Skip to navigation

Security Advisory Important: freetype security update

Advisory: RHSA-2011:1085-1
Type: Security Advisory
Severity: Important
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.1.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2011-0226

Details

Updated freetype packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. These packages provide the FreeType 2 font engine.

A flaw was found in the way the FreeType font rendering engine processed
certain PostScript Type 1 fonts. If a user loaded a specially-crafted font
file with an application linked against FreeType, it could cause the
application to crash or, possibly, execute arbitrary code with the
privileges of the user running the application. (CVE-2011-0226)

Users are advised to upgrade to these updated packages, which contain a
backported patch to correct this issue. The X server must be restarted (log
out, then log back in) for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
freetype-2.3.11-6.el6_1.6.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3bc4787a45a1d45b615c631e35a77ec8
SHA-256: 1b2287fba8022a52a32720c4e57d27696d1cd00c816c977fa56c11814a216e0b
 
IA-32:
freetype-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 032f31a2dd722b6281e89f42f910d457
SHA-256: d1b49c4889ef030cc308509cb13fcc2f94e7ac8a3169089d2103e94826691d02
freetype-debuginfo-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ebdd96af36f40ee5c033cf51e9f2acc
SHA-256: dccb2c39eb5b1fb3282c0492a9366442f1fe34a1c0a4862b8d2d8f833d52494e
freetype-demos-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b17ab598b1614aec73cd8759cdd14f25
SHA-256: 8f60f24b4d97f29d229c2c9272b37884f1b1d32d186528872297f956e366e9b2
freetype-devel-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3d77e2a92019ff5583d81c822461c0ef
SHA-256: 6b032a1ee8d9ab8ee0670f90a89c656cbb23b3f446ea4a55ca2a9f834763d7f1
 
x86_64:
freetype-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 032f31a2dd722b6281e89f42f910d457
SHA-256: d1b49c4889ef030cc308509cb13fcc2f94e7ac8a3169089d2103e94826691d02
freetype-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 577614703439bf14f4d744a04c02caa3
SHA-256: 5610c01f373a99d9cc7bb5521e2baaf9aeacfe4db9ad87b4b58c37f8a1fdb29e
freetype-debuginfo-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ebdd96af36f40ee5c033cf51e9f2acc
SHA-256: dccb2c39eb5b1fb3282c0492a9366442f1fe34a1c0a4862b8d2d8f833d52494e
freetype-debuginfo-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 2542b8294ecdec3bef648338c9040db8
SHA-256: fbd85e6735149b2094ec98e69238ab4c1e771b352b4d245d07c60a0439b01cc6
freetype-demos-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a28b5ef1e5d6f41443dfae075cc0b503
SHA-256: ac50405c7afa9d48cea5a7fba9168fea1c140deb9e392ce1268207327224cce2
freetype-devel-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3d77e2a92019ff5583d81c822461c0ef
SHA-256: 6b032a1ee8d9ab8ee0670f90a89c656cbb23b3f446ea4a55ca2a9f834763d7f1
freetype-devel-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: e1fce4823982508cd7cc771874c69341
SHA-256: a9fddd289b1d951fce2dd7e8c8e5f6a9a9930ad84036b946d031cf9926a000f9
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
freetype-2.3.11-6.el6_1.6.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3bc4787a45a1d45b615c631e35a77ec8
SHA-256: 1b2287fba8022a52a32720c4e57d27696d1cd00c816c977fa56c11814a216e0b
 
x86_64:
freetype-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 032f31a2dd722b6281e89f42f910d457
SHA-256: d1b49c4889ef030cc308509cb13fcc2f94e7ac8a3169089d2103e94826691d02
freetype-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 577614703439bf14f4d744a04c02caa3
SHA-256: 5610c01f373a99d9cc7bb5521e2baaf9aeacfe4db9ad87b4b58c37f8a1fdb29e
freetype-debuginfo-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ebdd96af36f40ee5c033cf51e9f2acc
SHA-256: dccb2c39eb5b1fb3282c0492a9366442f1fe34a1c0a4862b8d2d8f833d52494e
freetype-debuginfo-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 2542b8294ecdec3bef648338c9040db8
SHA-256: fbd85e6735149b2094ec98e69238ab4c1e771b352b4d245d07c60a0439b01cc6
freetype-demos-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a28b5ef1e5d6f41443dfae075cc0b503
SHA-256: ac50405c7afa9d48cea5a7fba9168fea1c140deb9e392ce1268207327224cce2
freetype-devel-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3d77e2a92019ff5583d81c822461c0ef
SHA-256: 6b032a1ee8d9ab8ee0670f90a89c656cbb23b3f446ea4a55ca2a9f834763d7f1
freetype-devel-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: e1fce4823982508cd7cc771874c69341
SHA-256: a9fddd289b1d951fce2dd7e8c8e5f6a9a9930ad84036b946d031cf9926a000f9
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
freetype-2.3.11-6.el6_1.6.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3bc4787a45a1d45b615c631e35a77ec8
SHA-256: 1b2287fba8022a52a32720c4e57d27696d1cd00c816c977fa56c11814a216e0b
 
IA-32:
freetype-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 032f31a2dd722b6281e89f42f910d457
SHA-256: d1b49c4889ef030cc308509cb13fcc2f94e7ac8a3169089d2103e94826691d02
freetype-debuginfo-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ebdd96af36f40ee5c033cf51e9f2acc
SHA-256: dccb2c39eb5b1fb3282c0492a9366442f1fe34a1c0a4862b8d2d8f833d52494e
freetype-demos-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b17ab598b1614aec73cd8759cdd14f25
SHA-256: 8f60f24b4d97f29d229c2c9272b37884f1b1d32d186528872297f956e366e9b2
freetype-devel-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3d77e2a92019ff5583d81c822461c0ef
SHA-256: 6b032a1ee8d9ab8ee0670f90a89c656cbb23b3f446ea4a55ca2a9f834763d7f1
 
PPC:
freetype-2.3.11-6.el6_1.6.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: 6f384c041b2c792e72243f7c671cc840
SHA-256: ac0f0c96cddaf96b0e5ad5341eab0b391521cd7af0e40c0213196dfaf390d470
freetype-2.3.11-6.el6_1.6.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: e878dc7bb63a7e74a028b33b26b76a92
SHA-256: 2032f333e52c82b2272ff904ab9a621d644bd2f0b941c9b394cbc0155d445e57
freetype-debuginfo-2.3.11-6.el6_1.6.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: 7ccc0577adb15b5825925287636bbb84
SHA-256: 01ba11ad9fbea25dc170f6475bda01277f50458728e7b485414672d3d95c6046
freetype-debuginfo-2.3.11-6.el6_1.6.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 1dce90d1160d79ae73838e93edc29f17
SHA-256: 3f42c612819cd4becf0ef6640eaccf8d70ac0903959771a03efd73cf55ebf439
freetype-demos-2.3.11-6.el6_1.6.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: d2a524ae8b44f7b26bd7cc480b0f3cd7
SHA-256: 4f5ba23c611366b0b36b32e2917e0bcc77abb4064db75f9edb73374075571b70
freetype-devel-2.3.11-6.el6_1.6.ppc.rpm
File outdated by:  RHSA-2013:0216
    MD5: 6fae7502d21b6f6dadf0cb52b1c360f3
SHA-256: 1d369118d1d59f41380ea5c814ef26fb7ba6c3af6ce931ac0e56448b386d59ec
freetype-devel-2.3.11-6.el6_1.6.ppc64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 870d2a8fdb8e2465e3aae62f8e4349e7
SHA-256: a5bd89e3bf7397e62728c5b2ab3b0076c74f24a317af19759638756670cb6aad
 
s390x:
freetype-2.3.11-6.el6_1.6.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: 2703063e3ce98141aa585c56b742029f
SHA-256: 97778bc8ebe3bb2cbec72a168dbf7782bff64efd31095d417a32ecb861617c5b
freetype-2.3.11-6.el6_1.6.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: 72b0e95b81c52dad3b8b688d2c804a4f
SHA-256: f289ea630749932620adb0a62ce6d66f1ddeefd15c8a04c74b7e334a328fe017
freetype-debuginfo-2.3.11-6.el6_1.6.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: 16506c9330772c968cbf9471e7dc65b4
SHA-256: 06f4f06f34346369b5365b707fc996262dba05de34d1b6c2cc1fa2807ca2727b
freetype-debuginfo-2.3.11-6.el6_1.6.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: 322282f6027d7b773a8bd7769cd1683b
SHA-256: 06f19fa969e542ac0a1c018114b3798c648ef7b20ad4993d60b76c7749d5de28
freetype-demos-2.3.11-6.el6_1.6.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: 81fc413a1d4f568b0651b7c28e79c1fd
SHA-256: 91b119ffaef48fd80927851605a258f89a2db56b6570fa312554c67a6546ea38
freetype-devel-2.3.11-6.el6_1.6.s390.rpm
File outdated by:  RHSA-2013:0216
    MD5: aa784adddd7cdb0cadbae8c030091648
SHA-256: 7b74b5cc75a5849c9576165003061756ac794ce508c8b67cb263dafa6460fc11
freetype-devel-2.3.11-6.el6_1.6.s390x.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9636af454dcdcb21b973e8369acaa68c
SHA-256: 19662b6306539994e38830b6d4e5c9526641b736a760a77304ced1259d6cb8a0
 
x86_64:
freetype-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 032f31a2dd722b6281e89f42f910d457
SHA-256: d1b49c4889ef030cc308509cb13fcc2f94e7ac8a3169089d2103e94826691d02
freetype-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 577614703439bf14f4d744a04c02caa3
SHA-256: 5610c01f373a99d9cc7bb5521e2baaf9aeacfe4db9ad87b4b58c37f8a1fdb29e
freetype-debuginfo-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ebdd96af36f40ee5c033cf51e9f2acc
SHA-256: dccb2c39eb5b1fb3282c0492a9366442f1fe34a1c0a4862b8d2d8f833d52494e
freetype-debuginfo-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 2542b8294ecdec3bef648338c9040db8
SHA-256: fbd85e6735149b2094ec98e69238ab4c1e771b352b4d245d07c60a0439b01cc6
freetype-demos-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a28b5ef1e5d6f41443dfae075cc0b503
SHA-256: ac50405c7afa9d48cea5a7fba9168fea1c140deb9e392ce1268207327224cce2
freetype-devel-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3d77e2a92019ff5583d81c822461c0ef
SHA-256: 6b032a1ee8d9ab8ee0670f90a89c656cbb23b3f446ea4a55ca2a9f834763d7f1
freetype-devel-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: e1fce4823982508cd7cc771874c69341
SHA-256: a9fddd289b1d951fce2dd7e8c8e5f6a9a9930ad84036b946d031cf9926a000f9
 
Red Hat Enterprise Linux Server EUS (v. 6.1.z)

SRPMS:
freetype-2.3.11-6.el6_1.6.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3bc4787a45a1d45b615c631e35a77ec8
SHA-256: 1b2287fba8022a52a32720c4e57d27696d1cd00c816c977fa56c11814a216e0b
 
IA-32:
freetype-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2011:1455
    MD5: 032f31a2dd722b6281e89f42f910d457
SHA-256: d1b49c4889ef030cc308509cb13fcc2f94e7ac8a3169089d2103e94826691d02
freetype-debuginfo-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2011:1455
    MD5: 9ebdd96af36f40ee5c033cf51e9f2acc
SHA-256: dccb2c39eb5b1fb3282c0492a9366442f1fe34a1c0a4862b8d2d8f833d52494e
freetype-demos-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2011:1455
    MD5: b17ab598b1614aec73cd8759cdd14f25
SHA-256: 8f60f24b4d97f29d229c2c9272b37884f1b1d32d186528872297f956e366e9b2
freetype-devel-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2011:1455
    MD5: 3d77e2a92019ff5583d81c822461c0ef
SHA-256: 6b032a1ee8d9ab8ee0670f90a89c656cbb23b3f446ea4a55ca2a9f834763d7f1
 
PPC:
freetype-2.3.11-6.el6_1.6.ppc.rpm
File outdated by:  RHSA-2011:1455
    MD5: 6f384c041b2c792e72243f7c671cc840
SHA-256: ac0f0c96cddaf96b0e5ad5341eab0b391521cd7af0e40c0213196dfaf390d470
freetype-2.3.11-6.el6_1.6.ppc64.rpm
File outdated by:  RHSA-2011:1455
    MD5: e878dc7bb63a7e74a028b33b26b76a92
SHA-256: 2032f333e52c82b2272ff904ab9a621d644bd2f0b941c9b394cbc0155d445e57
freetype-debuginfo-2.3.11-6.el6_1.6.ppc.rpm
File outdated by:  RHSA-2011:1455
    MD5: 7ccc0577adb15b5825925287636bbb84
SHA-256: 01ba11ad9fbea25dc170f6475bda01277f50458728e7b485414672d3d95c6046
freetype-debuginfo-2.3.11-6.el6_1.6.ppc64.rpm
File outdated by:  RHSA-2011:1455
    MD5: 1dce90d1160d79ae73838e93edc29f17
SHA-256: 3f42c612819cd4becf0ef6640eaccf8d70ac0903959771a03efd73cf55ebf439
freetype-demos-2.3.11-6.el6_1.6.ppc64.rpm
File outdated by:  RHSA-2011:1455
    MD5: d2a524ae8b44f7b26bd7cc480b0f3cd7
SHA-256: 4f5ba23c611366b0b36b32e2917e0bcc77abb4064db75f9edb73374075571b70
freetype-devel-2.3.11-6.el6_1.6.ppc.rpm
File outdated by:  RHSA-2011:1455
    MD5: 6fae7502d21b6f6dadf0cb52b1c360f3
SHA-256: 1d369118d1d59f41380ea5c814ef26fb7ba6c3af6ce931ac0e56448b386d59ec
freetype-devel-2.3.11-6.el6_1.6.ppc64.rpm
File outdated by:  RHSA-2011:1455
    MD5: 870d2a8fdb8e2465e3aae62f8e4349e7
SHA-256: a5bd89e3bf7397e62728c5b2ab3b0076c74f24a317af19759638756670cb6aad
 
s390x:
freetype-2.3.11-6.el6_1.6.s390.rpm
File outdated by:  RHSA-2011:1455
    MD5: 2703063e3ce98141aa585c56b742029f
SHA-256: 97778bc8ebe3bb2cbec72a168dbf7782bff64efd31095d417a32ecb861617c5b
freetype-2.3.11-6.el6_1.6.s390x.rpm
File outdated by:  RHSA-2011:1455
    MD5: 72b0e95b81c52dad3b8b688d2c804a4f
SHA-256: f289ea630749932620adb0a62ce6d66f1ddeefd15c8a04c74b7e334a328fe017
freetype-debuginfo-2.3.11-6.el6_1.6.s390.rpm
File outdated by:  RHSA-2011:1455
    MD5: 16506c9330772c968cbf9471e7dc65b4
SHA-256: 06f4f06f34346369b5365b707fc996262dba05de34d1b6c2cc1fa2807ca2727b
freetype-debuginfo-2.3.11-6.el6_1.6.s390x.rpm
File outdated by:  RHSA-2011:1455
    MD5: 322282f6027d7b773a8bd7769cd1683b
SHA-256: 06f19fa969e542ac0a1c018114b3798c648ef7b20ad4993d60b76c7749d5de28
freetype-demos-2.3.11-6.el6_1.6.s390x.rpm
File outdated by:  RHSA-2011:1455
    MD5: 81fc413a1d4f568b0651b7c28e79c1fd
SHA-256: 91b119ffaef48fd80927851605a258f89a2db56b6570fa312554c67a6546ea38
freetype-devel-2.3.11-6.el6_1.6.s390.rpm
File outdated by:  RHSA-2011:1455
    MD5: aa784adddd7cdb0cadbae8c030091648
SHA-256: 7b74b5cc75a5849c9576165003061756ac794ce508c8b67cb263dafa6460fc11
freetype-devel-2.3.11-6.el6_1.6.s390x.rpm
File outdated by:  RHSA-2011:1455
    MD5: 9636af454dcdcb21b973e8369acaa68c
SHA-256: 19662b6306539994e38830b6d4e5c9526641b736a760a77304ced1259d6cb8a0
 
x86_64:
freetype-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2011:1455
    MD5: 032f31a2dd722b6281e89f42f910d457
SHA-256: d1b49c4889ef030cc308509cb13fcc2f94e7ac8a3169089d2103e94826691d02
freetype-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2011:1455
    MD5: 577614703439bf14f4d744a04c02caa3
SHA-256: 5610c01f373a99d9cc7bb5521e2baaf9aeacfe4db9ad87b4b58c37f8a1fdb29e
freetype-debuginfo-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2011:1455
    MD5: 9ebdd96af36f40ee5c033cf51e9f2acc
SHA-256: dccb2c39eb5b1fb3282c0492a9366442f1fe34a1c0a4862b8d2d8f833d52494e
freetype-debuginfo-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2011:1455
    MD5: 2542b8294ecdec3bef648338c9040db8
SHA-256: fbd85e6735149b2094ec98e69238ab4c1e771b352b4d245d07c60a0439b01cc6
freetype-demos-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2011:1455
    MD5: a28b5ef1e5d6f41443dfae075cc0b503
SHA-256: ac50405c7afa9d48cea5a7fba9168fea1c140deb9e392ce1268207327224cce2
freetype-devel-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2011:1455
    MD5: 3d77e2a92019ff5583d81c822461c0ef
SHA-256: 6b032a1ee8d9ab8ee0670f90a89c656cbb23b3f446ea4a55ca2a9f834763d7f1
freetype-devel-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2011:1455
    MD5: e1fce4823982508cd7cc771874c69341
SHA-256: a9fddd289b1d951fce2dd7e8c8e5f6a9a9930ad84036b946d031cf9926a000f9
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
freetype-2.3.11-6.el6_1.6.src.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3bc4787a45a1d45b615c631e35a77ec8
SHA-256: 1b2287fba8022a52a32720c4e57d27696d1cd00c816c977fa56c11814a216e0b
 
IA-32:
freetype-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 032f31a2dd722b6281e89f42f910d457
SHA-256: d1b49c4889ef030cc308509cb13fcc2f94e7ac8a3169089d2103e94826691d02
freetype-debuginfo-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ebdd96af36f40ee5c033cf51e9f2acc
SHA-256: dccb2c39eb5b1fb3282c0492a9366442f1fe34a1c0a4862b8d2d8f833d52494e
freetype-demos-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: b17ab598b1614aec73cd8759cdd14f25
SHA-256: 8f60f24b4d97f29d229c2c9272b37884f1b1d32d186528872297f956e366e9b2
freetype-devel-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3d77e2a92019ff5583d81c822461c0ef
SHA-256: 6b032a1ee8d9ab8ee0670f90a89c656cbb23b3f446ea4a55ca2a9f834763d7f1
 
x86_64:
freetype-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 032f31a2dd722b6281e89f42f910d457
SHA-256: d1b49c4889ef030cc308509cb13fcc2f94e7ac8a3169089d2103e94826691d02
freetype-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 577614703439bf14f4d744a04c02caa3
SHA-256: 5610c01f373a99d9cc7bb5521e2baaf9aeacfe4db9ad87b4b58c37f8a1fdb29e
freetype-debuginfo-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 9ebdd96af36f40ee5c033cf51e9f2acc
SHA-256: dccb2c39eb5b1fb3282c0492a9366442f1fe34a1c0a4862b8d2d8f833d52494e
freetype-debuginfo-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: 2542b8294ecdec3bef648338c9040db8
SHA-256: fbd85e6735149b2094ec98e69238ab4c1e771b352b4d245d07c60a0439b01cc6
freetype-demos-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: a28b5ef1e5d6f41443dfae075cc0b503
SHA-256: ac50405c7afa9d48cea5a7fba9168fea1c140deb9e392ce1268207327224cce2
freetype-devel-2.3.11-6.el6_1.6.i686.rpm
File outdated by:  RHSA-2013:0216
    MD5: 3d77e2a92019ff5583d81c822461c0ef
SHA-256: 6b032a1ee8d9ab8ee0670f90a89c656cbb23b3f446ea4a55ca2a9f834763d7f1
freetype-devel-2.3.11-6.el6_1.6.x86_64.rpm
File outdated by:  RHSA-2013:0216
    MD5: e1fce4823982508cd7cc771874c69341
SHA-256: a9fddd289b1d951fce2dd7e8c8e5f6a9a9930ad84036b946d031cf9926a000f9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

722701 - CVE-2011-0226 freetype: postscript type1 font parsing vulnerability


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/