Skip to navigation

Security Advisory Important: freetype security update

Advisory: RHSA-2010:0864-2
Type: Security Advisory
Severity: Important
Issued on: 2010-11-10
Last updated on: 2010-11-10
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.0.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2010-2805
CVE-2010-2806
CVE-2010-2808
CVE-2010-3311

Details

Updated freetype packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. These packages provide the FreeType 2 font engine.

It was found that the FreeType font rendering engine improperly validated
certain position values when processing input streams. If a user loaded a
specially-crafted font file with an application linked against FreeType, it
could cause the application to crash or, possibly, execute arbitrary code
with the privileges of the user running the application. (CVE-2010-2805,
CVE-2010-3311)

A stack-based buffer overflow flaw was found in the way the FreeType font
rendering engine processed some PostScript Type 1 fonts. If a user loaded a
specially-crafted font file with an application linked against FreeType, it
could cause the application to crash or, possibly, execute arbitrary code
with the privileges of the user running the application. (CVE-2010-2808)

An array index error was found in the way the FreeType font rendering
engine processed certain PostScript Type 42 font files. If a user loaded a
specially-crafted font file with an application linked against FreeType, it
could cause the application to crash or, possibly, execute arbitrary code
with the privileges of the user running the application. (CVE-2010-2806)

Note: All of the issues in this erratum only affect the FreeType 2 font
engine.

Users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
freetype-2.3.11-6.el6_0.1.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e4b6617b372dca8e994d6d538cce4e93
SHA-256: 6dc00ed38a2726ea0d9e7f8f94e4888db4814a1a22abad2639e745e885e4e1bc
 
IA-32:
freetype-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: c2905e51fb7ad203670c4707c486596d
SHA-256: f73aea2496235c1ffbf10702f1d28e569741041448d9931e1442a46c1d677f4f
freetype-debuginfo-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9d9e31546c9537a393934fe945f18e9b
SHA-256: 46e16dc525ec3df7d92cafcc319ef9498e7ef3a9ccaa4de4ee8183688440dd38
freetype-demos-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 85a3bade041e38ee3474f8a9b7f4ff37
SHA-256: 9fee6b54729466fc32189701888e4f176f40d11671fed9e609692c2182ae685e
freetype-devel-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 5f991e3d5aae40183a246a19e988c798
SHA-256: bb7e5929c20114443dd354fc5a513f230b05f258ca8379bedf8f9902c9ee7dd8
 
x86_64:
freetype-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: c2905e51fb7ad203670c4707c486596d
SHA-256: f73aea2496235c1ffbf10702f1d28e569741041448d9931e1442a46c1d677f4f
freetype-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: bef73ac00856d544eb48289ce627bf97
SHA-256: b840e67359cc6ea41f34ec0e6de0c7ebd0dd622811c237504547595b2a8612ae
freetype-debuginfo-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9d9e31546c9537a393934fe945f18e9b
SHA-256: 46e16dc525ec3df7d92cafcc319ef9498e7ef3a9ccaa4de4ee8183688440dd38
freetype-debuginfo-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: ab02953c50d8a026f1e7cfe60cc368db
SHA-256: 10b42e8538f664c2c9ae4970820ee18c2bf20435455952d8dc8cb929d14b3834
freetype-demos-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 1888a86eae581ab17a4218d1509ee512
SHA-256: 83003a0fc3de7ac5c5aa79ed3017d76ca8a7493a37299163b54fc52b611ee416
freetype-devel-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 5f991e3d5aae40183a246a19e988c798
SHA-256: bb7e5929c20114443dd354fc5a513f230b05f258ca8379bedf8f9902c9ee7dd8
freetype-devel-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 608cdc8cb1173c9f712c1e125566b67c
SHA-256: 915a43114aa476cffdbad4eca47c4d16061df3acba489ec2d2506d01aa8850b0
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
freetype-2.3.11-6.el6_0.1.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e4b6617b372dca8e994d6d538cce4e93
SHA-256: 6dc00ed38a2726ea0d9e7f8f94e4888db4814a1a22abad2639e745e885e4e1bc
 
x86_64:
freetype-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: c2905e51fb7ad203670c4707c486596d
SHA-256: f73aea2496235c1ffbf10702f1d28e569741041448d9931e1442a46c1d677f4f
freetype-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: bef73ac00856d544eb48289ce627bf97
SHA-256: b840e67359cc6ea41f34ec0e6de0c7ebd0dd622811c237504547595b2a8612ae
freetype-debuginfo-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9d9e31546c9537a393934fe945f18e9b
SHA-256: 46e16dc525ec3df7d92cafcc319ef9498e7ef3a9ccaa4de4ee8183688440dd38
freetype-debuginfo-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: ab02953c50d8a026f1e7cfe60cc368db
SHA-256: 10b42e8538f664c2c9ae4970820ee18c2bf20435455952d8dc8cb929d14b3834
freetype-demos-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 1888a86eae581ab17a4218d1509ee512
SHA-256: 83003a0fc3de7ac5c5aa79ed3017d76ca8a7493a37299163b54fc52b611ee416
freetype-devel-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 5f991e3d5aae40183a246a19e988c798
SHA-256: bb7e5929c20114443dd354fc5a513f230b05f258ca8379bedf8f9902c9ee7dd8
freetype-devel-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 608cdc8cb1173c9f712c1e125566b67c
SHA-256: 915a43114aa476cffdbad4eca47c4d16061df3acba489ec2d2506d01aa8850b0
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
freetype-2.3.11-6.el6_0.1.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e4b6617b372dca8e994d6d538cce4e93
SHA-256: 6dc00ed38a2726ea0d9e7f8f94e4888db4814a1a22abad2639e745e885e4e1bc
 
IA-32:
freetype-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: c2905e51fb7ad203670c4707c486596d
SHA-256: f73aea2496235c1ffbf10702f1d28e569741041448d9931e1442a46c1d677f4f
freetype-debuginfo-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9d9e31546c9537a393934fe945f18e9b
SHA-256: 46e16dc525ec3df7d92cafcc319ef9498e7ef3a9ccaa4de4ee8183688440dd38
freetype-demos-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 85a3bade041e38ee3474f8a9b7f4ff37
SHA-256: 9fee6b54729466fc32189701888e4f176f40d11671fed9e609692c2182ae685e
freetype-devel-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 5f991e3d5aae40183a246a19e988c798
SHA-256: bb7e5929c20114443dd354fc5a513f230b05f258ca8379bedf8f9902c9ee7dd8
 
PPC:
freetype-2.3.11-6.el6_0.1.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: 58e81c9883a17ce8d82351687220458c
SHA-256: 3cd556e0c6e115026477334475749348f97c1bcc6dd9aed05c3ecfc0315267f7
freetype-2.3.11-6.el6_0.1.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: f412505878068c37ea63ad0ee20af7d0
SHA-256: 7250bf2b702f7794bf28821fd069e5ce130bbe693db8b6d547e0e7dc54d26562
freetype-debuginfo-2.3.11-6.el6_0.1.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: b67176c63263d165f743b3362b3d8a4c
SHA-256: eaa58b63cb97ef33cb57d19fa111f567339061609bc66df56e07734ddf9a2f28
freetype-debuginfo-2.3.11-6.el6_0.1.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: cf602b83ed9d2aeb22f89bc0df2a4f70
SHA-256: fa86864cb509cbececcb9d052446db217ad05c68e10b86acf65370b32cb9f797
freetype-demos-2.3.11-6.el6_0.1.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a7957f4e82c20dd29a207bdf79e33bfb
SHA-256: c92f7b4f03dbea2b1ed19827c339bbb57cba26a18d9eb09a0e00bed6ffe4fe3f
freetype-devel-2.3.11-6.el6_0.1.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: ce505012d0705ec2abbb8da9843b9653
SHA-256: 488858d11c70750a491437d6fd47310d13f119ad392d440e65377ba82a346032
freetype-devel-2.3.11-6.el6_0.1.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 64b3795495ebc44f8e71db8ecd3f6ad2
SHA-256: 0b23b78780ac43a4c4fe2a3cbfac9513aa903093b6bfb5922ad6076cd4f20930
 
s390x:
freetype-2.3.11-6.el6_0.1.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: 1e565b9f1755bbe7d0ae1a61350b1337
SHA-256: 670c1c078a38b3ffed5e0404dbe0fbcb8f85b20ed8ce9ff29ec5383f0c12cdad
freetype-2.3.11-6.el6_0.1.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: 13ace9d4a8a84adf195478f94aab99e0
SHA-256: 3cf214660bf2fdac3aabf6616d763de7721cda306612e07a4bef0359c02fd698
freetype-debuginfo-2.3.11-6.el6_0.1.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: 14ab0d97dcf9722aa81c758e2d06c6e5
SHA-256: 1d20ac9c33e4b2f520031e8c66d46964f9b08de8471f43f11af1e3288d90a55e
freetype-debuginfo-2.3.11-6.el6_0.1.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: b5aff18abe0679f13e30ba33127c1488
SHA-256: 6e8d8f0d4d742c2e281c8839def93104ef8e97e2a6e755d5dcbe5052d45e6267
freetype-demos-2.3.11-6.el6_0.1.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: be84ebbe63f6d3968b605be4964fc89c
SHA-256: 3e9deb720403bcc2d7ff6c686cb8e4828df61fd0d6dc0953d7206d27cdad34e4
freetype-devel-2.3.11-6.el6_0.1.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: 99ef3c452e639d1d37b6891dd890675f
SHA-256: c52dd3b4fdbeb45aa9ab171149b659faf80842681b9323657568f7835de3bc7c
freetype-devel-2.3.11-6.el6_0.1.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: 2ccf11b209278178282e79c526c93eb3
SHA-256: 0d6d2ccc93173794a8c7c96fce2ff19c2e346c5ab274d3f2c275282e337a1995
 
x86_64:
freetype-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: c2905e51fb7ad203670c4707c486596d
SHA-256: f73aea2496235c1ffbf10702f1d28e569741041448d9931e1442a46c1d677f4f
freetype-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: bef73ac00856d544eb48289ce627bf97
SHA-256: b840e67359cc6ea41f34ec0e6de0c7ebd0dd622811c237504547595b2a8612ae
freetype-debuginfo-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9d9e31546c9537a393934fe945f18e9b
SHA-256: 46e16dc525ec3df7d92cafcc319ef9498e7ef3a9ccaa4de4ee8183688440dd38
freetype-debuginfo-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: ab02953c50d8a026f1e7cfe60cc368db
SHA-256: 10b42e8538f664c2c9ae4970820ee18c2bf20435455952d8dc8cb929d14b3834
freetype-demos-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 1888a86eae581ab17a4218d1509ee512
SHA-256: 83003a0fc3de7ac5c5aa79ed3017d76ca8a7493a37299163b54fc52b611ee416
freetype-devel-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 5f991e3d5aae40183a246a19e988c798
SHA-256: bb7e5929c20114443dd354fc5a513f230b05f258ca8379bedf8f9902c9ee7dd8
freetype-devel-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 608cdc8cb1173c9f712c1e125566b67c
SHA-256: 915a43114aa476cffdbad4eca47c4d16061df3acba489ec2d2506d01aa8850b0
 
Red Hat Enterprise Linux Server EUS (v. 6.0.z)

SRPMS:
freetype-2.3.11-6.el6_0.1.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e4b6617b372dca8e994d6d538cce4e93
SHA-256: 6dc00ed38a2726ea0d9e7f8f94e4888db4814a1a22abad2639e745e885e4e1bc
 
IA-32:
freetype-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2010:0889
    MD5: c2905e51fb7ad203670c4707c486596d
SHA-256: f73aea2496235c1ffbf10702f1d28e569741041448d9931e1442a46c1d677f4f
freetype-debuginfo-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2010:0889
    MD5: 9d9e31546c9537a393934fe945f18e9b
SHA-256: 46e16dc525ec3df7d92cafcc319ef9498e7ef3a9ccaa4de4ee8183688440dd38
freetype-demos-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2010:0889
    MD5: 85a3bade041e38ee3474f8a9b7f4ff37
SHA-256: 9fee6b54729466fc32189701888e4f176f40d11671fed9e609692c2182ae685e
freetype-devel-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2010:0889
    MD5: 5f991e3d5aae40183a246a19e988c798
SHA-256: bb7e5929c20114443dd354fc5a513f230b05f258ca8379bedf8f9902c9ee7dd8
 
PPC:
freetype-2.3.11-6.el6_0.1.ppc.rpm
File outdated by:  RHSA-2010:0889
    MD5: 58e81c9883a17ce8d82351687220458c
SHA-256: 3cd556e0c6e115026477334475749348f97c1bcc6dd9aed05c3ecfc0315267f7
freetype-2.3.11-6.el6_0.1.ppc64.rpm
File outdated by:  RHSA-2010:0889
    MD5: f412505878068c37ea63ad0ee20af7d0
SHA-256: 7250bf2b702f7794bf28821fd069e5ce130bbe693db8b6d547e0e7dc54d26562
freetype-debuginfo-2.3.11-6.el6_0.1.ppc.rpm
File outdated by:  RHSA-2010:0889
    MD5: b67176c63263d165f743b3362b3d8a4c
SHA-256: eaa58b63cb97ef33cb57d19fa111f567339061609bc66df56e07734ddf9a2f28
freetype-debuginfo-2.3.11-6.el6_0.1.ppc64.rpm
File outdated by:  RHSA-2010:0889
    MD5: cf602b83ed9d2aeb22f89bc0df2a4f70
SHA-256: fa86864cb509cbececcb9d052446db217ad05c68e10b86acf65370b32cb9f797
freetype-demos-2.3.11-6.el6_0.1.ppc64.rpm
File outdated by:  RHSA-2010:0889
    MD5: a7957f4e82c20dd29a207bdf79e33bfb
SHA-256: c92f7b4f03dbea2b1ed19827c339bbb57cba26a18d9eb09a0e00bed6ffe4fe3f
freetype-devel-2.3.11-6.el6_0.1.ppc.rpm
File outdated by:  RHSA-2010:0889
    MD5: ce505012d0705ec2abbb8da9843b9653
SHA-256: 488858d11c70750a491437d6fd47310d13f119ad392d440e65377ba82a346032
freetype-devel-2.3.11-6.el6_0.1.ppc64.rpm
File outdated by:  RHSA-2010:0889
    MD5: 64b3795495ebc44f8e71db8ecd3f6ad2
SHA-256: 0b23b78780ac43a4c4fe2a3cbfac9513aa903093b6bfb5922ad6076cd4f20930
 
s390x:
freetype-2.3.11-6.el6_0.1.s390.rpm
File outdated by:  RHSA-2010:0889
    MD5: 1e565b9f1755bbe7d0ae1a61350b1337
SHA-256: 670c1c078a38b3ffed5e0404dbe0fbcb8f85b20ed8ce9ff29ec5383f0c12cdad
freetype-2.3.11-6.el6_0.1.s390x.rpm
File outdated by:  RHSA-2010:0889
    MD5: 13ace9d4a8a84adf195478f94aab99e0
SHA-256: 3cf214660bf2fdac3aabf6616d763de7721cda306612e07a4bef0359c02fd698
freetype-debuginfo-2.3.11-6.el6_0.1.s390.rpm
File outdated by:  RHSA-2010:0889
    MD5: 14ab0d97dcf9722aa81c758e2d06c6e5
SHA-256: 1d20ac9c33e4b2f520031e8c66d46964f9b08de8471f43f11af1e3288d90a55e
freetype-debuginfo-2.3.11-6.el6_0.1.s390x.rpm
File outdated by:  RHSA-2010:0889
    MD5: b5aff18abe0679f13e30ba33127c1488
SHA-256: 6e8d8f0d4d742c2e281c8839def93104ef8e97e2a6e755d5dcbe5052d45e6267
freetype-demos-2.3.11-6.el6_0.1.s390x.rpm
File outdated by:  RHSA-2010:0889
    MD5: be84ebbe63f6d3968b605be4964fc89c
SHA-256: 3e9deb720403bcc2d7ff6c686cb8e4828df61fd0d6dc0953d7206d27cdad34e4
freetype-devel-2.3.11-6.el6_0.1.s390.rpm
File outdated by:  RHSA-2010:0889
    MD5: 99ef3c452e639d1d37b6891dd890675f
SHA-256: c52dd3b4fdbeb45aa9ab171149b659faf80842681b9323657568f7835de3bc7c
freetype-devel-2.3.11-6.el6_0.1.s390x.rpm
File outdated by:  RHSA-2010:0889
    MD5: 2ccf11b209278178282e79c526c93eb3
SHA-256: 0d6d2ccc93173794a8c7c96fce2ff19c2e346c5ab274d3f2c275282e337a1995
 
x86_64:
freetype-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2010:0889
    MD5: c2905e51fb7ad203670c4707c486596d
SHA-256: f73aea2496235c1ffbf10702f1d28e569741041448d9931e1442a46c1d677f4f
freetype-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2010:0889
    MD5: bef73ac00856d544eb48289ce627bf97
SHA-256: b840e67359cc6ea41f34ec0e6de0c7ebd0dd622811c237504547595b2a8612ae
freetype-debuginfo-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2010:0889
    MD5: 9d9e31546c9537a393934fe945f18e9b
SHA-256: 46e16dc525ec3df7d92cafcc319ef9498e7ef3a9ccaa4de4ee8183688440dd38
freetype-debuginfo-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2010:0889
    MD5: ab02953c50d8a026f1e7cfe60cc368db
SHA-256: 10b42e8538f664c2c9ae4970820ee18c2bf20435455952d8dc8cb929d14b3834
freetype-demos-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2010:0889
    MD5: 1888a86eae581ab17a4218d1509ee512
SHA-256: 83003a0fc3de7ac5c5aa79ed3017d76ca8a7493a37299163b54fc52b611ee416
freetype-devel-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2010:0889
    MD5: 5f991e3d5aae40183a246a19e988c798
SHA-256: bb7e5929c20114443dd354fc5a513f230b05f258ca8379bedf8f9902c9ee7dd8
freetype-devel-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2010:0889
    MD5: 608cdc8cb1173c9f712c1e125566b67c
SHA-256: 915a43114aa476cffdbad4eca47c4d16061df3acba489ec2d2506d01aa8850b0
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
freetype-2.3.11-6.el6_0.1.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: e4b6617b372dca8e994d6d538cce4e93
SHA-256: 6dc00ed38a2726ea0d9e7f8f94e4888db4814a1a22abad2639e745e885e4e1bc
 
IA-32:
freetype-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: c2905e51fb7ad203670c4707c486596d
SHA-256: f73aea2496235c1ffbf10702f1d28e569741041448d9931e1442a46c1d677f4f
freetype-debuginfo-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9d9e31546c9537a393934fe945f18e9b
SHA-256: 46e16dc525ec3df7d92cafcc319ef9498e7ef3a9ccaa4de4ee8183688440dd38
freetype-demos-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 85a3bade041e38ee3474f8a9b7f4ff37
SHA-256: 9fee6b54729466fc32189701888e4f176f40d11671fed9e609692c2182ae685e
freetype-devel-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 5f991e3d5aae40183a246a19e988c798
SHA-256: bb7e5929c20114443dd354fc5a513f230b05f258ca8379bedf8f9902c9ee7dd8
 
x86_64:
freetype-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: c2905e51fb7ad203670c4707c486596d
SHA-256: f73aea2496235c1ffbf10702f1d28e569741041448d9931e1442a46c1d677f4f
freetype-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: bef73ac00856d544eb48289ce627bf97
SHA-256: b840e67359cc6ea41f34ec0e6de0c7ebd0dd622811c237504547595b2a8612ae
freetype-debuginfo-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9d9e31546c9537a393934fe945f18e9b
SHA-256: 46e16dc525ec3df7d92cafcc319ef9498e7ef3a9ccaa4de4ee8183688440dd38
freetype-debuginfo-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: ab02953c50d8a026f1e7cfe60cc368db
SHA-256: 10b42e8538f664c2c9ae4970820ee18c2bf20435455952d8dc8cb929d14b3834
freetype-demos-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 1888a86eae581ab17a4218d1509ee512
SHA-256: 83003a0fc3de7ac5c5aa79ed3017d76ca8a7493a37299163b54fc52b611ee416
freetype-devel-2.3.11-6.el6_0.1.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 5f991e3d5aae40183a246a19e988c798
SHA-256: bb7e5929c20114443dd354fc5a513f230b05f258ca8379bedf8f9902c9ee7dd8
freetype-devel-2.3.11-6.el6_0.1.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 608cdc8cb1173c9f712c1e125566b67c
SHA-256: 915a43114aa476cffdbad4eca47c4d16061df3acba489ec2d2506d01aa8850b0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

621907 - CVE-2010-2808 FreeType: Stack-based buffer overflow by processing certain LWFN fonts
621980 - CVE-2010-2806 FreeType: Heap-based buffer overflow by processing FontType42 fonts with negative length of SFNT strings (FT bug #30656)
623625 - CVE-2010-3311 freetype: Input stream position error by processing Compact Font Format (CFF) font files
625626 - CVE-2010-2805 freetype: FT_Stream_EnterFrame() does not properly validate certain position values


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/