d7c00eac093942785e31c2f63a345413a5188a43569c9c1a6a46155
freetype-2.1.4-15.el3.s390x.rpm
File outdated by:  RHSA-2010:0736
    MD5: 1cfe5ae747a8bf9a6404ade70bcbc134
SHA-256: 24e722057503e69896059f7aaaaa50623be768b42d3672dd24c2894eba5a99db
freetype-devel-2.1.4-15.el3.s390x.rpm
File outdated by:  RHSA-2010:0736
    MD5: 20214e5ae09e3ceebd38c44d3dc31b43
SHA-256: 2fb1a3e5fbbd68f746780eb9fc6269895074f7053b3da5b5e9acef9511331a09
 
x86_64:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-2.1.4-15.el3.x86_64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 0cf7a18d003cbea69f527284c71fe73c
SHA-256: 2bcb8e539a257df6bff3cab8f5d4d9aea589de0601ca9b678aef9ad8e150e079
freetype-devel-2.1.4-15.el3.x86_64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 1652b9f61804602c6382d78e4d898bf4
SHA-256: e40d31c2473878fad5f6adf3f801169520745c4dfd9c8756c554ad0536cf8fae
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
freetype-2.1.4-15.el3.src.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6556149cb1dd46de72db818b958d5f3b
SHA-256: 2a353b39efe546567d87a6def351c2b994936a9bb58aa18b2606d71633f999ed
 
IA-32:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-devel-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: d2d1fe7067b41c2eef382bd9dd9c55ae
SHA-256: ab6c1ab603a4aed257c8107946e7fe4a2064244508721c6ee8da844c17e06c8d
 
IA-64:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-2.1.4-15.el3.ia64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 07b01eda2d818e9c2b18e48f22615d33
SHA-256: 7a93708f793499d9fc225ffb25f5359dc72cc409896e290ef02a12003c99a5c4
freetype-devel-2.1.4-15.el3.ia64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 3ed158e9eba3f5bc92abf78fe82309ec
SHA-256: 895a6a57318dc18a45325296667aaf58bc794a2b3d9a28d149aec4ef366972b2
 
x86_64:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-2.1.4-15.el3.x86_64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 0cf7a18d003cbea69f527284c71fe73c
SHA-256: 2bcb8e539a257df6bff3cab8f5d4d9aea589de0601ca9b678aef9ad8e150e079
freetype-devel-2.1.4-15.el3.x86_64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 1652b9f61804602c6382d78e4d898bf4
SHA-256: e40d31c2473878fad5f6adf3f801169520745c4dfd9c8756c554ad0536cf8fae
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
freetype-2.1.4-15.el3.src.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6556149cb1dd46de72db818b958d5f3b
SHA-256: 2a353b39efe546567d87a6def351c2b994936a9bb58aa18b2606d71633f999ed
 
IA-32:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-devel-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: d2d1fe7067b41c2eef382bd9dd9c55ae
SHA-256: ab6c1ab603a4aed257c8107946e7fe4a2064244508721c6ee8da844c17e06c8d
 
IA-64:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-2.1.4-15.el3.ia64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 07b01eda2d818e9c2b18e48f22615d33
SHA-256: 7a93708f793499d9fc225ffb25f5359dc72cc409896e290ef02a12003c99a5c4
freetype-devel-2.1.4-15.el3.ia64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 3ed158e9eba3f5bc92abf78fe82309ec
SHA-256: 895a6a57318dc18a45325296667aaf58bc794a2b3d9a28d149aec4ef366972b2
 
x86_64:
freetype-2.1.4-15.el3.i386.rpm
File outdated by:  RHSA-2010:0736
    MD5: 6d3860766df923d0e06c8697742c5344
SHA-256: 1fe166f4f055861a6b330cb56878623294358f327cc4699c6135bd701ea36796
freetype-2.1.4-15.el3.x86_64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 0cf7a18d003cbea69f527284c71fe73c
SHA-256: 2bcb8e539a257df6bff3cab8f5d4d9aea589de0601ca9b678aef9ad8e150e079
freetype-devel-2.1.4-15.el3.x86_64.rpm
File outdated by:  RHSA-2010:0736
    MD5: 1652b9f61804602c6382d78e4d898bf4
SHA-256: e40d31c2473878fad5f6adf3f801169520745c4dfd9c8756c554ad0536cf8fae
 

Bugs fixed (see bugzilla for more information)

613167 - CVE-2010-2500 freetype: integer overflow vulnerability in smooth/ftgrays.c
614557 - CVE-2010-2527 Freetype demos multiple buffer overflows
617342 - CVE-2010-2541 Freetype ftmulti buffer overflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/