Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-2808 (GCVE-0-2010-2808)
Vulnerability from cvelistv5 – Published: 2010-08-19 17:43 – Updated: 2024-08-07 02:46- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:46:48.199Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"
},
{
"name": "ADV-2010-3045",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/3045"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://savannah.nongnu.org/bugs/?30658"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4435"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4457"
},
{
"name": "ADV-2010-2018",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/2018"
},
{
"name": "ADV-2010-3046",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/3046"
},
{
"name": "RHSA-2010:0737",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
},
{
"name": "USN-972-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-972-1"
},
{
"name": "APPLE-SA-2010-11-10-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "[oss-security] 20100806 Re: CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three more",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2"
},
{
"name": "42317",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42317"
},
{
"name": "40816",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/40816"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
},
{
"name": "42314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/42314"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
},
{
"name": "RHSA-2010:0864",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
},
{
"name": "40982",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/40982"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
},
{
"name": "ADV-2010-2106",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/2106"
},
{
"name": "[oss-security] 20100806 CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4456"
},
{
"name": "42285",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/42285"
},
{
"name": "APPLE-SA-2010-11-22-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-08-06T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-11-18T10:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"
},
{
"name": "ADV-2010-3045",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/3045"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://savannah.nongnu.org/bugs/?30658"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4435"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4457"
},
{
"name": "ADV-2010-2018",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/2018"
},
{
"name": "ADV-2010-3046",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/3046"
},
{
"name": "RHSA-2010:0737",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
},
{
"name": "USN-972-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-972-1"
},
{
"name": "APPLE-SA-2010-11-10-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "[oss-security] 20100806 Re: CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three more",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2"
},
{
"name": "42317",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42317"
},
{
"name": "40816",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/40816"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
},
{
"name": "42314",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/42314"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
},
{
"name": "RHSA-2010:0864",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
},
{
"name": "40982",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/40982"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
},
{
"name": "ADV-2010-2106",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/2106"
},
{
"name": "[oss-security] 20100806 CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4456"
},
{
"name": "42285",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/42285"
},
{
"name": "APPLE-SA-2010-11-22-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-2808",
"datePublished": "2010-08-19T17:43:00.000Z",
"dateReserved": "2010-07-22T00:00:00.000Z",
"dateUpdated": "2024-08-07T02:46:48.199Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2010-2808",
"date": "2026-05-22",
"epss": "0.07802",
"percentile": "0.92068"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.4.2\", \"matchCriteriaId\": \"33E14690-3A9D-45C7-A270-3433F79DEC28\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.2\", \"matchCriteriaId\": \"D9636697-5FDF-4F67-A95B-D74DDD67A5DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.6.5\", \"matchCriteriaId\": \"46E5D24A-8CA0-4590-9F35-F684D573D030\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.1.0\", \"matchCriteriaId\": \"407115F2-CC65-448B-8133-D3D57AD306BA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"01EDA41C-6B2E-49AF-B503-EB3882265C11\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer en la funci\\u00f3n Mac_Read_POST_Resource en base/ftobjs.c de FreeType anterior a v2.4.2 permite a atacantes remotos causar una denegaci\\u00f3n de servicio (corrupci\\u00f3n de memoria y fallo de la aplicaci\\u00f3n) o posiblemente ejecutar c\\u00f3digo a su elecci\\u00f3n a trav\\u00e9s de fuentes Adobe Type 1 Mac Font File (tambi\\u00e9n conocido como LWFN) manipuladas.\"}]",
"id": "CVE-2010-2808",
"lastModified": "2024-11-21T01:17:24.970",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2010-08-19T18:00:05.327",
"references": "[{\"url\": \"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/40816\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/40982\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42314\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42317\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Product\", \"Third Party Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4435\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://support.apple.com/kb/HT4456\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4457\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2010-0864.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/42285\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-972-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/2018\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/2106\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/3045\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/3046\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=621907\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2010-0737.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://savannah.nongnu.org/bugs/?30658\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/40816\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/40982\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42314\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/42317\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\", \"Third Party Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4435\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://support.apple.com/kb/HT4456\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4457\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2010-0864.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/42285\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-972-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/2018\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/2106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/3045\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/3046\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=621907\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2010-0737.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://savannah.nongnu.org/bugs/?30658\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-120\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2010-2808\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-08-19T18:00:05.327\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en la funci\u00f3n Mac_Read_POST_Resource en base/ftobjs.c de FreeType anterior a v2.4.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y fallo de la aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de fuentes Adobe Type 1 Mac Font File (tambi\u00e9n conocido como LWFN) manipuladas.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.4.2\",\"matchCriteriaId\":\"33E14690-3A9D-45C7-A270-3433F79DEC28\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.2\",\"matchCriteriaId\":\"D9636697-5FDF-4F67-A95B-D74DDD67A5DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.6.5\",\"matchCriteriaId\":\"46E5D24A-8CA0-4590-9F35-F684D573D030\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1.0\",\"matchCriteriaId\":\"407115F2-CC65-448B-8133-D3D57AD306BA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"}]}]}],\"references\":[{\"url\":\"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/40816\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/40982\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42314\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42317\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4435\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT4456\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4457\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0864.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/42285\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-972-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2018\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2106\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3045\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3046\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=621907\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0737.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://savannah.nongnu.org/bugs/?30658\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/40816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/40982\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42314\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42317\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4435\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT4456\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4457\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0864.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/42285\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-972-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3045\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3046\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=621907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0737.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://savannah.nongnu.org/bugs/?30658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
CERTA-2010-AVI-359
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités présentes dans FreeType permettent à un utilisateur distant malintentionné de provoquer un déni de service ou d'exécuter du code arbitraire à distance.
Description
Plusieurs vulnérabilités sont présentes dans la bibliothèque de fonctions FreeType :
- la première (CVE-2010-1797) est relative au support des polices de caractères de type Compact Font Format (CFF) ;
- la seconde (CVE-2010-2805) concerne le traitement des polices de type Adobe Type 1 Mac (LWFN) ;
- la troisième (CVE-2010-2806) est due à une erreur dans le traitement des polices de type T42 ;
- la quatrième (CVE-2010-2807) est relative à la mise en œuvre de la macro-commande BOUNDS incluse dans certaines polices ;
- la dernière (CVE-2010-2808) est liée à une erreur dans une fonction (FT_Stream_EnterFrame()) utilisée dans le traitement de certaines polices.
Toutes ces vulnérabilités permettent à un utilisateur distant malintentionné de provoquer un déni de service ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
FreeType versions 2.4.1 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eFreeType versions 2.4.1 et ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans la biblioth\u00e8que de\nfonctions FreeType :\n\n- la premi\u00e8re (CVE-2010-1797) est relative au support des polices de\n caract\u00e8res de type Compact Font Format (CFF) ;\n- la seconde (CVE-2010-2805) concerne le traitement des polices de\n type Adobe Type 1 Mac (LWFN) ;\n- la troisi\u00e8me (CVE-2010-2806) est due \u00e0 une erreur dans le traitement\n des polices de type T42 ;\n- la quatri\u00e8me (CVE-2010-2807) est relative \u00e0 la mise en \u0153uvre de la\n macro-commande BOUNDS incluse dans certaines polices ;\n- la derni\u00e8re (CVE-2010-2808) est li\u00e9e \u00e0 une erreur dans une fonction\n (FT_Stream_EnterFrame()) utilis\u00e9e dans le traitement de certaines\n polices.\n\nToutes ces vuln\u00e9rabilit\u00e9s permettent \u00e0 un utilisateur distant\nmalintentionn\u00e9 de provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code\narbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-1797",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1797"
},
{
"name": "CVE-2010-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2808"
},
{
"name": "CVE-2010-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2805"
},
{
"name": "CVE-2010-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2806"
},
{
"name": "CVE-2010-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2807"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2010:0607 du 05 ao\u00fbt 2010 : https://rhn.redhat.com/errata/RHSA-2010-0607.html",
"url": "http://rhn.redhat.com/errata/RHSA-2010-0607.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-972-1 du 17 ao\u00fbt 2010 :",
"url": "https://www.ubuntu.com/usn/usn-972-1"
},
{
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.4.2 de FreeType :",
"url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
}
],
"reference": "CERTA-2010-AVI-359",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-08-09T00:00:00.000000"
},
{
"description": "ajout du bulletin Ubuntu.",
"revision_date": "2010-08-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans \u003cspan\nclass=\"textit\"\u003eFreeType\u003c/span\u003e permettent \u00e0 un utilisateur distant\nmalintentionn\u00e9 de provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans FreeType",
"vendor_advisories": [
{
"published_at": null,
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.4.2 de FreeType",
"url": null
}
]
}
CERTA-2010-AVI-548
Vulnerability from certfr_avis - Published: - Updated:
De nombreuses vulnérabilités ont été découvertes dans le système d'exploitation Mac OS X. Leur exploitation permet, entre autres, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été corrigées dans différents composants du système d'exploitation Mac OS X. Notamment :
- AFP Server ;
- AppKit ;
- ATS ;
- CFNetwork ;
- CoreGraphics ;
- CoreText ;
- Directory Services ;
- diskdev_cmds ;
- Disk Images ;
- Image Capture ;
- ImageIO ;
- Image RAW ;
- Kernel ;
- Networking ;
- Password Server ;
- Printing ;
- QuickLook ;
- QuickTime ;
- Safari ;
- Time Machine ;
- Wiki Server ;
- xar.
Cette mise à jour corrige également un grand nombre de vulnérabilités dans des logiciels inclus au système d'exploitation comme Apache, CUPS, Flash Player, gzip, MySQL, OpenLDAP, OpenSSL, PHP, python, X11.
Parmi les failles corrigées, certaines permettent l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X Server 10.6.0 \u00e0 10.6.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.6.0 \u00e0 10.6.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans diff\u00e9rents composants\ndu syst\u00e8me d\u0027exploitation Mac OS X. Notamment :\n\n- AFP Server ;\n- AppKit ;\n- ATS ;\n- CFNetwork ;\n- CoreGraphics ;\n- CoreText ;\n- Directory Services ;\n- diskdev_cmds ;\n- Disk Images ;\n- Image Capture ;\n- ImageIO ;\n- Image RAW ;\n- Kernel ;\n- Networking ;\n- Password Server ;\n- Printing ;\n- QuickLook ;\n- QuickTime ;\n- Safari ;\n- Time Machine ;\n- Wiki Server ;\n- xar.\n\nCette mise \u00e0 jour corrige \u00e9galement un grand nombre de vuln\u00e9rabilit\u00e9s\ndans des logiciels inclus au syst\u00e8me d\u0027exploitation comme Apache, CUPS,\nFlash Player, gzip, MySQL, OpenLDAP, OpenSSL, PHP, python, X11.\n\nParmi les failles corrig\u00e9es, certaines permettent l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3793",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3793"
},
{
"name": "CVE-2010-2167",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2167"
},
{
"name": "CVE-2010-2173",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2173"
},
{
"name": "CVE-2010-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3783"
},
{
"name": "CVE-2010-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2163"
},
{
"name": "CVE-2010-3642",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3642"
},
{
"name": "CVE-2009-4134",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4134"
},
{
"name": "CVE-2010-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1803"
},
{
"name": "CVE-2010-3788",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3788"
},
{
"name": "CVE-2010-3638",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3638"
},
{
"name": "CVE-2010-1846",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1846"
},
{
"name": "CVE-2010-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2484"
},
{
"name": "CVE-2010-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3640"
},
{
"name": "CVE-2010-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
},
{
"name": "CVE-2010-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1834"
},
{
"name": "CVE-2010-2499",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2499"
},
{
"name": "CVE-2010-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2519"
},
{
"name": "CVE-2010-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3646"
},
{
"name": "CVE-2010-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0211"
},
{
"name": "CVE-2010-2531",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2531"
},
{
"name": "CVE-2010-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2170"
},
{
"name": "CVE-2010-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3784"
},
{
"name": "CVE-2010-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1840"
},
{
"name": "CVE-2010-1845",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1845"
},
{
"name": "CVE-2010-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3639"
},
{
"name": "CVE-2010-3654",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3654"
},
{
"name": "CVE-2010-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0205"
},
{
"name": "CVE-2010-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1752"
},
{
"name": "CVE-2010-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2249"
},
{
"name": "CVE-2010-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3643"
},
{
"name": "CVE-2010-1849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1849"
},
{
"name": "CVE-2010-1842",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1842"
},
{
"name": "CVE-2010-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2176"
},
{
"name": "CVE-2010-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3650"
},
{
"name": "CVE-2010-1378",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1378"
},
{
"name": "CVE-2010-2497",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2497"
},
{
"name": "CVE-2010-3798",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3798"
},
{
"name": "CVE-2010-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2162"
},
{
"name": "CVE-2009-2474",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2474"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2010-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2172"
},
{
"name": "CVE-2010-2181",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2181"
},
{
"name": "CVE-2010-3796",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3796"
},
{
"name": "CVE-2010-1850",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1850"
},
{
"name": "CVE-2010-3795",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3795"
},
{
"name": "CVE-2010-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2160"
},
{
"name": "CVE-2010-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3786"
},
{
"name": "CVE-2010-3644",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3644"
},
{
"name": "CVE-2010-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2179"
},
{
"name": "CVE-2010-1831",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1831"
},
{
"name": "CVE-2010-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3647"
},
{
"name": "CVE-2010-3790",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3790"
},
{
"name": "CVE-2010-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2214"
},
{
"name": "CVE-2010-1450",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1450"
},
{
"name": "CVE-2010-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0408"
},
{
"name": "CVE-2010-2165",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2165"
},
{
"name": "CVE-2010-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2171"
},
{
"name": "CVE-2010-1844",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1844"
},
{
"name": "CVE-2010-2498",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2498"
},
{
"name": "CVE-2010-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4010"
},
{
"name": "CVE-2010-3793",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3793"
},
{
"name": "CVE-2010-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0209"
},
{
"name": "CVE-2010-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2182"
},
{
"name": "CVE-2010-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3649"
},
{
"name": "CVE-2010-1847",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1847"
},
{
"name": "CVE-2010-1841",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1841"
},
{
"name": "CVE-2010-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2175"
},
{
"name": "CVE-2010-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2180"
},
{
"name": "CVE-2010-1828",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1828"
},
{
"name": "CVE-2010-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0397"
},
{
"name": "CVE-2010-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2520"
},
{
"name": "CVE-2008-4546",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4546"
},
{
"name": "CVE-2010-1297",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1297"
},
{
"name": "CVE-2010-2941",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2941"
},
{
"name": "CVE-2010-2187",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2187"
},
{
"name": "CVE-2010-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2164"
},
{
"name": "CVE-2010-2884",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2884"
},
{
"name": "CVE-2010-3636",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3636"
},
{
"name": "CVE-2010-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1836"
},
{
"name": "CVE-2010-3794",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3794"
},
{
"name": "CVE-2010-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2161"
},
{
"name": "CVE-2010-1843",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1843"
},
{
"name": "CVE-2010-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2808"
},
{
"name": "CVE-2010-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2215"
},
{
"name": "CVE-2010-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2805"
},
{
"name": "CVE-2010-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2178"
},
{
"name": "CVE-2010-3787",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3787"
},
{
"name": "CVE-2010-1832",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1832"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2010-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2177"
},
{
"name": "CVE-2009-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2473"
},
{
"name": "CVE-2010-3053",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3053"
},
{
"name": "CVE-2010-3789",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3789"
},
{
"name": "CVE-2010-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1829"
},
{
"name": "CVE-2010-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2166"
},
{
"name": "CVE-2010-1848",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1848"
},
{
"name": "CVE-2010-3645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3645"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2010-3054",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3054"
},
{
"name": "CVE-2010-2184",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2184"
},
{
"name": "CVE-2010-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3648"
},
{
"name": "CVE-2010-3791",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3791"
},
{
"name": "CVE-2010-1449",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1449"
},
{
"name": "CVE-2010-3976",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3976"
},
{
"name": "CVE-2010-3797",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3797"
},
{
"name": "CVE-2010-1830",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1830"
},
{
"name": "CVE-2010-3641",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3641"
},
{
"name": "CVE-2010-2189",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2189"
},
{
"name": "CVE-2010-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3792"
},
{
"name": "CVE-2010-2216",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2216"
},
{
"name": "CVE-2010-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2174"
},
{
"name": "CVE-2010-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2169"
},
{
"name": "CVE-2010-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1837"
},
{
"name": "CVE-2010-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2806"
},
{
"name": "CVE-2009-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2624"
},
{
"name": "CVE-2010-2188",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2188"
},
{
"name": "CVE-2010-2185",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2185"
},
{
"name": "CVE-2010-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1833"
},
{
"name": "CVE-2010-1811",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1811"
},
{
"name": "CVE-2010-2500",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2500"
},
{
"name": "CVE-2010-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2213"
},
{
"name": "CVE-2009-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0796"
},
{
"name": "CVE-2010-2186",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2186"
},
{
"name": "CVE-2010-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1838"
},
{
"name": "CVE-2010-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2807"
},
{
"name": "CVE-2010-3785",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3785"
},
{
"name": "CVE-2010-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2183"
},
{
"name": "CVE-2010-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0105"
},
{
"name": "CVE-2010-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0001"
},
{
"name": "CVE-2010-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3652"
}
],
"links": [],
"reference": "CERTA-2010-AVI-548",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-11-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me\nd\u0027exploitation \u003cspan class=\"textit\"\u003eMac OS X\u003c/span\u003e. Leur exploitation\npermet, entre autres, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple 2010-007 du 11 novembre 2010",
"url": "http://support.apple.com/kb/HT4435"
}
]
}
CERTA-2010-AVI-565
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités affectent Apple iOS. Certaines permettent l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été corrigées dans différents composants du système d'exploitation Apple iOS, notamment dans :
- Configuration Profiles ;
- CoreGraphics ;
- FreeType ;
- iAd Content Display ;
- ImageIO ;
- libxml ;
- Mail ;
- Networking ;
- OfficeImport ;
- Photos ;
- Safari ;
- Telephony ;
- WebKit.
Parmi ces vulnérabilités, certaines permettent l'exécution de code arbitraire à distance, des dénis de service à distance ainsi que l'atteinte à la confidentialité des données sur les produits Apple embarquant le système d'exploitation iOS.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple iOS versions 4.1 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cSPAN class=\"textit\"\u003eApple iOS\u003c/SPAN\u003e versions 4.1 et ant\u00e9rieures.",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans diff\u00e9rents composants\ndu syst\u00e8me d\u0027exploitation Apple iOS, notamment dans :\n\n- Configuration Profiles ;\n- CoreGraphics ;\n- FreeType ;\n- iAd Content Display ;\n- ImageIO ;\n- libxml ;\n- Mail ;\n- Networking ;\n- OfficeImport ;\n- Photos ;\n- Safari ;\n- Telephony ;\n- WebKit.\n\nParmi ces vuln\u00e9rabilit\u00e9s, certaines permettent l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance, des d\u00e9nis de service \u00e0 distance ainsi que\nl\u0027atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es sur les produits Apple\nembarquant le syst\u00e8me d\u0027exploitation iOS.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-1408",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1408"
},
{
"name": "CVE-2010-1407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1407"
},
{
"name": "CVE-2010-1784",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1784"
},
{
"name": "CVE-2010-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1791"
},
{
"name": "CVE-2010-1782",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1782"
},
{
"name": "CVE-2010-1387",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1387"
},
{
"name": "CVE-2010-1822",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1822"
},
{
"name": "CVE-2010-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3821"
},
{
"name": "CVE-2010-3824",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3824"
},
{
"name": "CVE-2010-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1418"
},
{
"name": "CVE-2010-3832",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3832"
},
{
"name": "CVE-2010-3819",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3819"
},
{
"name": "CVE-2010-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3804"
},
{
"name": "CVE-2010-1403",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1403"
},
{
"name": "CVE-2010-1770",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1770"
},
{
"name": "CVE-2010-3822",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3822"
},
{
"name": "CVE-2010-3259",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3259"
},
{
"name": "CVE-2010-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1414"
},
{
"name": "CVE-2010-3813",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3813"
},
{
"name": "CVE-2010-1807",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1807"
},
{
"name": "CVE-2010-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3803"
},
{
"name": "CVE-2010-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3812"
},
{
"name": "CVE-2010-3831",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3831"
},
{
"name": "CVE-2009-1707",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1707"
},
{
"name": "CVE-2010-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2249"
},
{
"name": "CVE-2010-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1771"
},
{
"name": "CVE-2010-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3809"
},
{
"name": "CVE-2010-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3820"
},
{
"name": "CVE-2010-1813",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1813"
},
{
"name": "CVE-2010-0042",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0042"
},
{
"name": "CVE-2010-3816",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3816"
},
{
"name": "CVE-2010-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1789"
},
{
"name": "CVE-2010-1764",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1764"
},
{
"name": "CVE-2010-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1788"
},
{
"name": "CVE-2010-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3826"
},
{
"name": "CVE-2010-1410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1410"
},
{
"name": "CVE-2010-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3810"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2010-3830",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3830"
},
{
"name": "CVE-2010-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3786"
},
{
"name": "CVE-2010-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1793"
},
{
"name": "CVE-2010-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1786"
},
{
"name": "CVE-2010-0544",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0544"
},
{
"name": "CVE-2010-3829",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3829"
},
{
"name": "CVE-2010-1785",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1785"
},
{
"name": "CVE-2010-1783",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1783"
},
{
"name": "CVE-2010-1416",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1416"
},
{
"name": "CVE-2010-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3817"
},
{
"name": "CVE-2010-3814",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3814"
},
{
"name": "CVE-2010-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3808"
},
{
"name": "CVE-2010-1394",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1394"
},
{
"name": "CVE-2010-3116",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3116"
},
{
"name": "CVE-2010-1405",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1405"
},
{
"name": "CVE-2010-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3805"
},
{
"name": "CVE-2010-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0051"
},
{
"name": "CVE-2010-1806",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1806"
},
{
"name": "CVE-2010-1757",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1757"
},
{
"name": "CVE-2010-1422",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1422"
},
{
"name": "CVE-2010-3828",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3828"
},
{
"name": "CVE-2010-3827",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3827"
},
{
"name": "CVE-2010-1758",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1758"
},
{
"name": "CVE-2010-1843",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1843"
},
{
"name": "CVE-2010-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2808"
},
{
"name": "CVE-2010-1781",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1781"
},
{
"name": "CVE-2010-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2805"
},
{
"name": "CVE-2010-3818",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3818"
},
{
"name": "CVE-2010-1415",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1415"
},
{
"name": "CVE-2010-3053",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3053"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2010-3257",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3257"
},
{
"name": "CVE-2010-3823",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3823"
},
{
"name": "CVE-2010-3054",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3054"
},
{
"name": "CVE-2010-1421",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1421"
},
{
"name": "CVE-2010-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1417"
},
{
"name": "CVE-2010-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2806"
},
{
"name": "CVE-2010-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3811"
},
{
"name": "CVE-2010-1812",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1812"
},
{
"name": "CVE-2010-1811",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1811"
},
{
"name": "CVE-2010-1392",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1392"
},
{
"name": "CVE-2010-1780",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1780"
},
{
"name": "CVE-2010-1814",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1814"
},
{
"name": "CVE-2010-1815",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1815"
},
{
"name": "CVE-2010-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1787"
},
{
"name": "CVE-2010-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2807"
},
{
"name": "CVE-2010-1384",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1384"
}
],
"links": [],
"reference": "CERTA-2010-AVI-565",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s affectent \u003cspan class=\"textit\"\u003eApple\niOS\u003c/span\u003e. Certaines permettent l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple iOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4456 du 22 novembre 2010",
"url": "http://support.apple.com/kb/HT4456"
}
]
}
CERTA-2010-AVI-359
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités présentes dans FreeType permettent à un utilisateur distant malintentionné de provoquer un déni de service ou d'exécuter du code arbitraire à distance.
Description
Plusieurs vulnérabilités sont présentes dans la bibliothèque de fonctions FreeType :
- la première (CVE-2010-1797) est relative au support des polices de caractères de type Compact Font Format (CFF) ;
- la seconde (CVE-2010-2805) concerne le traitement des polices de type Adobe Type 1 Mac (LWFN) ;
- la troisième (CVE-2010-2806) est due à une erreur dans le traitement des polices de type T42 ;
- la quatrième (CVE-2010-2807) est relative à la mise en œuvre de la macro-commande BOUNDS incluse dans certaines polices ;
- la dernière (CVE-2010-2808) est liée à une erreur dans une fonction (FT_Stream_EnterFrame()) utilisée dans le traitement de certaines polices.
Toutes ces vulnérabilités permettent à un utilisateur distant malintentionné de provoquer un déni de service ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
FreeType versions 2.4.1 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eFreeType versions 2.4.1 et ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans la biblioth\u00e8que de\nfonctions FreeType :\n\n- la premi\u00e8re (CVE-2010-1797) est relative au support des polices de\n caract\u00e8res de type Compact Font Format (CFF) ;\n- la seconde (CVE-2010-2805) concerne le traitement des polices de\n type Adobe Type 1 Mac (LWFN) ;\n- la troisi\u00e8me (CVE-2010-2806) est due \u00e0 une erreur dans le traitement\n des polices de type T42 ;\n- la quatri\u00e8me (CVE-2010-2807) est relative \u00e0 la mise en \u0153uvre de la\n macro-commande BOUNDS incluse dans certaines polices ;\n- la derni\u00e8re (CVE-2010-2808) est li\u00e9e \u00e0 une erreur dans une fonction\n (FT_Stream_EnterFrame()) utilis\u00e9e dans le traitement de certaines\n polices.\n\nToutes ces vuln\u00e9rabilit\u00e9s permettent \u00e0 un utilisateur distant\nmalintentionn\u00e9 de provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code\narbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-1797",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1797"
},
{
"name": "CVE-2010-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2808"
},
{
"name": "CVE-2010-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2805"
},
{
"name": "CVE-2010-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2806"
},
{
"name": "CVE-2010-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2807"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2010:0607 du 05 ao\u00fbt 2010 : https://rhn.redhat.com/errata/RHSA-2010-0607.html",
"url": "http://rhn.redhat.com/errata/RHSA-2010-0607.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-972-1 du 17 ao\u00fbt 2010 :",
"url": "https://www.ubuntu.com/usn/usn-972-1"
},
{
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.4.2 de FreeType :",
"url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
}
],
"reference": "CERTA-2010-AVI-359",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-08-09T00:00:00.000000"
},
{
"description": "ajout du bulletin Ubuntu.",
"revision_date": "2010-08-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans \u003cspan\nclass=\"textit\"\u003eFreeType\u003c/span\u003e permettent \u00e0 un utilisateur distant\nmalintentionn\u00e9 de provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans FreeType",
"vendor_advisories": [
{
"published_at": null,
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.4.2 de FreeType",
"url": null
}
]
}
CERTA-2010-AVI-548
Vulnerability from certfr_avis - Published: - Updated:
De nombreuses vulnérabilités ont été découvertes dans le système d'exploitation Mac OS X. Leur exploitation permet, entre autres, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été corrigées dans différents composants du système d'exploitation Mac OS X. Notamment :
- AFP Server ;
- AppKit ;
- ATS ;
- CFNetwork ;
- CoreGraphics ;
- CoreText ;
- Directory Services ;
- diskdev_cmds ;
- Disk Images ;
- Image Capture ;
- ImageIO ;
- Image RAW ;
- Kernel ;
- Networking ;
- Password Server ;
- Printing ;
- QuickLook ;
- QuickTime ;
- Safari ;
- Time Machine ;
- Wiki Server ;
- xar.
Cette mise à jour corrige également un grand nombre de vulnérabilités dans des logiciels inclus au système d'exploitation comme Apache, CUPS, Flash Player, gzip, MySQL, OpenLDAP, OpenSSL, PHP, python, X11.
Parmi les failles corrigées, certaines permettent l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X Server 10.6.0 \u00e0 10.6.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.6.0 \u00e0 10.6.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans diff\u00e9rents composants\ndu syst\u00e8me d\u0027exploitation Mac OS X. Notamment :\n\n- AFP Server ;\n- AppKit ;\n- ATS ;\n- CFNetwork ;\n- CoreGraphics ;\n- CoreText ;\n- Directory Services ;\n- diskdev_cmds ;\n- Disk Images ;\n- Image Capture ;\n- ImageIO ;\n- Image RAW ;\n- Kernel ;\n- Networking ;\n- Password Server ;\n- Printing ;\n- QuickLook ;\n- QuickTime ;\n- Safari ;\n- Time Machine ;\n- Wiki Server ;\n- xar.\n\nCette mise \u00e0 jour corrige \u00e9galement un grand nombre de vuln\u00e9rabilit\u00e9s\ndans des logiciels inclus au syst\u00e8me d\u0027exploitation comme Apache, CUPS,\nFlash Player, gzip, MySQL, OpenLDAP, OpenSSL, PHP, python, X11.\n\nParmi les failles corrig\u00e9es, certaines permettent l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3793",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3793"
},
{
"name": "CVE-2010-2167",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2167"
},
{
"name": "CVE-2010-2173",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2173"
},
{
"name": "CVE-2010-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3783"
},
{
"name": "CVE-2010-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2163"
},
{
"name": "CVE-2010-3642",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3642"
},
{
"name": "CVE-2009-4134",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4134"
},
{
"name": "CVE-2010-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1803"
},
{
"name": "CVE-2010-3788",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3788"
},
{
"name": "CVE-2010-3638",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3638"
},
{
"name": "CVE-2010-1846",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1846"
},
{
"name": "CVE-2010-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2484"
},
{
"name": "CVE-2010-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3640"
},
{
"name": "CVE-2010-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
},
{
"name": "CVE-2010-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1834"
},
{
"name": "CVE-2010-2499",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2499"
},
{
"name": "CVE-2010-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2519"
},
{
"name": "CVE-2010-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3646"
},
{
"name": "CVE-2010-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0211"
},
{
"name": "CVE-2010-2531",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2531"
},
{
"name": "CVE-2010-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2170"
},
{
"name": "CVE-2010-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3784"
},
{
"name": "CVE-2010-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1840"
},
{
"name": "CVE-2010-1845",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1845"
},
{
"name": "CVE-2010-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3639"
},
{
"name": "CVE-2010-3654",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3654"
},
{
"name": "CVE-2010-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0205"
},
{
"name": "CVE-2010-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1752"
},
{
"name": "CVE-2010-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2249"
},
{
"name": "CVE-2010-3643",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3643"
},
{
"name": "CVE-2010-1849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1849"
},
{
"name": "CVE-2010-1842",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1842"
},
{
"name": "CVE-2010-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2176"
},
{
"name": "CVE-2010-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3650"
},
{
"name": "CVE-2010-1378",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1378"
},
{
"name": "CVE-2010-2497",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2497"
},
{
"name": "CVE-2010-3798",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3798"
},
{
"name": "CVE-2010-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2162"
},
{
"name": "CVE-2009-2474",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2474"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2010-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2172"
},
{
"name": "CVE-2010-2181",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2181"
},
{
"name": "CVE-2010-3796",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3796"
},
{
"name": "CVE-2010-1850",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1850"
},
{
"name": "CVE-2010-3795",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3795"
},
{
"name": "CVE-2010-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2160"
},
{
"name": "CVE-2010-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3786"
},
{
"name": "CVE-2010-3644",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3644"
},
{
"name": "CVE-2010-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2179"
},
{
"name": "CVE-2010-1831",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1831"
},
{
"name": "CVE-2010-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3647"
},
{
"name": "CVE-2010-3790",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3790"
},
{
"name": "CVE-2010-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2214"
},
{
"name": "CVE-2010-1450",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1450"
},
{
"name": "CVE-2010-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0408"
},
{
"name": "CVE-2010-2165",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2165"
},
{
"name": "CVE-2010-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2171"
},
{
"name": "CVE-2010-1844",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1844"
},
{
"name": "CVE-2010-2498",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2498"
},
{
"name": "CVE-2010-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4010"
},
{
"name": "CVE-2010-3793",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3793"
},
{
"name": "CVE-2010-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0209"
},
{
"name": "CVE-2010-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2182"
},
{
"name": "CVE-2010-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3649"
},
{
"name": "CVE-2010-1847",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1847"
},
{
"name": "CVE-2010-1841",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1841"
},
{
"name": "CVE-2010-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2175"
},
{
"name": "CVE-2010-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2180"
},
{
"name": "CVE-2010-1828",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1828"
},
{
"name": "CVE-2010-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0397"
},
{
"name": "CVE-2010-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2520"
},
{
"name": "CVE-2008-4546",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4546"
},
{
"name": "CVE-2010-1297",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1297"
},
{
"name": "CVE-2010-2941",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2941"
},
{
"name": "CVE-2010-2187",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2187"
},
{
"name": "CVE-2010-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2164"
},
{
"name": "CVE-2010-2884",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2884"
},
{
"name": "CVE-2010-3636",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3636"
},
{
"name": "CVE-2010-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1836"
},
{
"name": "CVE-2010-3794",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3794"
},
{
"name": "CVE-2010-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2161"
},
{
"name": "CVE-2010-1843",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1843"
},
{
"name": "CVE-2010-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2808"
},
{
"name": "CVE-2010-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2215"
},
{
"name": "CVE-2010-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2805"
},
{
"name": "CVE-2010-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2178"
},
{
"name": "CVE-2010-3787",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3787"
},
{
"name": "CVE-2010-1832",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1832"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2010-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2177"
},
{
"name": "CVE-2009-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2473"
},
{
"name": "CVE-2010-3053",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3053"
},
{
"name": "CVE-2010-3789",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3789"
},
{
"name": "CVE-2010-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1829"
},
{
"name": "CVE-2010-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2166"
},
{
"name": "CVE-2010-1848",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1848"
},
{
"name": "CVE-2010-3645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3645"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2010-3054",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3054"
},
{
"name": "CVE-2010-2184",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2184"
},
{
"name": "CVE-2010-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3648"
},
{
"name": "CVE-2010-3791",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3791"
},
{
"name": "CVE-2010-1449",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1449"
},
{
"name": "CVE-2010-3976",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3976"
},
{
"name": "CVE-2010-3797",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3797"
},
{
"name": "CVE-2010-1830",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1830"
},
{
"name": "CVE-2010-3641",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3641"
},
{
"name": "CVE-2010-2189",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2189"
},
{
"name": "CVE-2010-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3792"
},
{
"name": "CVE-2010-2216",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2216"
},
{
"name": "CVE-2010-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2174"
},
{
"name": "CVE-2010-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2169"
},
{
"name": "CVE-2010-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1837"
},
{
"name": "CVE-2010-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2806"
},
{
"name": "CVE-2009-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2624"
},
{
"name": "CVE-2010-2188",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2188"
},
{
"name": "CVE-2010-2185",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2185"
},
{
"name": "CVE-2010-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1833"
},
{
"name": "CVE-2010-1811",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1811"
},
{
"name": "CVE-2010-2500",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2500"
},
{
"name": "CVE-2010-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2213"
},
{
"name": "CVE-2009-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0796"
},
{
"name": "CVE-2010-2186",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2186"
},
{
"name": "CVE-2010-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1838"
},
{
"name": "CVE-2010-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2807"
},
{
"name": "CVE-2010-3785",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3785"
},
{
"name": "CVE-2010-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2183"
},
{
"name": "CVE-2010-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0105"
},
{
"name": "CVE-2010-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0001"
},
{
"name": "CVE-2010-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3652"
}
],
"links": [],
"reference": "CERTA-2010-AVI-548",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-11-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me\nd\u0027exploitation \u003cspan class=\"textit\"\u003eMac OS X\u003c/span\u003e. Leur exploitation\npermet, entre autres, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple 2010-007 du 11 novembre 2010",
"url": "http://support.apple.com/kb/HT4435"
}
]
}
CERTA-2010-AVI-565
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités affectent Apple iOS. Certaines permettent l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été corrigées dans différents composants du système d'exploitation Apple iOS, notamment dans :
- Configuration Profiles ;
- CoreGraphics ;
- FreeType ;
- iAd Content Display ;
- ImageIO ;
- libxml ;
- Mail ;
- Networking ;
- OfficeImport ;
- Photos ;
- Safari ;
- Telephony ;
- WebKit.
Parmi ces vulnérabilités, certaines permettent l'exécution de code arbitraire à distance, des dénis de service à distance ainsi que l'atteinte à la confidentialité des données sur les produits Apple embarquant le système d'exploitation iOS.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple iOS versions 4.1 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cSPAN class=\"textit\"\u003eApple iOS\u003c/SPAN\u003e versions 4.1 et ant\u00e9rieures.",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans diff\u00e9rents composants\ndu syst\u00e8me d\u0027exploitation Apple iOS, notamment dans :\n\n- Configuration Profiles ;\n- CoreGraphics ;\n- FreeType ;\n- iAd Content Display ;\n- ImageIO ;\n- libxml ;\n- Mail ;\n- Networking ;\n- OfficeImport ;\n- Photos ;\n- Safari ;\n- Telephony ;\n- WebKit.\n\nParmi ces vuln\u00e9rabilit\u00e9s, certaines permettent l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance, des d\u00e9nis de service \u00e0 distance ainsi que\nl\u0027atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es sur les produits Apple\nembarquant le syst\u00e8me d\u0027exploitation iOS.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-1408",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1408"
},
{
"name": "CVE-2010-1407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1407"
},
{
"name": "CVE-2010-1784",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1784"
},
{
"name": "CVE-2010-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1791"
},
{
"name": "CVE-2010-1782",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1782"
},
{
"name": "CVE-2010-1387",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1387"
},
{
"name": "CVE-2010-1822",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1822"
},
{
"name": "CVE-2010-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3821"
},
{
"name": "CVE-2010-3824",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3824"
},
{
"name": "CVE-2010-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1418"
},
{
"name": "CVE-2010-3832",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3832"
},
{
"name": "CVE-2010-3819",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3819"
},
{
"name": "CVE-2010-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3804"
},
{
"name": "CVE-2010-1403",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1403"
},
{
"name": "CVE-2010-1770",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1770"
},
{
"name": "CVE-2010-3822",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3822"
},
{
"name": "CVE-2010-3259",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3259"
},
{
"name": "CVE-2010-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1414"
},
{
"name": "CVE-2010-3813",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3813"
},
{
"name": "CVE-2010-1807",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1807"
},
{
"name": "CVE-2010-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3803"
},
{
"name": "CVE-2010-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3812"
},
{
"name": "CVE-2010-3831",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3831"
},
{
"name": "CVE-2009-1707",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1707"
},
{
"name": "CVE-2010-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2249"
},
{
"name": "CVE-2010-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1771"
},
{
"name": "CVE-2010-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3809"
},
{
"name": "CVE-2010-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3820"
},
{
"name": "CVE-2010-1813",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1813"
},
{
"name": "CVE-2010-0042",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0042"
},
{
"name": "CVE-2010-3816",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3816"
},
{
"name": "CVE-2010-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1789"
},
{
"name": "CVE-2010-1764",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1764"
},
{
"name": "CVE-2010-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1788"
},
{
"name": "CVE-2010-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3826"
},
{
"name": "CVE-2010-1410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1410"
},
{
"name": "CVE-2010-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3810"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2010-3830",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3830"
},
{
"name": "CVE-2010-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3786"
},
{
"name": "CVE-2010-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1793"
},
{
"name": "CVE-2010-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1786"
},
{
"name": "CVE-2010-0544",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0544"
},
{
"name": "CVE-2010-3829",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3829"
},
{
"name": "CVE-2010-1785",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1785"
},
{
"name": "CVE-2010-1783",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1783"
},
{
"name": "CVE-2010-1416",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1416"
},
{
"name": "CVE-2010-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3817"
},
{
"name": "CVE-2010-3814",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3814"
},
{
"name": "CVE-2010-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3808"
},
{
"name": "CVE-2010-1394",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1394"
},
{
"name": "CVE-2010-3116",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3116"
},
{
"name": "CVE-2010-1405",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1405"
},
{
"name": "CVE-2010-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3805"
},
{
"name": "CVE-2010-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0051"
},
{
"name": "CVE-2010-1806",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1806"
},
{
"name": "CVE-2010-1757",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1757"
},
{
"name": "CVE-2010-1422",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1422"
},
{
"name": "CVE-2010-3828",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3828"
},
{
"name": "CVE-2010-3827",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3827"
},
{
"name": "CVE-2010-1758",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1758"
},
{
"name": "CVE-2010-1843",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1843"
},
{
"name": "CVE-2010-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2808"
},
{
"name": "CVE-2010-1781",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1781"
},
{
"name": "CVE-2010-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2805"
},
{
"name": "CVE-2010-3818",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3818"
},
{
"name": "CVE-2010-1415",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1415"
},
{
"name": "CVE-2010-3053",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3053"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2010-3257",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3257"
},
{
"name": "CVE-2010-3823",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3823"
},
{
"name": "CVE-2010-3054",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3054"
},
{
"name": "CVE-2010-1421",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1421"
},
{
"name": "CVE-2010-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1417"
},
{
"name": "CVE-2010-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2806"
},
{
"name": "CVE-2010-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3811"
},
{
"name": "CVE-2010-1812",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1812"
},
{
"name": "CVE-2010-1811",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1811"
},
{
"name": "CVE-2010-1392",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1392"
},
{
"name": "CVE-2010-1780",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1780"
},
{
"name": "CVE-2010-1814",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1814"
},
{
"name": "CVE-2010-1815",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1815"
},
{
"name": "CVE-2010-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1787"
},
{
"name": "CVE-2010-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2807"
},
{
"name": "CVE-2010-1384",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1384"
}
],
"links": [],
"reference": "CERTA-2010-AVI-565",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s affectent \u003cspan class=\"textit\"\u003eApple\niOS\u003c/span\u003e. Certaines permettent l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple iOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4456 du 22 novembre 2010",
"url": "http://support.apple.com/kb/HT4456"
}
]
}
FKIE_CVE-2010-2808
Vulnerability from fkie_nvd - Published: 2010-08-19 18:00 - Updated: 2026-04-29 01:13| Vendor | Product | Version | |
|---|---|---|---|
| freetype | freetype | * | |
| apple | iphone_os | * | |
| apple | mac_os_x | * | |
| apple | tvos | * | |
| canonical | ubuntu_linux | 6.06 | |
| canonical | ubuntu_linux | 8.04 | |
| canonical | ubuntu_linux | 9.04 | |
| canonical | ubuntu_linux | 9.10 | |
| canonical | ubuntu_linux | 10.04 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33E14690-3A9D-45C7-A270-3433F79DEC28",
"versionEndExcluding": "2.4.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9636697-5FDF-4F67-A95B-D74DDD67A5DD",
"versionEndExcluding": "4.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46E5D24A-8CA0-4590-9F35-F684D573D030",
"versionEndExcluding": "10.6.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "407115F2-CC65-448B-8133-D3D57AD306BA",
"versionEndExcluding": "4.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la funci\u00f3n Mac_Read_POST_Resource en base/ftobjs.c de FreeType anterior a v2.4.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y fallo de la aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de fuentes Adobe Type 1 Mac Font File (tambi\u00e9n conocido como LWFN) manipuladas."
}
],
"id": "CVE-2010-2808",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-08-19T18:00:05.327",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/40816"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/40982"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42314"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42317"
},
{
"source": "secalert@redhat.com",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://support.apple.com/kb/HT4435"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT4456"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT4457"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/42285"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-972-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2018"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2106"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/3045"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/3046"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Release Notes",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://savannah.nongnu.org/bugs/?30658"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/40816"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/40982"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42314"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42317"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://support.apple.com/kb/HT4435"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT4456"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT4457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/42285"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-972-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2018"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/3045"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/3046"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Release Notes",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://savannah.nongnu.org/bugs/?30658"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-GMF8-RM42-FHX8
Vulnerability from github – Published: 2022-05-13 01:11 – Updated: 2022-05-13 01:11Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.
{
"affected": [],
"aliases": [
"CVE-2010-2808"
],
"database_specific": {
"cwe_ids": [
"CWE-120"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2010-08-19T18:00:00Z",
"severity": "MODERATE"
},
"details": "Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.",
"id": "GHSA-gmf8-rm42-fhx8",
"modified": "2022-05-13T01:11:15Z",
"published": "2022-05-13T01:11:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2808"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2010:0737"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2010:0864"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2010-2808"
},
{
"type": "WEB",
"url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
},
{
"type": "WEB",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
},
{
"type": "WEB",
"url": "https://savannah.nongnu.org/bugs/?30658"
},
{
"type": "WEB",
"url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
},
{
"type": "WEB",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/40816"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/40982"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/42314"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/42317"
},
{
"type": "WEB",
"url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4435"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4456"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4457"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/42285"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-972-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/2018"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/2106"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/3045"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/3046"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2010-2808
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2010-2808",
"description": "Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.",
"id": "GSD-2010-2808",
"references": [
"https://www.suse.com/security/cve/CVE-2010-2808.html",
"https://www.debian.org/security/2010/dsa-2105",
"https://access.redhat.com/errata/RHSA-2010:0864",
"https://access.redhat.com/errata/RHSA-2010:0737",
"https://linux.oracle.com/cve/CVE-2010-2808.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-2808"
],
"details": "Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.",
"id": "GSD-2010-2808",
"modified": "2023-12-13T01:21:30.962882Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2808",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT4435"
},
{
"name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
},
{
"name": "http://secunia.com/advisories/42314",
"refsource": "MISC",
"url": "http://secunia.com/advisories/42314"
},
{
"name": "http://secunia.com/advisories/42317",
"refsource": "MISC",
"url": "http://secunia.com/advisories/42317"
},
{
"name": "http://support.apple.com/kb/HT4456",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT4456"
},
{
"name": "http://support.apple.com/kb/HT4457",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT4457"
},
{
"name": "http://www.vupen.com/english/advisories/2010/3045",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/3045"
},
{
"name": "http://www.vupen.com/english/advisories/2010/3046",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/3046"
},
{
"name": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2",
"refsource": "MISC",
"url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
},
{
"name": "http://secunia.com/advisories/40982",
"refsource": "MISC",
"url": "http://secunia.com/advisories/40982"
},
{
"name": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view",
"refsource": "MISC",
"url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
},
{
"name": "http://www.ubuntu.com/usn/USN-972-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-972-1"
},
{
"name": "http://www.vupen.com/english/advisories/2010/2106",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/2106"
},
{
"name": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
"refsource": "MISC",
"url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
},
{
"name": "http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2"
},
{
"name": "http://secunia.com/advisories/40816",
"refsource": "MISC",
"url": "http://secunia.com/advisories/40816"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2010-0864.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
},
{
"name": "http://www.securityfocus.com/bid/42285",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/42285"
},
{
"name": "http://www.vupen.com/english/advisories/2010/2018",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/2018"
},
{
"name": "https://rhn.redhat.com/errata/RHSA-2010-0737.html",
"refsource": "MISC",
"url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
},
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975",
"refsource": "MISC",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"
},
{
"name": "http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2"
},
{
"name": "https://savannah.nongnu.org/bugs/?30658",
"refsource": "MISC",
"url": "https://savannah.nongnu.org/bugs/?30658"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=621907",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.4.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.6.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-2808"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=621907",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
},
{
"name": "[oss-security] 20100806 CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://marc.info/?l=oss-security\u0026m=128110167119337\u0026w=2"
},
{
"name": "ADV-2010-2106",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2106"
},
{
"name": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Release Notes",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
},
{
"name": "ADV-2010-2018",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2018"
},
{
"name": "[oss-security] 20100806 Re: CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three more",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://marc.info/?l=oss-security\u0026m=128111955616772\u0026w=2"
},
{
"name": "40816",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/40816"
},
{
"name": "42285",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/42285"
},
{
"name": "https://savannah.nongnu.org/bugs/?30658",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://savannah.nongnu.org/bugs/?30658"
},
{
"name": "USN-972-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-972-1"
},
{
"name": "40982",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/40982"
},
{
"name": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view",
"refsource": "CONFIRM",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
},
{
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"
},
{
"name": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2",
"refsource": "CONFIRM",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
},
{
"name": "APPLE-SA-2010-11-10-1",
"refsource": "APPLE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4435",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "http://support.apple.com/kb/HT4435"
},
{
"name": "http://support.apple.com/kb/HT4456",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT4456"
},
{
"name": "APPLE-SA-2010-11-22-1",
"refsource": "APPLE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
},
{
"name": "ADV-2010-3045",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/3045"
},
{
"name": "http://support.apple.com/kb/HT4457",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT4457"
},
{
"name": "ADV-2010-3046",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/3046"
},
{
"name": "42317",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42317"
},
{
"name": "42314",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/42314"
},
{
"name": "RHSA-2010:0737",
"refsource": "REDHAT",
"tags": [
"Broken Link"
],
"url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
},
{
"name": "RHSA-2010:0864",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T03:19Z",
"publishedDate": "2010-08-19T18:00Z"
}
}
}
RHSA-2010:0737
Vulnerability from csaf_redhat - Published: 2010-10-04 17:49 - Updated: 2026-01-28 22:51Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated freetype packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. The freetype packages for Red Hat Enterprise Linux 4 provide\nboth the FreeType 1 and FreeType 2 font engines. The freetype packages for\nRed Hat Enterprise Linux 5 provide only the FreeType 2 font engine.\n\nIt was discovered that the FreeType font rendering engine improperly\nvalidated certain position values when processing input streams. If a user\nloaded a specially-crafted font file with an application linked against\nFreeType, and the relevant font glyphs were subsequently rendered with the\nX FreeType library (libXft), it could trigger a heap-based buffer overflow\nin the libXft library, causing the application to crash or, possibly,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2010-3311)\n\nA stack-based buffer overflow flaw was found in the way the FreeType font\nrendering engine processed some PostScript Type 1 fonts. If a user loaded a\nspecially-crafted font file with an application linked against FreeType, it\ncould cause the application to crash or, possibly, execute arbitrary code\nwith the privileges of the user running the application. (CVE-2010-2808)\n\nAn array index error was found in the way the FreeType font rendering\nengine processed certain PostScript Type 42 font files. If a user loaded a\nspecially-crafted font file with an application linked against FreeType, it\ncould cause the application to crash or, possibly, execute arbitrary code\nwith the privileges of the user running the application. (CVE-2010-2806)\n\nA stack overflow flaw was found in the way the FreeType font rendering\nengine processed PostScript Type 1 font files that contain nested Standard\nEncoding Accented Character (seac) calls. If a user loaded a\nspecially-crafted font file with an application linked against FreeType, it\ncould cause the application to crash. (CVE-2010-3054)\n\nNote: All of the issues in this erratum only affect the FreeType 2 font\nengine.\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0737",
"url": "https://access.redhat.com/errata/RHSA-2010:0737"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "621907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
},
{
"category": "external",
"summary": "621980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980"
},
{
"category": "external",
"summary": "623625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=623625"
},
{
"category": "external",
"summary": "625632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625632"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0737.json"
}
],
"title": "Red Hat Security Advisory: freetype security update",
"tracking": {
"current_release_date": "2026-01-28T22:51:21+00:00",
"generator": {
"date": "2026-01-28T22:51:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2010:0737",
"initial_release_date": "2010-10-04T17:49:00+00:00",
"revision_history": [
{
"date": "2010-10-04T17:49:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-10-04T13:54:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:51:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "freetype-demos-0:2.1.9-17.el4.8.ia64",
"product": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ia64",
"product_id": "freetype-demos-0:2.1.9-17.el4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.1.9-17.el4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freetype-utils-0:2.1.9-17.el4.8.ia64",
"product": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ia64",
"product_id": "freetype-utils-0:2.1.9-17.el4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-utils@2.1.9-17.el4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"product": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"product_id": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-17.el4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.1.9-17.el4.8.ia64",
"product": {
"name": "freetype-0:2.1.9-17.el4.8.ia64",
"product_id": "freetype-0:2.1.9-17.el4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.1.9-17.el4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.1.9-17.el4.8.ia64",
"product": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ia64",
"product_id": "freetype-devel-0:2.1.9-17.el4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.1.9-17.el4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"product": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"product_id": "freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.2.1-28.el5_5.ia64",
"product": {
"name": "freetype-0:2.2.1-28.el5_5.ia64",
"product_id": "freetype-0:2.2.1-28.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.2.1-28.el5_5.ia64",
"product": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ia64",
"product_id": "freetype-devel-0:2.2.1-28.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "freetype-demos-0:2.2.1-28.el5_5.ia64",
"product": {
"name": "freetype-demos-0:2.2.1-28.el5_5.ia64",
"product_id": "freetype-demos-0:2.2.1-28.el5_5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"product": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"product_id": "freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-17.el4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.1.9-17.el4.8.i386",
"product": {
"name": "freetype-0:2.1.9-17.el4.8.i386",
"product_id": "freetype-0:2.1.9-17.el4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.1.9-17.el4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freetype-demos-0:2.1.9-17.el4.8.i386",
"product": {
"name": "freetype-demos-0:2.1.9-17.el4.8.i386",
"product_id": "freetype-demos-0:2.1.9-17.el4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.1.9-17.el4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freetype-utils-0:2.1.9-17.el4.8.i386",
"product": {
"name": "freetype-utils-0:2.1.9-17.el4.8.i386",
"product_id": "freetype-utils-0:2.1.9-17.el4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-utils@2.1.9-17.el4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.1.9-17.el4.8.i386",
"product": {
"name": "freetype-devel-0:2.1.9-17.el4.8.i386",
"product_id": "freetype-devel-0:2.1.9-17.el4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.1.9-17.el4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"product": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"product_id": "freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.2.1-28.el5_5.i386",
"product": {
"name": "freetype-devel-0:2.2.1-28.el5_5.i386",
"product_id": "freetype-devel-0:2.2.1-28.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freetype-demos-0:2.2.1-28.el5_5.i386",
"product": {
"name": "freetype-demos-0:2.2.1-28.el5_5.i386",
"product_id": "freetype-demos-0:2.2.1-28.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.2.1-28.el5_5.i386",
"product": {
"name": "freetype-0:2.2.1-28.el5_5.i386",
"product_id": "freetype-0:2.2.1-28.el5_5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "freetype-demos-0:2.1.9-17.el4.8.x86_64",
"product": {
"name": "freetype-demos-0:2.1.9-17.el4.8.x86_64",
"product_id": "freetype-demos-0:2.1.9-17.el4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.1.9-17.el4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freetype-utils-0:2.1.9-17.el4.8.x86_64",
"product": {
"name": "freetype-utils-0:2.1.9-17.el4.8.x86_64",
"product_id": "freetype-utils-0:2.1.9-17.el4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-utils@2.1.9-17.el4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"product": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"product_id": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-17.el4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.1.9-17.el4.8.x86_64",
"product": {
"name": "freetype-0:2.1.9-17.el4.8.x86_64",
"product_id": "freetype-0:2.1.9-17.el4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.1.9-17.el4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.1.9-17.el4.8.x86_64",
"product": {
"name": "freetype-devel-0:2.1.9-17.el4.8.x86_64",
"product_id": "freetype-devel-0:2.1.9-17.el4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.1.9-17.el4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"product": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"product_id": "freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.2.1-28.el5_5.x86_64",
"product": {
"name": "freetype-devel-0:2.2.1-28.el5_5.x86_64",
"product_id": "freetype-devel-0:2.2.1-28.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freetype-demos-0:2.2.1-28.el5_5.x86_64",
"product": {
"name": "freetype-demos-0:2.2.1-28.el5_5.x86_64",
"product_id": "freetype-demos-0:2.2.1-28.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.2.1-28.el5_5.x86_64",
"product": {
"name": "freetype-0:2.2.1-28.el5_5.x86_64",
"product_id": "freetype-0:2.2.1-28.el5_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "freetype-0:2.1.9-17.el4.8.src",
"product": {
"name": "freetype-0:2.1.9-17.el4.8.src",
"product_id": "freetype-0:2.1.9-17.el4.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.1.9-17.el4.8?arch=src"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.2.1-28.el5_5.src",
"product": {
"name": "freetype-0:2.2.1-28.el5_5.src",
"product_id": "freetype-0:2.2.1-28.el5_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "freetype-demos-0:2.1.9-17.el4.8.ppc",
"product": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ppc",
"product_id": "freetype-demos-0:2.1.9-17.el4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.1.9-17.el4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freetype-utils-0:2.1.9-17.el4.8.ppc",
"product": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ppc",
"product_id": "freetype-utils-0:2.1.9-17.el4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-utils@2.1.9-17.el4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"product": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"product_id": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-17.el4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.1.9-17.el4.8.ppc",
"product": {
"name": "freetype-0:2.1.9-17.el4.8.ppc",
"product_id": "freetype-0:2.1.9-17.el4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.1.9-17.el4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.1.9-17.el4.8.ppc",
"product": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ppc",
"product_id": "freetype-devel-0:2.1.9-17.el4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.1.9-17.el4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"product": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"product_id": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.2.1-28.el5_5.ppc",
"product": {
"name": "freetype-0:2.2.1-28.el5_5.ppc",
"product_id": "freetype-0:2.2.1-28.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc",
"product": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc",
"product_id": "freetype-devel-0:2.2.1-28.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "freetype-demos-0:2.2.1-28.el5_5.ppc",
"product": {
"name": "freetype-demos-0:2.2.1-28.el5_5.ppc",
"product_id": "freetype-demos-0:2.2.1-28.el5_5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"product": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"product_id": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-17.el4.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.1.9-17.el4.8.ppc64",
"product": {
"name": "freetype-0:2.1.9-17.el4.8.ppc64",
"product_id": "freetype-0:2.1.9-17.el4.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.1.9-17.el4.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"product": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"product_id": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.2.1-28.el5_5.ppc64",
"product": {
"name": "freetype-0:2.2.1-28.el5_5.ppc64",
"product_id": "freetype-0:2.2.1-28.el5_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc64",
"product": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc64",
"product_id": "freetype-devel-0:2.2.1-28.el5_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "freetype-demos-0:2.1.9-17.el4.8.s390x",
"product": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390x",
"product_id": "freetype-demos-0:2.1.9-17.el4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.1.9-17.el4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freetype-utils-0:2.1.9-17.el4.8.s390x",
"product": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390x",
"product_id": "freetype-utils-0:2.1.9-17.el4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-utils@2.1.9-17.el4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"product": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"product_id": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-17.el4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.1.9-17.el4.8.s390x",
"product": {
"name": "freetype-0:2.1.9-17.el4.8.s390x",
"product_id": "freetype-0:2.1.9-17.el4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.1.9-17.el4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.1.9-17.el4.8.s390x",
"product": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390x",
"product_id": "freetype-devel-0:2.1.9-17.el4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.1.9-17.el4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"product": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"product_id": "freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.2.1-28.el5_5.s390x",
"product": {
"name": "freetype-0:2.2.1-28.el5_5.s390x",
"product_id": "freetype-0:2.2.1-28.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.2.1-28.el5_5.s390x",
"product": {
"name": "freetype-devel-0:2.2.1-28.el5_5.s390x",
"product_id": "freetype-devel-0:2.2.1-28.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "freetype-demos-0:2.2.1-28.el5_5.s390x",
"product": {
"name": "freetype-demos-0:2.2.1-28.el5_5.s390x",
"product_id": "freetype-demos-0:2.2.1-28.el5_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"product": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"product_id": "freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-17.el4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.1.9-17.el4.8.s390",
"product": {
"name": "freetype-0:2.1.9-17.el4.8.s390",
"product_id": "freetype-0:2.1.9-17.el4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.1.9-17.el4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freetype-demos-0:2.1.9-17.el4.8.s390",
"product": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390",
"product_id": "freetype-demos-0:2.1.9-17.el4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-demos@2.1.9-17.el4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freetype-utils-0:2.1.9-17.el4.8.s390",
"product": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390",
"product_id": "freetype-utils-0:2.1.9-17.el4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-utils@2.1.9-17.el4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.1.9-17.el4.8.s390",
"product": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390",
"product_id": "freetype-devel-0:2.1.9-17.el4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.1.9-17.el4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"product": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"product_id": "freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freetype-0:2.2.1-28.el5_5.s390",
"product": {
"name": "freetype-0:2.2.1-28.el5_5.s390",
"product_id": "freetype-0:2.2.1-28.el5_5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "freetype-devel-0:2.2.1-28.el5_5.s390",
"product": {
"name": "freetype-devel-0:2.2.1-28.el5_5.s390",
"product_id": "freetype-devel-0:2.2.1-28.el5_5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-0:2.1.9-17.el4.8.ppc64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-0:2.1.9-17.el4.8.src"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-demos-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-demos-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-demos-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-demos-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-demos-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-devel-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-devel-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-devel-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-devel-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-devel-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-utils-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-utils-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-utils-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-utils-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-utils-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-0:2.1.9-17.el4.8.ppc64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-0:2.1.9-17.el4.8.src"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-0:2.1.9-17.el4.8.ppc64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-0:2.1.9-17.el4.8.src"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-demos-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-demos-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-demos-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-demos-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-demos-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-devel-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-devel-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-devel-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-devel-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-devel-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-utils-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-utils-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-utils-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-utils-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-utils-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-0:2.1.9-17.el4.8.ppc64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-0:2.1.9-17.el4.8.src"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-demos-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-demos-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-demos-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-demos-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-demos-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-demos-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-devel-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-devel-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-devel-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-devel-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-devel-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-devel-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-utils-0:2.1.9-17.el4.8.i386"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-utils-0:2.1.9-17.el4.8.ia64"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-utils-0:2.1.9-17.el4.8.ppc"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-utils-0:2.1.9-17.el4.8.s390"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-utils-0:2.1.9-17.el4.8.s390x"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-utils-0:2.1.9-17.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64"
},
"product_reference": "freetype-utils-0:2.1.9-17.el4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-0:2.2.1-28.el5_5.src"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-0:2.2.1-28.el5_5.ppc64"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-0:2.2.1-28.el5_5.s390"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-0:2.2.1-28.el5_5.src"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-demos-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-demos-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-demos-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-demos-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-devel-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-devel-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-devel-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-devel-0:2.2.1-28.el5_5.s390"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-devel-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-0:2.2.1-28.el5_5.ppc64"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-0:2.2.1-28.el5_5.s390"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-0:2.2.1-28.el5_5.src"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-debuginfo-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-demos-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-demos-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-demos-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-demos-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-demos-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-demos-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-devel-0:2.2.1-28.el5_5.i386"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-devel-0:2.2.1-28.el5_5.ia64"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-devel-0:2.2.1-28.el5_5.ppc"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-devel-0:2.2.1-28.el5_5.s390"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-devel-0:2.2.1-28.el5_5.s390x"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "freetype-devel-0:2.2.1-28.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
},
"product_reference": "freetype-devel-0:2.2.1-28.el5_5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-2806",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2010-08-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "621980"
}
],
"notes": [
{
"category": "description",
"text": "Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "FreeType: Heap-based buffer overflow by processing FontType42 fonts with negative length of SFNT strings (FT bug #30656)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-2806"
},
{
"category": "external",
"summary": "RHBZ#621980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2806"
}
],
"release_date": "2010-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-04T17:49:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0737"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "FreeType: Heap-based buffer overflow by processing FontType42 fonts with negative length of SFNT strings (FT bug #30656)"
},
{
"cve": "CVE-2010-2808",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2010-08-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "621907"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "FreeType: Stack-based buffer overflow by processing certain LWFN fonts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-2808"
},
{
"category": "external",
"summary": "RHBZ#621907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2808"
}
],
"release_date": "2010-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-04T17:49:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0737"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "FreeType: Stack-based buffer overflow by processing certain LWFN fonts"
},
{
"cve": "CVE-2010-3054",
"discovery_date": "2010-08-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "625632"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freetype: DoS via nested \"seac\" calls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3054"
},
{
"category": "external",
"summary": "RHBZ#625632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625632"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3054",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3054"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3054",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3054"
}
],
"release_date": "2010-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-04T17:49:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0737"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "freetype: DoS via nested \"seac\" calls"
},
{
"cve": "CVE-2010-3311",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2010-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "623625"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an \"input stream position error\" issue, a different vulnerability than CVE-2010-1797.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "freetype: Input stream position error by processing Compact Font Format (CFF) font files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-3311"
},
{
"category": "external",
"summary": "RHBZ#623625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=623625"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-3311",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3311"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3311",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3311"
}
],
"release_date": "2010-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-10-04T17:49:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0737"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:freetype-0:2.1.9-17.el4.8.i386",
"4AS:freetype-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-0:2.1.9-17.el4.8.s390",
"4AS:freetype-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-0:2.1.9-17.el4.8.src",
"4AS:freetype-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4AS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4AS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4AS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4AS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4AS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-0:2.1.9-17.el4.8.src",
"4Desktop:freetype-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.i386",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4Desktop:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-0:2.1.9-17.el4.8.i386",
"4ES:freetype-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-0:2.1.9-17.el4.8.s390",
"4ES:freetype-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-0:2.1.9-17.el4.8.src",
"4ES:freetype-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.i386",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390",
"4ES:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.i386",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390",
"4ES:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.i386",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4ES:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390",
"4ES:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4ES:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-0:2.1.9-17.el4.8.i386",
"4WS:freetype-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-0:2.1.9-17.el4.8.s390",
"4WS:freetype-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-0:2.1.9-17.el4.8.src",
"4WS:freetype-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.i386",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.ppc64",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-debuginfo-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.i386",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-demos-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390",
"4WS:freetype-demos-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-demos-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.i386",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-devel-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390",
"4WS:freetype-devel-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-devel-0:2.1.9-17.el4.8.x86_64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.i386",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ia64",
"4WS:freetype-utils-0:2.1.9-17.el4.8.ppc",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390",
"4WS:freetype-utils-0:2.1.9-17.el4.8.s390x",
"4WS:freetype-utils-0:2.1.9-17.el4.8.x86_64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.src",
"5Client-Workstation:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client-Workstation:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-0:2.2.1-28.el5_5.i386",
"5Client:freetype-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-0:2.2.1-28.el5_5.s390",
"5Client:freetype-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-0:2.2.1-28.el5_5.src",
"5Client:freetype-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Client:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Client:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Client:freetype-devel-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-0:2.2.1-28.el5_5.i386",
"5Server:freetype-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-0:2.2.1-28.el5_5.s390",
"5Server:freetype-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-0:2.2.1-28.el5_5.src",
"5Server:freetype-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.i386",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-debuginfo-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.i386",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-demos-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-demos-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-demos-0:2.2.1-28.el5_5.x86_64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.i386",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ia64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc",
"5Server:freetype-devel-0:2.2.1-28.el5_5.ppc64",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390",
"5Server:freetype-devel-0:2.2.1-28.el5_5.s390x",
"5Server:freetype-devel-0:2.2.1-28.el5_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "freetype: Input stream position error by processing Compact Font Format (CFF) font files"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.