Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-3439 (GCVE-0-2011-3439)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:37:47.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2012:0015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" }, { "name": "SUSE-SU-2011:1307", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" }, { "name": "openSUSE-SU-2012:0047", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" }, { "name": "APPLE-SA-2011-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5052" }, { "name": "46921", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46921" }, { "name": "48951", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48951" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-10T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-04T10:00:00", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "openSUSE-SU-2012:0015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" }, { "name": "SUSE-SU-2011:1307", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" }, { "name": "openSUSE-SU-2012:0047", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" }, { "name": "APPLE-SA-2011-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5052" }, { "name": "46921", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46921" }, { "name": "48951", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48951" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2011-3439", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2012:0015", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" }, { "name": "SUSE-SU-2011:1307", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" }, { "name": "openSUSE-SU-2012:0047", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" }, { "name": "APPLE-SA-2011-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "name": "http://support.apple.com/kb/HT5052", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5052" }, { "name": "46921", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46921" }, { "name": "48951", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48951" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2011-3439", "datePublished": "2011-11-11T18:00:00", "dateReserved": "2011-09-13T00:00:00", "dateUpdated": "2024-08-06T23:37:47.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-3439\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2011-11-11T18:55:01.193\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.\"},{\"lang\":\"es\",\"value\":\"FreeType en CoreGraphics en Apple iOS anterior a v5.0.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de una fuente manipulada en un documento.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.0.1\",\"matchCriteriaId\":\"81280D9A-E4E0-4A71-A1E4-532005EDAC5F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"60FBDD82-691C-4D9D-B71B-F9AFF6931B53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*\",\"matchCriteriaId\":\"A44C3422-0D42-473E-ABB4-279D7494EE2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*\",\"matchCriteriaId\":\"A6B7CDCA-6F39-4113-B5D3-3AA9D7F3D809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C91701-DF37-4F7B-AB9A-B1BFDB4991F8\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/46921\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/48951\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5052\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/46921\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/48951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
fkie_cve-2011-3439
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
apple | iphone_os | * | |
suse | linux_enterprise_desktop | 11 | |
suse | linux_enterprise_server | 11 | |
suse | linux_enterprise_server | 11 | |
suse | linux_enterprise_software_development_kit | 11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "81280D9A-E4E0-4A71-A1E4-532005EDAC5F", "versionEndExcluding": "5.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "matchCriteriaId": "60FBDD82-691C-4D9D-B71B-F9AFF6931B53", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*", "matchCriteriaId": "A44C3422-0D42-473E-ABB4-279D7494EE2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*", "matchCriteriaId": "A6B7CDCA-6F39-4113-B5D3-3AA9D7F3D809", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*", "matchCriteriaId": "E8C91701-DF37-4F7B-AB9A-B1BFDB4991F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document." }, { "lang": "es", "value": "FreeType en CoreGraphics en Apple iOS anterior a v5.0.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de una fuente manipulada en un documento." } ], "id": "CVE-2011-3439", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-11-11T18:55:01.193", "references": [ { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "source": "product-security@apple.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" }, { "source": "product-security@apple.com", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" }, { "source": "product-security@apple.com", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" }, { "source": "product-security@apple.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/46921" }, { "source": "product-security@apple.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48951" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/46921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5052" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
RHSA-2012:0094
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.6 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently.\n\nMultiple input validation flaws were found in the way FreeType processed\nbitmap font files. If a specially-crafted font file was loaded by an\napplication linked against FreeType, it could cause the application to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-3256)\n\nMultiple input validation flaws were found in the way FreeType processed\nCID-keyed fonts. If a specially-crafted font file was loaded by an\napplication linked against FreeType, it could cause the application to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-3439)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0094", "url": "https://access.redhat.com/errata/RHSA-2012:0094" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "746226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226" }, { "category": "external", "summary": "753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0094.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2025-09-10T13:52:25+00:00", "generator": { "date": "2025-09-10T13:52:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2012:0094", "initial_release_date": "2012-02-02T22:23:00+00:00", "revision_history": [ { "date": "2012-02-02T22:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-02T22:29:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:52:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.6 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.ppc64", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc64", "product_id": "freetype-0:2.2.1-28.el5_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.s390", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.s390", "product_id": "freetype-0:2.2.1-28.el5_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.src", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.src", "product_id": "freetype-0:2.2.1-28.el5_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.s390", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.src as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.src", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3256", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2010-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "746226" } ], "notes": [ { "category": "description", "text": "FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3256" }, { "category": "external", "summary": "RHBZ#746226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3256", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3256" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3256", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3256" } ], "release_date": "2011-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-02T22:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0094" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation" }, { "cve": "CVE-2011-3439", "discovery_date": "2011-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "753799" } ], "notes": [ { "category": "description", "text": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3439" }, { "category": "external", "summary": "RHBZ#753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3439", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439" } ], "release_date": "2011-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-02T22:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0094" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts" } ] }
rhsa-2011:1455
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. The freetype packages for Red Hat Enterprise Linux 4 provide\nboth the FreeType 1 and FreeType 2 font engines. The freetype packages for\nRed Hat Enterprise Linux 5 and 6 provide only the FreeType 2 font engine.\n\nMultiple input validation flaws were found in the way FreeType processed\nCID-keyed fonts. If a specially-crafted font file was loaded by an\napplication linked against FreeType, it could cause the application to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-3439)\n\nNote: These issues only affected the FreeType 2 font engine.\n\nUsers are advised to upgrade to these updated packages, which contain a\nbackported patch to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1455", "url": "https://access.redhat.com/errata/RHSA-2011:1455" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1455.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2025-09-10T13:51:49+00:00", "generator": { "date": "2025-09-10T13:51:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2011:1455", "initial_release_date": "2011-11-16T22:55:00+00:00", "revision_history": [ { "date": "2011-11-16T22:55:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-11-16T23:01:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:51:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "RHEL Desktop Workstation (v. 5 client)", "product": { "name": "RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-utils-0:2.1.9-21.el4.ia64", "product_id": "freetype-utils-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-demos-0:2.1.9-21.el4.ia64", "product_id": "freetype-demos-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-devel-0:2.1.9-21.el4.ia64", "product_id": "freetype-devel-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-0:2.1.9-21.el4.ia64", "product_id": "freetype-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.i386", "product": { "name": "freetype-0:2.1.9-21.el4.i386", "product_id": "freetype-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.i386", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.i386", "product": { "name": "freetype-utils-0:2.1.9-21.el4.i386", "product_id": "freetype-utils-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.i386", "product": { "name": "freetype-demos-0:2.1.9-21.el4.i386", "product_id": "freetype-demos-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.i386", "product": { "name": "freetype-devel-0:2.1.9-21.el4.i386", "product_id": "freetype-devel-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64", "product_id": "freetype-utils-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64", "product_id": "freetype-demos-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64", "product_id": "freetype-devel-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-0:2.1.9-21.el4.x86_64", "product_id": "freetype-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.src", "product": { "name": "freetype-0:2.1.9-21.el4.src", "product_id": "freetype-0:2.1.9-21.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.src", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.src", "product_id": "freetype-0:2.2.1-28.el5_7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.src", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.src", "product_id": "freetype-0:2.3.11-6.el6_1.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-utils-0:2.1.9-21.el4.ppc", "product_id": "freetype-utils-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-demos-0:2.1.9-21.el4.ppc", "product_id": "freetype-demos-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-devel-0:2.1.9-21.el4.ppc", "product_id": "freetype-devel-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-0:2.1.9-21.el4.ppc", "product_id": "freetype-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.ppc", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc", "product_id": "freetype-0:2.3.11-6.el6_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.ppc64", "product": { "name": "freetype-0:2.1.9-21.el4.ppc64", "product_id": "freetype-0:2.1.9-21.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.ppc64", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64", "product_id": "freetype-0:2.2.1-28.el5_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-utils-0:2.1.9-21.el4.s390x", "product_id": "freetype-utils-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-demos-0:2.1.9-21.el4.s390x", "product_id": "freetype-demos-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-devel-0:2.1.9-21.el4.s390x", "product_id": "freetype-devel-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-0:2.1.9-21.el4.s390x", "product_id": "freetype-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.s390", "product": { "name": "freetype-0:2.1.9-21.el4.s390", "product_id": "freetype-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.s390", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.s390", "product": { "name": "freetype-utils-0:2.1.9-21.el4.s390", "product_id": "freetype-utils-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.s390", "product": { "name": "freetype-demos-0:2.1.9-21.el4.s390", "product_id": "freetype-demos-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.s390", "product": { "name": "freetype-devel-0:2.1.9-21.el4.s390", "product_id": "freetype-devel-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.s390", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.s390", "product_id": "freetype-0:2.2.1-28.el5_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.s390", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.s390", "product_id": "freetype-0:2.3.11-6.el6_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=i686" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=i686" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=i686" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.src", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.src as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.src", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.src", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.src", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3439", "discovery_date": "2011-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "753799" } ], "notes": [ { "category": "description", "text": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:freetype-0:2.1.9-21.el4.i386", "4AS:freetype-0:2.1.9-21.el4.ia64", "4AS:freetype-0:2.1.9-21.el4.ppc", "4AS:freetype-0:2.1.9-21.el4.ppc64", "4AS:freetype-0:2.1.9-21.el4.s390", "4AS:freetype-0:2.1.9-21.el4.s390x", "4AS:freetype-0:2.1.9-21.el4.src", "4AS:freetype-0:2.1.9-21.el4.x86_64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4AS:freetype-demos-0:2.1.9-21.el4.i386", "4AS:freetype-demos-0:2.1.9-21.el4.ia64", "4AS:freetype-demos-0:2.1.9-21.el4.ppc", "4AS:freetype-demos-0:2.1.9-21.el4.s390", "4AS:freetype-demos-0:2.1.9-21.el4.s390x", "4AS:freetype-demos-0:2.1.9-21.el4.x86_64", "4AS:freetype-devel-0:2.1.9-21.el4.i386", "4AS:freetype-devel-0:2.1.9-21.el4.ia64", "4AS:freetype-devel-0:2.1.9-21.el4.ppc", "4AS:freetype-devel-0:2.1.9-21.el4.s390", "4AS:freetype-devel-0:2.1.9-21.el4.s390x", "4AS:freetype-devel-0:2.1.9-21.el4.x86_64", "4AS:freetype-utils-0:2.1.9-21.el4.i386", "4AS:freetype-utils-0:2.1.9-21.el4.ia64", "4AS:freetype-utils-0:2.1.9-21.el4.ppc", "4AS:freetype-utils-0:2.1.9-21.el4.s390", "4AS:freetype-utils-0:2.1.9-21.el4.s390x", "4AS:freetype-utils-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-0:2.1.9-21.el4.i386", "4Desktop:freetype-0:2.1.9-21.el4.ia64", "4Desktop:freetype-0:2.1.9-21.el4.ppc", "4Desktop:freetype-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-0:2.1.9-21.el4.s390", "4Desktop:freetype-0:2.1.9-21.el4.s390x", "4Desktop:freetype-0:2.1.9-21.el4.src", "4Desktop:freetype-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-demos-0:2.1.9-21.el4.i386", "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64", "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x", "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-devel-0:2.1.9-21.el4.i386", "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64", "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x", "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-utils-0:2.1.9-21.el4.i386", "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64", "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x", "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64", "4ES:freetype-0:2.1.9-21.el4.i386", "4ES:freetype-0:2.1.9-21.el4.ia64", "4ES:freetype-0:2.1.9-21.el4.ppc", "4ES:freetype-0:2.1.9-21.el4.ppc64", "4ES:freetype-0:2.1.9-21.el4.s390", "4ES:freetype-0:2.1.9-21.el4.s390x", "4ES:freetype-0:2.1.9-21.el4.src", "4ES:freetype-0:2.1.9-21.el4.x86_64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4ES:freetype-demos-0:2.1.9-21.el4.i386", "4ES:freetype-demos-0:2.1.9-21.el4.ia64", "4ES:freetype-demos-0:2.1.9-21.el4.ppc", "4ES:freetype-demos-0:2.1.9-21.el4.s390", "4ES:freetype-demos-0:2.1.9-21.el4.s390x", "4ES:freetype-demos-0:2.1.9-21.el4.x86_64", "4ES:freetype-devel-0:2.1.9-21.el4.i386", "4ES:freetype-devel-0:2.1.9-21.el4.ia64", "4ES:freetype-devel-0:2.1.9-21.el4.ppc", "4ES:freetype-devel-0:2.1.9-21.el4.s390", "4ES:freetype-devel-0:2.1.9-21.el4.s390x", "4ES:freetype-devel-0:2.1.9-21.el4.x86_64", "4ES:freetype-utils-0:2.1.9-21.el4.i386", "4ES:freetype-utils-0:2.1.9-21.el4.ia64", "4ES:freetype-utils-0:2.1.9-21.el4.ppc", "4ES:freetype-utils-0:2.1.9-21.el4.s390", "4ES:freetype-utils-0:2.1.9-21.el4.s390x", "4ES:freetype-utils-0:2.1.9-21.el4.x86_64", "4WS:freetype-0:2.1.9-21.el4.i386", "4WS:freetype-0:2.1.9-21.el4.ia64", "4WS:freetype-0:2.1.9-21.el4.ppc", "4WS:freetype-0:2.1.9-21.el4.ppc64", "4WS:freetype-0:2.1.9-21.el4.s390", "4WS:freetype-0:2.1.9-21.el4.s390x", "4WS:freetype-0:2.1.9-21.el4.src", "4WS:freetype-0:2.1.9-21.el4.x86_64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4WS:freetype-demos-0:2.1.9-21.el4.i386", "4WS:freetype-demos-0:2.1.9-21.el4.ia64", "4WS:freetype-demos-0:2.1.9-21.el4.ppc", "4WS:freetype-demos-0:2.1.9-21.el4.s390", "4WS:freetype-demos-0:2.1.9-21.el4.s390x", "4WS:freetype-demos-0:2.1.9-21.el4.x86_64", "4WS:freetype-devel-0:2.1.9-21.el4.i386", "4WS:freetype-devel-0:2.1.9-21.el4.ia64", "4WS:freetype-devel-0:2.1.9-21.el4.ppc", "4WS:freetype-devel-0:2.1.9-21.el4.s390", "4WS:freetype-devel-0:2.1.9-21.el4.s390x", "4WS:freetype-devel-0:2.1.9-21.el4.x86_64", "4WS:freetype-utils-0:2.1.9-21.el4.i386", "4WS:freetype-utils-0:2.1.9-21.el4.ia64", "4WS:freetype-utils-0:2.1.9-21.el4.ppc", "4WS:freetype-utils-0:2.1.9-21.el4.s390", "4WS:freetype-utils-0:2.1.9-21.el4.s390x", "4WS:freetype-utils-0:2.1.9-21.el4.x86_64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3439" }, { "category": "external", "summary": "RHBZ#753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3439", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439" } ], "release_date": "2011-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-11-16T22:55:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS:freetype-0:2.1.9-21.el4.i386", "4AS:freetype-0:2.1.9-21.el4.ia64", "4AS:freetype-0:2.1.9-21.el4.ppc", "4AS:freetype-0:2.1.9-21.el4.ppc64", "4AS:freetype-0:2.1.9-21.el4.s390", "4AS:freetype-0:2.1.9-21.el4.s390x", "4AS:freetype-0:2.1.9-21.el4.src", "4AS:freetype-0:2.1.9-21.el4.x86_64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4AS:freetype-demos-0:2.1.9-21.el4.i386", "4AS:freetype-demos-0:2.1.9-21.el4.ia64", "4AS:freetype-demos-0:2.1.9-21.el4.ppc", "4AS:freetype-demos-0:2.1.9-21.el4.s390", "4AS:freetype-demos-0:2.1.9-21.el4.s390x", "4AS:freetype-demos-0:2.1.9-21.el4.x86_64", "4AS:freetype-devel-0:2.1.9-21.el4.i386", "4AS:freetype-devel-0:2.1.9-21.el4.ia64", "4AS:freetype-devel-0:2.1.9-21.el4.ppc", "4AS:freetype-devel-0:2.1.9-21.el4.s390", "4AS:freetype-devel-0:2.1.9-21.el4.s390x", "4AS:freetype-devel-0:2.1.9-21.el4.x86_64", "4AS:freetype-utils-0:2.1.9-21.el4.i386", "4AS:freetype-utils-0:2.1.9-21.el4.ia64", "4AS:freetype-utils-0:2.1.9-21.el4.ppc", "4AS:freetype-utils-0:2.1.9-21.el4.s390", "4AS:freetype-utils-0:2.1.9-21.el4.s390x", "4AS:freetype-utils-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-0:2.1.9-21.el4.i386", "4Desktop:freetype-0:2.1.9-21.el4.ia64", "4Desktop:freetype-0:2.1.9-21.el4.ppc", "4Desktop:freetype-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-0:2.1.9-21.el4.s390", "4Desktop:freetype-0:2.1.9-21.el4.s390x", "4Desktop:freetype-0:2.1.9-21.el4.src", "4Desktop:freetype-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-demos-0:2.1.9-21.el4.i386", "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64", "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x", "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-devel-0:2.1.9-21.el4.i386", "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64", "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x", "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-utils-0:2.1.9-21.el4.i386", "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64", "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x", "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64", "4ES:freetype-0:2.1.9-21.el4.i386", "4ES:freetype-0:2.1.9-21.el4.ia64", "4ES:freetype-0:2.1.9-21.el4.ppc", "4ES:freetype-0:2.1.9-21.el4.ppc64", "4ES:freetype-0:2.1.9-21.el4.s390", "4ES:freetype-0:2.1.9-21.el4.s390x", "4ES:freetype-0:2.1.9-21.el4.src", "4ES:freetype-0:2.1.9-21.el4.x86_64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4ES:freetype-demos-0:2.1.9-21.el4.i386", "4ES:freetype-demos-0:2.1.9-21.el4.ia64", "4ES:freetype-demos-0:2.1.9-21.el4.ppc", "4ES:freetype-demos-0:2.1.9-21.el4.s390", "4ES:freetype-demos-0:2.1.9-21.el4.s390x", "4ES:freetype-demos-0:2.1.9-21.el4.x86_64", "4ES:freetype-devel-0:2.1.9-21.el4.i386", "4ES:freetype-devel-0:2.1.9-21.el4.ia64", "4ES:freetype-devel-0:2.1.9-21.el4.ppc", "4ES:freetype-devel-0:2.1.9-21.el4.s390", "4ES:freetype-devel-0:2.1.9-21.el4.s390x", "4ES:freetype-devel-0:2.1.9-21.el4.x86_64", "4ES:freetype-utils-0:2.1.9-21.el4.i386", "4ES:freetype-utils-0:2.1.9-21.el4.ia64", "4ES:freetype-utils-0:2.1.9-21.el4.ppc", "4ES:freetype-utils-0:2.1.9-21.el4.s390", "4ES:freetype-utils-0:2.1.9-21.el4.s390x", "4ES:freetype-utils-0:2.1.9-21.el4.x86_64", "4WS:freetype-0:2.1.9-21.el4.i386", "4WS:freetype-0:2.1.9-21.el4.ia64", "4WS:freetype-0:2.1.9-21.el4.ppc", "4WS:freetype-0:2.1.9-21.el4.ppc64", "4WS:freetype-0:2.1.9-21.el4.s390", "4WS:freetype-0:2.1.9-21.el4.s390x", "4WS:freetype-0:2.1.9-21.el4.src", "4WS:freetype-0:2.1.9-21.el4.x86_64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4WS:freetype-demos-0:2.1.9-21.el4.i386", "4WS:freetype-demos-0:2.1.9-21.el4.ia64", "4WS:freetype-demos-0:2.1.9-21.el4.ppc", "4WS:freetype-demos-0:2.1.9-21.el4.s390", "4WS:freetype-demos-0:2.1.9-21.el4.s390x", "4WS:freetype-demos-0:2.1.9-21.el4.x86_64", "4WS:freetype-devel-0:2.1.9-21.el4.i386", "4WS:freetype-devel-0:2.1.9-21.el4.ia64", "4WS:freetype-devel-0:2.1.9-21.el4.ppc", "4WS:freetype-devel-0:2.1.9-21.el4.s390", "4WS:freetype-devel-0:2.1.9-21.el4.s390x", "4WS:freetype-devel-0:2.1.9-21.el4.x86_64", "4WS:freetype-utils-0:2.1.9-21.el4.i386", "4WS:freetype-utils-0:2.1.9-21.el4.ia64", "4WS:freetype-utils-0:2.1.9-21.el4.ppc", "4WS:freetype-utils-0:2.1.9-21.el4.s390", "4WS:freetype-utils-0:2.1.9-21.el4.s390x", "4WS:freetype-utils-0:2.1.9-21.el4.x86_64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:freetype-0:2.1.9-21.el4.i386", "4AS:freetype-0:2.1.9-21.el4.ia64", "4AS:freetype-0:2.1.9-21.el4.ppc", "4AS:freetype-0:2.1.9-21.el4.ppc64", "4AS:freetype-0:2.1.9-21.el4.s390", "4AS:freetype-0:2.1.9-21.el4.s390x", "4AS:freetype-0:2.1.9-21.el4.src", "4AS:freetype-0:2.1.9-21.el4.x86_64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4AS:freetype-demos-0:2.1.9-21.el4.i386", "4AS:freetype-demos-0:2.1.9-21.el4.ia64", "4AS:freetype-demos-0:2.1.9-21.el4.ppc", "4AS:freetype-demos-0:2.1.9-21.el4.s390", "4AS:freetype-demos-0:2.1.9-21.el4.s390x", "4AS:freetype-demos-0:2.1.9-21.el4.x86_64", "4AS:freetype-devel-0:2.1.9-21.el4.i386", "4AS:freetype-devel-0:2.1.9-21.el4.ia64", "4AS:freetype-devel-0:2.1.9-21.el4.ppc", "4AS:freetype-devel-0:2.1.9-21.el4.s390", "4AS:freetype-devel-0:2.1.9-21.el4.s390x", "4AS:freetype-devel-0:2.1.9-21.el4.x86_64", "4AS:freetype-utils-0:2.1.9-21.el4.i386", "4AS:freetype-utils-0:2.1.9-21.el4.ia64", "4AS:freetype-utils-0:2.1.9-21.el4.ppc", "4AS:freetype-utils-0:2.1.9-21.el4.s390", "4AS:freetype-utils-0:2.1.9-21.el4.s390x", "4AS:freetype-utils-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-0:2.1.9-21.el4.i386", "4Desktop:freetype-0:2.1.9-21.el4.ia64", "4Desktop:freetype-0:2.1.9-21.el4.ppc", "4Desktop:freetype-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-0:2.1.9-21.el4.s390", "4Desktop:freetype-0:2.1.9-21.el4.s390x", "4Desktop:freetype-0:2.1.9-21.el4.src", "4Desktop:freetype-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-demos-0:2.1.9-21.el4.i386", "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64", "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x", "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-devel-0:2.1.9-21.el4.i386", "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64", "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x", "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-utils-0:2.1.9-21.el4.i386", "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64", "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x", "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64", "4ES:freetype-0:2.1.9-21.el4.i386", "4ES:freetype-0:2.1.9-21.el4.ia64", "4ES:freetype-0:2.1.9-21.el4.ppc", "4ES:freetype-0:2.1.9-21.el4.ppc64", "4ES:freetype-0:2.1.9-21.el4.s390", "4ES:freetype-0:2.1.9-21.el4.s390x", "4ES:freetype-0:2.1.9-21.el4.src", "4ES:freetype-0:2.1.9-21.el4.x86_64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4ES:freetype-demos-0:2.1.9-21.el4.i386", "4ES:freetype-demos-0:2.1.9-21.el4.ia64", "4ES:freetype-demos-0:2.1.9-21.el4.ppc", "4ES:freetype-demos-0:2.1.9-21.el4.s390", "4ES:freetype-demos-0:2.1.9-21.el4.s390x", "4ES:freetype-demos-0:2.1.9-21.el4.x86_64", "4ES:freetype-devel-0:2.1.9-21.el4.i386", "4ES:freetype-devel-0:2.1.9-21.el4.ia64", "4ES:freetype-devel-0:2.1.9-21.el4.ppc", "4ES:freetype-devel-0:2.1.9-21.el4.s390", "4ES:freetype-devel-0:2.1.9-21.el4.s390x", "4ES:freetype-devel-0:2.1.9-21.el4.x86_64", "4ES:freetype-utils-0:2.1.9-21.el4.i386", "4ES:freetype-utils-0:2.1.9-21.el4.ia64", "4ES:freetype-utils-0:2.1.9-21.el4.ppc", "4ES:freetype-utils-0:2.1.9-21.el4.s390", "4ES:freetype-utils-0:2.1.9-21.el4.s390x", "4ES:freetype-utils-0:2.1.9-21.el4.x86_64", "4WS:freetype-0:2.1.9-21.el4.i386", "4WS:freetype-0:2.1.9-21.el4.ia64", "4WS:freetype-0:2.1.9-21.el4.ppc", "4WS:freetype-0:2.1.9-21.el4.ppc64", "4WS:freetype-0:2.1.9-21.el4.s390", "4WS:freetype-0:2.1.9-21.el4.s390x", "4WS:freetype-0:2.1.9-21.el4.src", "4WS:freetype-0:2.1.9-21.el4.x86_64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4WS:freetype-demos-0:2.1.9-21.el4.i386", "4WS:freetype-demos-0:2.1.9-21.el4.ia64", "4WS:freetype-demos-0:2.1.9-21.el4.ppc", "4WS:freetype-demos-0:2.1.9-21.el4.s390", "4WS:freetype-demos-0:2.1.9-21.el4.s390x", "4WS:freetype-demos-0:2.1.9-21.el4.x86_64", "4WS:freetype-devel-0:2.1.9-21.el4.i386", "4WS:freetype-devel-0:2.1.9-21.el4.ia64", "4WS:freetype-devel-0:2.1.9-21.el4.ppc", "4WS:freetype-devel-0:2.1.9-21.el4.s390", "4WS:freetype-devel-0:2.1.9-21.el4.s390x", "4WS:freetype-devel-0:2.1.9-21.el4.x86_64", "4WS:freetype-utils-0:2.1.9-21.el4.i386", "4WS:freetype-utils-0:2.1.9-21.el4.ia64", "4WS:freetype-utils-0:2.1.9-21.el4.ppc", "4WS:freetype-utils-0:2.1.9-21.el4.s390", "4WS:freetype-utils-0:2.1.9-21.el4.s390x", "4WS:freetype-utils-0:2.1.9-21.el4.x86_64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts" } ] }
RHSA-2011:1455
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. The freetype packages for Red Hat Enterprise Linux 4 provide\nboth the FreeType 1 and FreeType 2 font engines. The freetype packages for\nRed Hat Enterprise Linux 5 and 6 provide only the FreeType 2 font engine.\n\nMultiple input validation flaws were found in the way FreeType processed\nCID-keyed fonts. If a specially-crafted font file was loaded by an\napplication linked against FreeType, it could cause the application to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-3439)\n\nNote: These issues only affected the FreeType 2 font engine.\n\nUsers are advised to upgrade to these updated packages, which contain a\nbackported patch to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1455", "url": "https://access.redhat.com/errata/RHSA-2011:1455" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1455.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2025-09-10T13:51:49+00:00", "generator": { "date": "2025-09-10T13:51:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2011:1455", "initial_release_date": "2011-11-16T22:55:00+00:00", "revision_history": [ { "date": "2011-11-16T22:55:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-11-16T23:01:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:51:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "RHEL Desktop Workstation (v. 5 client)", "product": { "name": "RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-utils-0:2.1.9-21.el4.ia64", "product_id": "freetype-utils-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-demos-0:2.1.9-21.el4.ia64", "product_id": "freetype-demos-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-devel-0:2.1.9-21.el4.ia64", "product_id": "freetype-devel-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-0:2.1.9-21.el4.ia64", "product_id": "freetype-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.i386", "product": { "name": "freetype-0:2.1.9-21.el4.i386", "product_id": "freetype-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.i386", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.i386", "product": { "name": "freetype-utils-0:2.1.9-21.el4.i386", "product_id": "freetype-utils-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.i386", "product": { "name": "freetype-demos-0:2.1.9-21.el4.i386", "product_id": "freetype-demos-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.i386", "product": { "name": "freetype-devel-0:2.1.9-21.el4.i386", "product_id": "freetype-devel-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64", "product_id": "freetype-utils-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64", "product_id": "freetype-demos-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64", "product_id": "freetype-devel-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-0:2.1.9-21.el4.x86_64", "product_id": "freetype-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.src", "product": { "name": "freetype-0:2.1.9-21.el4.src", "product_id": "freetype-0:2.1.9-21.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.src", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.src", "product_id": "freetype-0:2.2.1-28.el5_7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.src", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.src", "product_id": "freetype-0:2.3.11-6.el6_1.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-utils-0:2.1.9-21.el4.ppc", "product_id": "freetype-utils-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-demos-0:2.1.9-21.el4.ppc", "product_id": "freetype-demos-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-devel-0:2.1.9-21.el4.ppc", "product_id": "freetype-devel-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-0:2.1.9-21.el4.ppc", "product_id": "freetype-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.ppc", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc", "product_id": "freetype-0:2.3.11-6.el6_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.ppc64", "product": { "name": "freetype-0:2.1.9-21.el4.ppc64", "product_id": "freetype-0:2.1.9-21.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.ppc64", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64", "product_id": "freetype-0:2.2.1-28.el5_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-utils-0:2.1.9-21.el4.s390x", "product_id": "freetype-utils-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-demos-0:2.1.9-21.el4.s390x", "product_id": "freetype-demos-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-devel-0:2.1.9-21.el4.s390x", "product_id": "freetype-devel-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-0:2.1.9-21.el4.s390x", "product_id": "freetype-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.s390", "product": { "name": "freetype-0:2.1.9-21.el4.s390", "product_id": "freetype-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.s390", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.s390", "product": { "name": "freetype-utils-0:2.1.9-21.el4.s390", "product_id": "freetype-utils-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.s390", "product": { "name": "freetype-demos-0:2.1.9-21.el4.s390", "product_id": "freetype-demos-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.s390", "product": { "name": "freetype-devel-0:2.1.9-21.el4.s390", "product_id": "freetype-devel-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.s390", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.s390", "product_id": "freetype-0:2.2.1-28.el5_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.s390", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.s390", "product_id": "freetype-0:2.3.11-6.el6_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=i686" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=i686" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=i686" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.src", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.src as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.src", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.src", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.src", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3439", "discovery_date": "2011-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "753799" } ], "notes": [ { "category": "description", "text": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:freetype-0:2.1.9-21.el4.i386", "4AS:freetype-0:2.1.9-21.el4.ia64", "4AS:freetype-0:2.1.9-21.el4.ppc", "4AS:freetype-0:2.1.9-21.el4.ppc64", "4AS:freetype-0:2.1.9-21.el4.s390", "4AS:freetype-0:2.1.9-21.el4.s390x", "4AS:freetype-0:2.1.9-21.el4.src", "4AS:freetype-0:2.1.9-21.el4.x86_64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4AS:freetype-demos-0:2.1.9-21.el4.i386", "4AS:freetype-demos-0:2.1.9-21.el4.ia64", "4AS:freetype-demos-0:2.1.9-21.el4.ppc", "4AS:freetype-demos-0:2.1.9-21.el4.s390", "4AS:freetype-demos-0:2.1.9-21.el4.s390x", "4AS:freetype-demos-0:2.1.9-21.el4.x86_64", "4AS:freetype-devel-0:2.1.9-21.el4.i386", "4AS:freetype-devel-0:2.1.9-21.el4.ia64", "4AS:freetype-devel-0:2.1.9-21.el4.ppc", "4AS:freetype-devel-0:2.1.9-21.el4.s390", "4AS:freetype-devel-0:2.1.9-21.el4.s390x", "4AS:freetype-devel-0:2.1.9-21.el4.x86_64", "4AS:freetype-utils-0:2.1.9-21.el4.i386", "4AS:freetype-utils-0:2.1.9-21.el4.ia64", "4AS:freetype-utils-0:2.1.9-21.el4.ppc", "4AS:freetype-utils-0:2.1.9-21.el4.s390", "4AS:freetype-utils-0:2.1.9-21.el4.s390x", "4AS:freetype-utils-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-0:2.1.9-21.el4.i386", "4Desktop:freetype-0:2.1.9-21.el4.ia64", "4Desktop:freetype-0:2.1.9-21.el4.ppc", "4Desktop:freetype-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-0:2.1.9-21.el4.s390", "4Desktop:freetype-0:2.1.9-21.el4.s390x", "4Desktop:freetype-0:2.1.9-21.el4.src", "4Desktop:freetype-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-demos-0:2.1.9-21.el4.i386", "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64", "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x", "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-devel-0:2.1.9-21.el4.i386", "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64", "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x", "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-utils-0:2.1.9-21.el4.i386", "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64", "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x", "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64", "4ES:freetype-0:2.1.9-21.el4.i386", "4ES:freetype-0:2.1.9-21.el4.ia64", "4ES:freetype-0:2.1.9-21.el4.ppc", "4ES:freetype-0:2.1.9-21.el4.ppc64", "4ES:freetype-0:2.1.9-21.el4.s390", "4ES:freetype-0:2.1.9-21.el4.s390x", "4ES:freetype-0:2.1.9-21.el4.src", "4ES:freetype-0:2.1.9-21.el4.x86_64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4ES:freetype-demos-0:2.1.9-21.el4.i386", "4ES:freetype-demos-0:2.1.9-21.el4.ia64", "4ES:freetype-demos-0:2.1.9-21.el4.ppc", "4ES:freetype-demos-0:2.1.9-21.el4.s390", "4ES:freetype-demos-0:2.1.9-21.el4.s390x", "4ES:freetype-demos-0:2.1.9-21.el4.x86_64", "4ES:freetype-devel-0:2.1.9-21.el4.i386", "4ES:freetype-devel-0:2.1.9-21.el4.ia64", "4ES:freetype-devel-0:2.1.9-21.el4.ppc", "4ES:freetype-devel-0:2.1.9-21.el4.s390", "4ES:freetype-devel-0:2.1.9-21.el4.s390x", "4ES:freetype-devel-0:2.1.9-21.el4.x86_64", "4ES:freetype-utils-0:2.1.9-21.el4.i386", "4ES:freetype-utils-0:2.1.9-21.el4.ia64", "4ES:freetype-utils-0:2.1.9-21.el4.ppc", "4ES:freetype-utils-0:2.1.9-21.el4.s390", "4ES:freetype-utils-0:2.1.9-21.el4.s390x", "4ES:freetype-utils-0:2.1.9-21.el4.x86_64", "4WS:freetype-0:2.1.9-21.el4.i386", "4WS:freetype-0:2.1.9-21.el4.ia64", "4WS:freetype-0:2.1.9-21.el4.ppc", "4WS:freetype-0:2.1.9-21.el4.ppc64", "4WS:freetype-0:2.1.9-21.el4.s390", "4WS:freetype-0:2.1.9-21.el4.s390x", "4WS:freetype-0:2.1.9-21.el4.src", "4WS:freetype-0:2.1.9-21.el4.x86_64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4WS:freetype-demos-0:2.1.9-21.el4.i386", "4WS:freetype-demos-0:2.1.9-21.el4.ia64", "4WS:freetype-demos-0:2.1.9-21.el4.ppc", "4WS:freetype-demos-0:2.1.9-21.el4.s390", "4WS:freetype-demos-0:2.1.9-21.el4.s390x", "4WS:freetype-demos-0:2.1.9-21.el4.x86_64", "4WS:freetype-devel-0:2.1.9-21.el4.i386", "4WS:freetype-devel-0:2.1.9-21.el4.ia64", "4WS:freetype-devel-0:2.1.9-21.el4.ppc", "4WS:freetype-devel-0:2.1.9-21.el4.s390", "4WS:freetype-devel-0:2.1.9-21.el4.s390x", "4WS:freetype-devel-0:2.1.9-21.el4.x86_64", "4WS:freetype-utils-0:2.1.9-21.el4.i386", "4WS:freetype-utils-0:2.1.9-21.el4.ia64", "4WS:freetype-utils-0:2.1.9-21.el4.ppc", "4WS:freetype-utils-0:2.1.9-21.el4.s390", "4WS:freetype-utils-0:2.1.9-21.el4.s390x", "4WS:freetype-utils-0:2.1.9-21.el4.x86_64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3439" }, { "category": "external", "summary": "RHBZ#753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3439", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439" } ], "release_date": "2011-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-11-16T22:55:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS:freetype-0:2.1.9-21.el4.i386", "4AS:freetype-0:2.1.9-21.el4.ia64", "4AS:freetype-0:2.1.9-21.el4.ppc", "4AS:freetype-0:2.1.9-21.el4.ppc64", "4AS:freetype-0:2.1.9-21.el4.s390", "4AS:freetype-0:2.1.9-21.el4.s390x", "4AS:freetype-0:2.1.9-21.el4.src", "4AS:freetype-0:2.1.9-21.el4.x86_64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4AS:freetype-demos-0:2.1.9-21.el4.i386", "4AS:freetype-demos-0:2.1.9-21.el4.ia64", "4AS:freetype-demos-0:2.1.9-21.el4.ppc", "4AS:freetype-demos-0:2.1.9-21.el4.s390", "4AS:freetype-demos-0:2.1.9-21.el4.s390x", "4AS:freetype-demos-0:2.1.9-21.el4.x86_64", "4AS:freetype-devel-0:2.1.9-21.el4.i386", "4AS:freetype-devel-0:2.1.9-21.el4.ia64", "4AS:freetype-devel-0:2.1.9-21.el4.ppc", "4AS:freetype-devel-0:2.1.9-21.el4.s390", "4AS:freetype-devel-0:2.1.9-21.el4.s390x", "4AS:freetype-devel-0:2.1.9-21.el4.x86_64", "4AS:freetype-utils-0:2.1.9-21.el4.i386", "4AS:freetype-utils-0:2.1.9-21.el4.ia64", "4AS:freetype-utils-0:2.1.9-21.el4.ppc", "4AS:freetype-utils-0:2.1.9-21.el4.s390", "4AS:freetype-utils-0:2.1.9-21.el4.s390x", "4AS:freetype-utils-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-0:2.1.9-21.el4.i386", "4Desktop:freetype-0:2.1.9-21.el4.ia64", "4Desktop:freetype-0:2.1.9-21.el4.ppc", "4Desktop:freetype-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-0:2.1.9-21.el4.s390", "4Desktop:freetype-0:2.1.9-21.el4.s390x", "4Desktop:freetype-0:2.1.9-21.el4.src", "4Desktop:freetype-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-demos-0:2.1.9-21.el4.i386", "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64", "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x", "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-devel-0:2.1.9-21.el4.i386", "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64", "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x", "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-utils-0:2.1.9-21.el4.i386", "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64", "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x", "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64", "4ES:freetype-0:2.1.9-21.el4.i386", "4ES:freetype-0:2.1.9-21.el4.ia64", "4ES:freetype-0:2.1.9-21.el4.ppc", "4ES:freetype-0:2.1.9-21.el4.ppc64", "4ES:freetype-0:2.1.9-21.el4.s390", "4ES:freetype-0:2.1.9-21.el4.s390x", "4ES:freetype-0:2.1.9-21.el4.src", "4ES:freetype-0:2.1.9-21.el4.x86_64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4ES:freetype-demos-0:2.1.9-21.el4.i386", "4ES:freetype-demos-0:2.1.9-21.el4.ia64", "4ES:freetype-demos-0:2.1.9-21.el4.ppc", "4ES:freetype-demos-0:2.1.9-21.el4.s390", "4ES:freetype-demos-0:2.1.9-21.el4.s390x", "4ES:freetype-demos-0:2.1.9-21.el4.x86_64", "4ES:freetype-devel-0:2.1.9-21.el4.i386", "4ES:freetype-devel-0:2.1.9-21.el4.ia64", "4ES:freetype-devel-0:2.1.9-21.el4.ppc", "4ES:freetype-devel-0:2.1.9-21.el4.s390", "4ES:freetype-devel-0:2.1.9-21.el4.s390x", "4ES:freetype-devel-0:2.1.9-21.el4.x86_64", "4ES:freetype-utils-0:2.1.9-21.el4.i386", "4ES:freetype-utils-0:2.1.9-21.el4.ia64", "4ES:freetype-utils-0:2.1.9-21.el4.ppc", "4ES:freetype-utils-0:2.1.9-21.el4.s390", "4ES:freetype-utils-0:2.1.9-21.el4.s390x", "4ES:freetype-utils-0:2.1.9-21.el4.x86_64", "4WS:freetype-0:2.1.9-21.el4.i386", "4WS:freetype-0:2.1.9-21.el4.ia64", "4WS:freetype-0:2.1.9-21.el4.ppc", "4WS:freetype-0:2.1.9-21.el4.ppc64", "4WS:freetype-0:2.1.9-21.el4.s390", "4WS:freetype-0:2.1.9-21.el4.s390x", "4WS:freetype-0:2.1.9-21.el4.src", "4WS:freetype-0:2.1.9-21.el4.x86_64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4WS:freetype-demos-0:2.1.9-21.el4.i386", "4WS:freetype-demos-0:2.1.9-21.el4.ia64", "4WS:freetype-demos-0:2.1.9-21.el4.ppc", "4WS:freetype-demos-0:2.1.9-21.el4.s390", "4WS:freetype-demos-0:2.1.9-21.el4.s390x", "4WS:freetype-demos-0:2.1.9-21.el4.x86_64", "4WS:freetype-devel-0:2.1.9-21.el4.i386", "4WS:freetype-devel-0:2.1.9-21.el4.ia64", "4WS:freetype-devel-0:2.1.9-21.el4.ppc", "4WS:freetype-devel-0:2.1.9-21.el4.s390", "4WS:freetype-devel-0:2.1.9-21.el4.s390x", "4WS:freetype-devel-0:2.1.9-21.el4.x86_64", "4WS:freetype-utils-0:2.1.9-21.el4.i386", "4WS:freetype-utils-0:2.1.9-21.el4.ia64", "4WS:freetype-utils-0:2.1.9-21.el4.ppc", "4WS:freetype-utils-0:2.1.9-21.el4.s390", "4WS:freetype-utils-0:2.1.9-21.el4.s390x", "4WS:freetype-utils-0:2.1.9-21.el4.x86_64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:freetype-0:2.1.9-21.el4.i386", "4AS:freetype-0:2.1.9-21.el4.ia64", "4AS:freetype-0:2.1.9-21.el4.ppc", "4AS:freetype-0:2.1.9-21.el4.ppc64", "4AS:freetype-0:2.1.9-21.el4.s390", "4AS:freetype-0:2.1.9-21.el4.s390x", "4AS:freetype-0:2.1.9-21.el4.src", "4AS:freetype-0:2.1.9-21.el4.x86_64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4AS:freetype-demos-0:2.1.9-21.el4.i386", "4AS:freetype-demos-0:2.1.9-21.el4.ia64", "4AS:freetype-demos-0:2.1.9-21.el4.ppc", "4AS:freetype-demos-0:2.1.9-21.el4.s390", "4AS:freetype-demos-0:2.1.9-21.el4.s390x", "4AS:freetype-demos-0:2.1.9-21.el4.x86_64", "4AS:freetype-devel-0:2.1.9-21.el4.i386", "4AS:freetype-devel-0:2.1.9-21.el4.ia64", "4AS:freetype-devel-0:2.1.9-21.el4.ppc", "4AS:freetype-devel-0:2.1.9-21.el4.s390", "4AS:freetype-devel-0:2.1.9-21.el4.s390x", "4AS:freetype-devel-0:2.1.9-21.el4.x86_64", "4AS:freetype-utils-0:2.1.9-21.el4.i386", "4AS:freetype-utils-0:2.1.9-21.el4.ia64", "4AS:freetype-utils-0:2.1.9-21.el4.ppc", "4AS:freetype-utils-0:2.1.9-21.el4.s390", "4AS:freetype-utils-0:2.1.9-21.el4.s390x", "4AS:freetype-utils-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-0:2.1.9-21.el4.i386", "4Desktop:freetype-0:2.1.9-21.el4.ia64", "4Desktop:freetype-0:2.1.9-21.el4.ppc", "4Desktop:freetype-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-0:2.1.9-21.el4.s390", "4Desktop:freetype-0:2.1.9-21.el4.s390x", "4Desktop:freetype-0:2.1.9-21.el4.src", "4Desktop:freetype-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-demos-0:2.1.9-21.el4.i386", "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64", "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x", "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-devel-0:2.1.9-21.el4.i386", "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64", "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x", "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-utils-0:2.1.9-21.el4.i386", "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64", "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x", "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64", "4ES:freetype-0:2.1.9-21.el4.i386", "4ES:freetype-0:2.1.9-21.el4.ia64", "4ES:freetype-0:2.1.9-21.el4.ppc", "4ES:freetype-0:2.1.9-21.el4.ppc64", "4ES:freetype-0:2.1.9-21.el4.s390", "4ES:freetype-0:2.1.9-21.el4.s390x", "4ES:freetype-0:2.1.9-21.el4.src", "4ES:freetype-0:2.1.9-21.el4.x86_64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4ES:freetype-demos-0:2.1.9-21.el4.i386", "4ES:freetype-demos-0:2.1.9-21.el4.ia64", "4ES:freetype-demos-0:2.1.9-21.el4.ppc", "4ES:freetype-demos-0:2.1.9-21.el4.s390", "4ES:freetype-demos-0:2.1.9-21.el4.s390x", "4ES:freetype-demos-0:2.1.9-21.el4.x86_64", "4ES:freetype-devel-0:2.1.9-21.el4.i386", "4ES:freetype-devel-0:2.1.9-21.el4.ia64", "4ES:freetype-devel-0:2.1.9-21.el4.ppc", "4ES:freetype-devel-0:2.1.9-21.el4.s390", "4ES:freetype-devel-0:2.1.9-21.el4.s390x", "4ES:freetype-devel-0:2.1.9-21.el4.x86_64", "4ES:freetype-utils-0:2.1.9-21.el4.i386", "4ES:freetype-utils-0:2.1.9-21.el4.ia64", "4ES:freetype-utils-0:2.1.9-21.el4.ppc", "4ES:freetype-utils-0:2.1.9-21.el4.s390", "4ES:freetype-utils-0:2.1.9-21.el4.s390x", "4ES:freetype-utils-0:2.1.9-21.el4.x86_64", "4WS:freetype-0:2.1.9-21.el4.i386", "4WS:freetype-0:2.1.9-21.el4.ia64", "4WS:freetype-0:2.1.9-21.el4.ppc", "4WS:freetype-0:2.1.9-21.el4.ppc64", "4WS:freetype-0:2.1.9-21.el4.s390", "4WS:freetype-0:2.1.9-21.el4.s390x", "4WS:freetype-0:2.1.9-21.el4.src", "4WS:freetype-0:2.1.9-21.el4.x86_64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4WS:freetype-demos-0:2.1.9-21.el4.i386", "4WS:freetype-demos-0:2.1.9-21.el4.ia64", "4WS:freetype-demos-0:2.1.9-21.el4.ppc", "4WS:freetype-demos-0:2.1.9-21.el4.s390", "4WS:freetype-demos-0:2.1.9-21.el4.s390x", "4WS:freetype-demos-0:2.1.9-21.el4.x86_64", "4WS:freetype-devel-0:2.1.9-21.el4.i386", "4WS:freetype-devel-0:2.1.9-21.el4.ia64", "4WS:freetype-devel-0:2.1.9-21.el4.ppc", "4WS:freetype-devel-0:2.1.9-21.el4.s390", "4WS:freetype-devel-0:2.1.9-21.el4.s390x", "4WS:freetype-devel-0:2.1.9-21.el4.x86_64", "4WS:freetype-utils-0:2.1.9-21.el4.i386", "4WS:freetype-utils-0:2.1.9-21.el4.ia64", "4WS:freetype-utils-0:2.1.9-21.el4.ppc", "4WS:freetype-utils-0:2.1.9-21.el4.s390", "4WS:freetype-utils-0:2.1.9-21.el4.s390x", "4WS:freetype-utils-0:2.1.9-21.el4.x86_64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts" } ] }
rhsa-2011_1455
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. The freetype packages for Red Hat Enterprise Linux 4 provide\nboth the FreeType 1 and FreeType 2 font engines. The freetype packages for\nRed Hat Enterprise Linux 5 and 6 provide only the FreeType 2 font engine.\n\nMultiple input validation flaws were found in the way FreeType processed\nCID-keyed fonts. If a specially-crafted font file was loaded by an\napplication linked against FreeType, it could cause the application to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-3439)\n\nNote: These issues only affected the FreeType 2 font engine.\n\nUsers are advised to upgrade to these updated packages, which contain a\nbackported patch to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1455", "url": "https://access.redhat.com/errata/RHSA-2011:1455" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1455.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2024-11-22T05:01:00+00:00", "generator": { "date": "2024-11-22T05:01:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1455", "initial_release_date": "2011-11-16T22:55:00+00:00", "revision_history": [ { "date": "2011-11-16T22:55:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-11-16T23:01:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:01:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "RHEL Desktop Workstation (v. 5 client)", "product": { "name": "RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-utils-0:2.1.9-21.el4.ia64", "product_id": "freetype-utils-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-demos-0:2.1.9-21.el4.ia64", "product_id": "freetype-demos-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-devel-0:2.1.9-21.el4.ia64", "product_id": "freetype-devel-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-0:2.1.9-21.el4.ia64", "product_id": "freetype-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.i386", "product": { "name": "freetype-0:2.1.9-21.el4.i386", "product_id": "freetype-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.i386", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.i386", "product": { "name": "freetype-utils-0:2.1.9-21.el4.i386", "product_id": "freetype-utils-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.i386", "product": { "name": "freetype-demos-0:2.1.9-21.el4.i386", "product_id": "freetype-demos-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.i386", "product": { "name": "freetype-devel-0:2.1.9-21.el4.i386", "product_id": "freetype-devel-0:2.1.9-21.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64", "product_id": "freetype-utils-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64", "product_id": "freetype-demos-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64", "product_id": "freetype-devel-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-0:2.1.9-21.el4.x86_64", "product_id": "freetype-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.x86_64", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.x86_64", "product_id": "freetype-0:2.3.11-6.el6_1.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.src", "product": { "name": "freetype-0:2.1.9-21.el4.src", "product_id": "freetype-0:2.1.9-21.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.src", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.src", "product_id": "freetype-0:2.2.1-28.el5_7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.src", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.src", "product_id": "freetype-0:2.3.11-6.el6_1.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-utils-0:2.1.9-21.el4.ppc", "product_id": "freetype-utils-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-demos-0:2.1.9-21.el4.ppc", "product_id": "freetype-demos-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-devel-0:2.1.9-21.el4.ppc", "product_id": "freetype-devel-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-0:2.1.9-21.el4.ppc", "product_id": "freetype-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.ppc", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc", "product_id": "freetype-0:2.3.11-6.el6_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.ppc64", "product": { "name": "freetype-0:2.1.9-21.el4.ppc64", "product_id": "freetype-0:2.1.9-21.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.ppc64", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64", "product_id": "freetype-0:2.2.1-28.el5_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.ppc64", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc64", "product_id": "freetype-0:2.3.11-6.el6_1.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-utils-0:2.1.9-21.el4.s390x", "product_id": "freetype-utils-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-demos-0:2.1.9-21.el4.s390x", "product_id": "freetype-demos-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-devel-0:2.1.9-21.el4.s390x", "product_id": "freetype-devel-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-0:2.1.9-21.el4.s390x", "product_id": "freetype-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "product": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "product_id": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_7.2?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.s390x", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.s390x", "product_id": "freetype-0:2.3.11-6.el6_1.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.9-21.el4.s390", "product": { "name": "freetype-0:2.1.9-21.el4.s390", "product_id": "freetype-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-21.el4.s390", "product": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390", "product_id": "freetype-debuginfo-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-21.el4.s390", "product": { "name": "freetype-utils-0:2.1.9-21.el4.s390", "product_id": "freetype-utils-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-21.el4.s390", "product": { "name": "freetype-demos-0:2.1.9-21.el4.s390", "product_id": "freetype-demos-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-21.el4.s390", "product": { "name": "freetype-devel-0:2.1.9-21.el4.s390", "product_id": "freetype-devel-0:2.1.9-21.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-21.el4?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_7.2?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_7.2.s390", "product": { "name": "freetype-0:2.2.1-28.el5_7.2.s390", "product_id": "freetype-0:2.2.1-28.el5_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_7.2?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "product": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "product_id": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_7.2?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.s390", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.s390", "product_id": "freetype-0:2.3.11-6.el6_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.3.11-6.el6_1.8?arch=i686" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.3.11-6.el6_1.8?arch=i686" } } }, { "category": "product_version", "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.3.11-6.el6_1.8?arch=i686" } } }, { "category": "product_version", "name": "freetype-0:2.3.11-6.el6_1.8.i686", "product": { "name": "freetype-0:2.3.11-6.el6_1.8.i686", "product_id": "freetype-0:2.3.11-6.el6_1.8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.3.11-6.el6_1.8?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.src" }, "product_reference": "freetype-0:2.1.9-21.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.i386" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.ia64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.ppc" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.s390" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.s390x" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-21.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-21.el4.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-21.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.src", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.src as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.src", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.src", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.src", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" }, "product_reference": "freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3439", "discovery_date": "2011-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "753799" } ], "notes": [ { "category": "description", "text": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:freetype-0:2.1.9-21.el4.i386", "4AS:freetype-0:2.1.9-21.el4.ia64", "4AS:freetype-0:2.1.9-21.el4.ppc", "4AS:freetype-0:2.1.9-21.el4.ppc64", "4AS:freetype-0:2.1.9-21.el4.s390", "4AS:freetype-0:2.1.9-21.el4.s390x", "4AS:freetype-0:2.1.9-21.el4.src", "4AS:freetype-0:2.1.9-21.el4.x86_64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4AS:freetype-demos-0:2.1.9-21.el4.i386", "4AS:freetype-demos-0:2.1.9-21.el4.ia64", "4AS:freetype-demos-0:2.1.9-21.el4.ppc", "4AS:freetype-demos-0:2.1.9-21.el4.s390", "4AS:freetype-demos-0:2.1.9-21.el4.s390x", "4AS:freetype-demos-0:2.1.9-21.el4.x86_64", "4AS:freetype-devel-0:2.1.9-21.el4.i386", "4AS:freetype-devel-0:2.1.9-21.el4.ia64", "4AS:freetype-devel-0:2.1.9-21.el4.ppc", "4AS:freetype-devel-0:2.1.9-21.el4.s390", "4AS:freetype-devel-0:2.1.9-21.el4.s390x", "4AS:freetype-devel-0:2.1.9-21.el4.x86_64", "4AS:freetype-utils-0:2.1.9-21.el4.i386", "4AS:freetype-utils-0:2.1.9-21.el4.ia64", "4AS:freetype-utils-0:2.1.9-21.el4.ppc", "4AS:freetype-utils-0:2.1.9-21.el4.s390", "4AS:freetype-utils-0:2.1.9-21.el4.s390x", "4AS:freetype-utils-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-0:2.1.9-21.el4.i386", "4Desktop:freetype-0:2.1.9-21.el4.ia64", "4Desktop:freetype-0:2.1.9-21.el4.ppc", "4Desktop:freetype-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-0:2.1.9-21.el4.s390", "4Desktop:freetype-0:2.1.9-21.el4.s390x", "4Desktop:freetype-0:2.1.9-21.el4.src", "4Desktop:freetype-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-demos-0:2.1.9-21.el4.i386", "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64", "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x", "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-devel-0:2.1.9-21.el4.i386", "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64", "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x", "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-utils-0:2.1.9-21.el4.i386", "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64", "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x", "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64", "4ES:freetype-0:2.1.9-21.el4.i386", "4ES:freetype-0:2.1.9-21.el4.ia64", "4ES:freetype-0:2.1.9-21.el4.ppc", "4ES:freetype-0:2.1.9-21.el4.ppc64", "4ES:freetype-0:2.1.9-21.el4.s390", "4ES:freetype-0:2.1.9-21.el4.s390x", "4ES:freetype-0:2.1.9-21.el4.src", "4ES:freetype-0:2.1.9-21.el4.x86_64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4ES:freetype-demos-0:2.1.9-21.el4.i386", "4ES:freetype-demos-0:2.1.9-21.el4.ia64", "4ES:freetype-demos-0:2.1.9-21.el4.ppc", "4ES:freetype-demos-0:2.1.9-21.el4.s390", "4ES:freetype-demos-0:2.1.9-21.el4.s390x", "4ES:freetype-demos-0:2.1.9-21.el4.x86_64", "4ES:freetype-devel-0:2.1.9-21.el4.i386", "4ES:freetype-devel-0:2.1.9-21.el4.ia64", "4ES:freetype-devel-0:2.1.9-21.el4.ppc", "4ES:freetype-devel-0:2.1.9-21.el4.s390", "4ES:freetype-devel-0:2.1.9-21.el4.s390x", "4ES:freetype-devel-0:2.1.9-21.el4.x86_64", "4ES:freetype-utils-0:2.1.9-21.el4.i386", "4ES:freetype-utils-0:2.1.9-21.el4.ia64", "4ES:freetype-utils-0:2.1.9-21.el4.ppc", "4ES:freetype-utils-0:2.1.9-21.el4.s390", "4ES:freetype-utils-0:2.1.9-21.el4.s390x", "4ES:freetype-utils-0:2.1.9-21.el4.x86_64", "4WS:freetype-0:2.1.9-21.el4.i386", "4WS:freetype-0:2.1.9-21.el4.ia64", "4WS:freetype-0:2.1.9-21.el4.ppc", "4WS:freetype-0:2.1.9-21.el4.ppc64", "4WS:freetype-0:2.1.9-21.el4.s390", "4WS:freetype-0:2.1.9-21.el4.s390x", "4WS:freetype-0:2.1.9-21.el4.src", "4WS:freetype-0:2.1.9-21.el4.x86_64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4WS:freetype-demos-0:2.1.9-21.el4.i386", "4WS:freetype-demos-0:2.1.9-21.el4.ia64", "4WS:freetype-demos-0:2.1.9-21.el4.ppc", "4WS:freetype-demos-0:2.1.9-21.el4.s390", "4WS:freetype-demos-0:2.1.9-21.el4.s390x", "4WS:freetype-demos-0:2.1.9-21.el4.x86_64", "4WS:freetype-devel-0:2.1.9-21.el4.i386", "4WS:freetype-devel-0:2.1.9-21.el4.ia64", "4WS:freetype-devel-0:2.1.9-21.el4.ppc", "4WS:freetype-devel-0:2.1.9-21.el4.s390", "4WS:freetype-devel-0:2.1.9-21.el4.s390x", "4WS:freetype-devel-0:2.1.9-21.el4.x86_64", "4WS:freetype-utils-0:2.1.9-21.el4.i386", "4WS:freetype-utils-0:2.1.9-21.el4.ia64", "4WS:freetype-utils-0:2.1.9-21.el4.ppc", "4WS:freetype-utils-0:2.1.9-21.el4.s390", "4WS:freetype-utils-0:2.1.9-21.el4.s390x", "4WS:freetype-utils-0:2.1.9-21.el4.x86_64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3439" }, { "category": "external", "summary": "RHBZ#753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3439", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439" } ], "release_date": "2011-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-11-16T22:55:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS:freetype-0:2.1.9-21.el4.i386", "4AS:freetype-0:2.1.9-21.el4.ia64", "4AS:freetype-0:2.1.9-21.el4.ppc", "4AS:freetype-0:2.1.9-21.el4.ppc64", "4AS:freetype-0:2.1.9-21.el4.s390", "4AS:freetype-0:2.1.9-21.el4.s390x", "4AS:freetype-0:2.1.9-21.el4.src", "4AS:freetype-0:2.1.9-21.el4.x86_64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4AS:freetype-demos-0:2.1.9-21.el4.i386", "4AS:freetype-demos-0:2.1.9-21.el4.ia64", "4AS:freetype-demos-0:2.1.9-21.el4.ppc", "4AS:freetype-demos-0:2.1.9-21.el4.s390", "4AS:freetype-demos-0:2.1.9-21.el4.s390x", "4AS:freetype-demos-0:2.1.9-21.el4.x86_64", "4AS:freetype-devel-0:2.1.9-21.el4.i386", "4AS:freetype-devel-0:2.1.9-21.el4.ia64", "4AS:freetype-devel-0:2.1.9-21.el4.ppc", "4AS:freetype-devel-0:2.1.9-21.el4.s390", "4AS:freetype-devel-0:2.1.9-21.el4.s390x", "4AS:freetype-devel-0:2.1.9-21.el4.x86_64", "4AS:freetype-utils-0:2.1.9-21.el4.i386", "4AS:freetype-utils-0:2.1.9-21.el4.ia64", "4AS:freetype-utils-0:2.1.9-21.el4.ppc", "4AS:freetype-utils-0:2.1.9-21.el4.s390", "4AS:freetype-utils-0:2.1.9-21.el4.s390x", "4AS:freetype-utils-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-0:2.1.9-21.el4.i386", "4Desktop:freetype-0:2.1.9-21.el4.ia64", "4Desktop:freetype-0:2.1.9-21.el4.ppc", "4Desktop:freetype-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-0:2.1.9-21.el4.s390", "4Desktop:freetype-0:2.1.9-21.el4.s390x", "4Desktop:freetype-0:2.1.9-21.el4.src", "4Desktop:freetype-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-demos-0:2.1.9-21.el4.i386", "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64", "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x", "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-devel-0:2.1.9-21.el4.i386", "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64", "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x", "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-utils-0:2.1.9-21.el4.i386", "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64", "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x", "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64", "4ES:freetype-0:2.1.9-21.el4.i386", "4ES:freetype-0:2.1.9-21.el4.ia64", "4ES:freetype-0:2.1.9-21.el4.ppc", "4ES:freetype-0:2.1.9-21.el4.ppc64", "4ES:freetype-0:2.1.9-21.el4.s390", "4ES:freetype-0:2.1.9-21.el4.s390x", "4ES:freetype-0:2.1.9-21.el4.src", "4ES:freetype-0:2.1.9-21.el4.x86_64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4ES:freetype-demos-0:2.1.9-21.el4.i386", "4ES:freetype-demos-0:2.1.9-21.el4.ia64", "4ES:freetype-demos-0:2.1.9-21.el4.ppc", "4ES:freetype-demos-0:2.1.9-21.el4.s390", "4ES:freetype-demos-0:2.1.9-21.el4.s390x", "4ES:freetype-demos-0:2.1.9-21.el4.x86_64", "4ES:freetype-devel-0:2.1.9-21.el4.i386", "4ES:freetype-devel-0:2.1.9-21.el4.ia64", "4ES:freetype-devel-0:2.1.9-21.el4.ppc", "4ES:freetype-devel-0:2.1.9-21.el4.s390", "4ES:freetype-devel-0:2.1.9-21.el4.s390x", "4ES:freetype-devel-0:2.1.9-21.el4.x86_64", "4ES:freetype-utils-0:2.1.9-21.el4.i386", "4ES:freetype-utils-0:2.1.9-21.el4.ia64", "4ES:freetype-utils-0:2.1.9-21.el4.ppc", "4ES:freetype-utils-0:2.1.9-21.el4.s390", "4ES:freetype-utils-0:2.1.9-21.el4.s390x", "4ES:freetype-utils-0:2.1.9-21.el4.x86_64", "4WS:freetype-0:2.1.9-21.el4.i386", "4WS:freetype-0:2.1.9-21.el4.ia64", "4WS:freetype-0:2.1.9-21.el4.ppc", "4WS:freetype-0:2.1.9-21.el4.ppc64", "4WS:freetype-0:2.1.9-21.el4.s390", "4WS:freetype-0:2.1.9-21.el4.s390x", "4WS:freetype-0:2.1.9-21.el4.src", "4WS:freetype-0:2.1.9-21.el4.x86_64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4WS:freetype-demos-0:2.1.9-21.el4.i386", "4WS:freetype-demos-0:2.1.9-21.el4.ia64", "4WS:freetype-demos-0:2.1.9-21.el4.ppc", "4WS:freetype-demos-0:2.1.9-21.el4.s390", "4WS:freetype-demos-0:2.1.9-21.el4.s390x", "4WS:freetype-demos-0:2.1.9-21.el4.x86_64", "4WS:freetype-devel-0:2.1.9-21.el4.i386", "4WS:freetype-devel-0:2.1.9-21.el4.ia64", "4WS:freetype-devel-0:2.1.9-21.el4.ppc", "4WS:freetype-devel-0:2.1.9-21.el4.s390", "4WS:freetype-devel-0:2.1.9-21.el4.s390x", "4WS:freetype-devel-0:2.1.9-21.el4.x86_64", "4WS:freetype-utils-0:2.1.9-21.el4.i386", "4WS:freetype-utils-0:2.1.9-21.el4.ia64", "4WS:freetype-utils-0:2.1.9-21.el4.ppc", "4WS:freetype-utils-0:2.1.9-21.el4.s390", "4WS:freetype-utils-0:2.1.9-21.el4.s390x", "4WS:freetype-utils-0:2.1.9-21.el4.x86_64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:freetype-0:2.1.9-21.el4.i386", "4AS:freetype-0:2.1.9-21.el4.ia64", "4AS:freetype-0:2.1.9-21.el4.ppc", "4AS:freetype-0:2.1.9-21.el4.ppc64", "4AS:freetype-0:2.1.9-21.el4.s390", "4AS:freetype-0:2.1.9-21.el4.s390x", "4AS:freetype-0:2.1.9-21.el4.src", "4AS:freetype-0:2.1.9-21.el4.x86_64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4AS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4AS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4AS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4AS:freetype-demos-0:2.1.9-21.el4.i386", "4AS:freetype-demos-0:2.1.9-21.el4.ia64", "4AS:freetype-demos-0:2.1.9-21.el4.ppc", "4AS:freetype-demos-0:2.1.9-21.el4.s390", "4AS:freetype-demos-0:2.1.9-21.el4.s390x", "4AS:freetype-demos-0:2.1.9-21.el4.x86_64", "4AS:freetype-devel-0:2.1.9-21.el4.i386", "4AS:freetype-devel-0:2.1.9-21.el4.ia64", "4AS:freetype-devel-0:2.1.9-21.el4.ppc", "4AS:freetype-devel-0:2.1.9-21.el4.s390", "4AS:freetype-devel-0:2.1.9-21.el4.s390x", "4AS:freetype-devel-0:2.1.9-21.el4.x86_64", "4AS:freetype-utils-0:2.1.9-21.el4.i386", "4AS:freetype-utils-0:2.1.9-21.el4.ia64", "4AS:freetype-utils-0:2.1.9-21.el4.ppc", "4AS:freetype-utils-0:2.1.9-21.el4.s390", "4AS:freetype-utils-0:2.1.9-21.el4.s390x", "4AS:freetype-utils-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-0:2.1.9-21.el4.i386", "4Desktop:freetype-0:2.1.9-21.el4.ia64", "4Desktop:freetype-0:2.1.9-21.el4.ppc", "4Desktop:freetype-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-0:2.1.9-21.el4.s390", "4Desktop:freetype-0:2.1.9-21.el4.s390x", "4Desktop:freetype-0:2.1.9-21.el4.src", "4Desktop:freetype-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.i386", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-demos-0:2.1.9-21.el4.i386", "4Desktop:freetype-demos-0:2.1.9-21.el4.ia64", "4Desktop:freetype-demos-0:2.1.9-21.el4.ppc", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390", "4Desktop:freetype-demos-0:2.1.9-21.el4.s390x", "4Desktop:freetype-demos-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-devel-0:2.1.9-21.el4.i386", "4Desktop:freetype-devel-0:2.1.9-21.el4.ia64", "4Desktop:freetype-devel-0:2.1.9-21.el4.ppc", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390", "4Desktop:freetype-devel-0:2.1.9-21.el4.s390x", "4Desktop:freetype-devel-0:2.1.9-21.el4.x86_64", "4Desktop:freetype-utils-0:2.1.9-21.el4.i386", "4Desktop:freetype-utils-0:2.1.9-21.el4.ia64", "4Desktop:freetype-utils-0:2.1.9-21.el4.ppc", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390", "4Desktop:freetype-utils-0:2.1.9-21.el4.s390x", "4Desktop:freetype-utils-0:2.1.9-21.el4.x86_64", "4ES:freetype-0:2.1.9-21.el4.i386", "4ES:freetype-0:2.1.9-21.el4.ia64", "4ES:freetype-0:2.1.9-21.el4.ppc", "4ES:freetype-0:2.1.9-21.el4.ppc64", "4ES:freetype-0:2.1.9-21.el4.s390", "4ES:freetype-0:2.1.9-21.el4.s390x", "4ES:freetype-0:2.1.9-21.el4.src", "4ES:freetype-0:2.1.9-21.el4.x86_64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.i386", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4ES:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390", "4ES:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4ES:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4ES:freetype-demos-0:2.1.9-21.el4.i386", "4ES:freetype-demos-0:2.1.9-21.el4.ia64", "4ES:freetype-demos-0:2.1.9-21.el4.ppc", "4ES:freetype-demos-0:2.1.9-21.el4.s390", "4ES:freetype-demos-0:2.1.9-21.el4.s390x", "4ES:freetype-demos-0:2.1.9-21.el4.x86_64", "4ES:freetype-devel-0:2.1.9-21.el4.i386", "4ES:freetype-devel-0:2.1.9-21.el4.ia64", "4ES:freetype-devel-0:2.1.9-21.el4.ppc", "4ES:freetype-devel-0:2.1.9-21.el4.s390", "4ES:freetype-devel-0:2.1.9-21.el4.s390x", "4ES:freetype-devel-0:2.1.9-21.el4.x86_64", "4ES:freetype-utils-0:2.1.9-21.el4.i386", "4ES:freetype-utils-0:2.1.9-21.el4.ia64", "4ES:freetype-utils-0:2.1.9-21.el4.ppc", "4ES:freetype-utils-0:2.1.9-21.el4.s390", "4ES:freetype-utils-0:2.1.9-21.el4.s390x", "4ES:freetype-utils-0:2.1.9-21.el4.x86_64", "4WS:freetype-0:2.1.9-21.el4.i386", "4WS:freetype-0:2.1.9-21.el4.ia64", "4WS:freetype-0:2.1.9-21.el4.ppc", "4WS:freetype-0:2.1.9-21.el4.ppc64", "4WS:freetype-0:2.1.9-21.el4.s390", "4WS:freetype-0:2.1.9-21.el4.s390x", "4WS:freetype-0:2.1.9-21.el4.src", "4WS:freetype-0:2.1.9-21.el4.x86_64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.i386", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ia64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc", "4WS:freetype-debuginfo-0:2.1.9-21.el4.ppc64", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390", "4WS:freetype-debuginfo-0:2.1.9-21.el4.s390x", "4WS:freetype-debuginfo-0:2.1.9-21.el4.x86_64", "4WS:freetype-demos-0:2.1.9-21.el4.i386", "4WS:freetype-demos-0:2.1.9-21.el4.ia64", "4WS:freetype-demos-0:2.1.9-21.el4.ppc", "4WS:freetype-demos-0:2.1.9-21.el4.s390", "4WS:freetype-demos-0:2.1.9-21.el4.s390x", "4WS:freetype-demos-0:2.1.9-21.el4.x86_64", "4WS:freetype-devel-0:2.1.9-21.el4.i386", "4WS:freetype-devel-0:2.1.9-21.el4.ia64", "4WS:freetype-devel-0:2.1.9-21.el4.ppc", "4WS:freetype-devel-0:2.1.9-21.el4.s390", "4WS:freetype-devel-0:2.1.9-21.el4.s390x", "4WS:freetype-devel-0:2.1.9-21.el4.x86_64", "4WS:freetype-utils-0:2.1.9-21.el4.i386", "4WS:freetype-utils-0:2.1.9-21.el4.ia64", "4WS:freetype-utils-0:2.1.9-21.el4.ppc", "4WS:freetype-utils-0:2.1.9-21.el4.s390", "4WS:freetype-utils-0:2.1.9-21.el4.s390x", "4WS:freetype-utils-0:2.1.9-21.el4.x86_64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Client-Workstation-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Client-Workstation-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.src", "5Server-5.7.Z:freetype-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-debuginfo-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-demos-0:2.2.1-28.el5_7.2.x86_64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.i386", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ia64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.ppc64", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.s390x", "5Server-5.7.Z:freetype-devel-0:2.2.1-28.el5_7.2.x86_64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.src", "6Server-optional-6.1.z:freetype-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-debuginfo-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-demos-0:2.3.11-6.el6_1.8.x86_64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.i686", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.ppc64", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.s390x", "6Server-optional-6.1.z:freetype-devel-0:2.3.11-6.el6_1.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts" } ] }
rhsa-2012:0094
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.6 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently.\n\nMultiple input validation flaws were found in the way FreeType processed\nbitmap font files. If a specially-crafted font file was loaded by an\napplication linked against FreeType, it could cause the application to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-3256)\n\nMultiple input validation flaws were found in the way FreeType processed\nCID-keyed fonts. If a specially-crafted font file was loaded by an\napplication linked against FreeType, it could cause the application to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-3439)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0094", "url": "https://access.redhat.com/errata/RHSA-2012:0094" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "746226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226" }, { "category": "external", "summary": "753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0094.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2025-09-10T13:52:25+00:00", "generator": { "date": "2025-09-10T13:52:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2012:0094", "initial_release_date": "2012-02-02T22:23:00+00:00", "revision_history": [ { "date": "2012-02-02T22:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-02T22:29:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:52:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.6 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.ppc64", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc64", "product_id": "freetype-0:2.2.1-28.el5_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.s390", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.s390", "product_id": "freetype-0:2.2.1-28.el5_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.src", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.src", "product_id": "freetype-0:2.2.1-28.el5_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.s390", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.src as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.src", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3256", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2010-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "746226" } ], "notes": [ { "category": "description", "text": "FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3256" }, { "category": "external", "summary": "RHBZ#746226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3256", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3256" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3256", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3256" } ], "release_date": "2011-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-02T22:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0094" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation" }, { "cve": "CVE-2011-3439", "discovery_date": "2011-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "753799" } ], "notes": [ { "category": "description", "text": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3439" }, { "category": "external", "summary": "RHBZ#753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3439", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439" } ], "release_date": "2011-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-02T22:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0094" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts" } ] }
rhsa-2012_0094
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.6 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently.\n\nMultiple input validation flaws were found in the way FreeType processed\nbitmap font files. If a specially-crafted font file was loaded by an\napplication linked against FreeType, it could cause the application to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-3256)\n\nMultiple input validation flaws were found in the way FreeType processed\nCID-keyed fonts. If a specially-crafted font file was loaded by an\napplication linked against FreeType, it could cause the application to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application. (CVE-2011-3439)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0094", "url": "https://access.redhat.com/errata/RHSA-2012:0094" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "746226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226" }, { "category": "external", "summary": "753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0094.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2024-11-22T05:01:05+00:00", "generator": { "date": "2024-11-22T05:01:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0094", "initial_release_date": "2012-02-02T22:23:00+00:00", "revision_history": [ { "date": "2012-02-02T22:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-02T22:29:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:01:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.6 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.ppc64", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc64", "product_id": "freetype-0:2.2.1-28.el5_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.s390", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.s390", "product_id": "freetype-0:2.2.1-28.el5_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-28.el5_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-28.el5_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-28.el5_6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.2.1-28.el5_6.1.src", "product": { "name": "freetype-0:2.2.1-28.el5_6.1.src", "product_id": "freetype-0:2.2.1-28.el5_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-28.el5_6.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.s390", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.src as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.src", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.s390", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-28.el5_6.1.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3256", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2010-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "746226" } ], "notes": [ { "category": "description", "text": "FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3256" }, { "category": "external", "summary": "RHBZ#746226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3256", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3256" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3256", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3256" } ], "release_date": "2011-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-02T22:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0094" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation" }, { "cve": "CVE-2011-3439", "discovery_date": "2011-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "753799" } ], "notes": [ { "category": "description", "text": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3439" }, { "category": "external", "summary": "RHBZ#753799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3439", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439" } ], "release_date": "2011-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-02T22:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0094" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.src", "5Server-5.6.EUS:freetype-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-debuginfo-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-demos-0:2.2.1-28.el5_6.1.x86_64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.i386", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ia64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.ppc64", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.s390x", "5Server-5.6.EUS:freetype-devel-0:2.2.1-28.el5_6.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: Multiple security flaws when loading CID-keyed Type 1 fonts" } ] }
gsd-2011-3439
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-3439", "description": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "id": "GSD-2011-3439", "references": [ "https://www.suse.com/security/cve/CVE-2011-3439.html", "https://www.debian.org/security/2011/dsa-2350", "https://access.redhat.com/errata/RHSA-2012:0094", "https://access.redhat.com/errata/RHSA-2011:1455", "https://alas.aws.amazon.com/cve/html/CVE-2011-3439.html", "https://linux.oracle.com/cve/CVE-2011-3439.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-3439" ], "details": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "id": "GSD-2011-3439", "modified": "2023-12-13T01:19:10.136278Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2011-3439", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2012:0015", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" }, { "name": "SUSE-SU-2011:1307", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" }, { "name": "openSUSE-SU-2012:0047", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" }, { "name": "APPLE-SA-2011-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "name": "http://support.apple.com/kb/HT5052", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5052" }, { "name": "46921", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46921" }, { "name": "48951", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48951" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.0.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2011-3439" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2011-11-10-1", "refsource": "APPLE", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "name": "http://support.apple.com/kb/HT5052", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5052" }, { "name": "SUSE-SU-2011:1307", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" }, { "name": "openSUSE-SU-2012:0015", "refsource": "SUSE", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" }, { "name": "openSUSE-SU-2012:0047", "refsource": "SUSE", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" }, { "name": "46921", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/46921" }, { "name": "48951", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48951" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true } }, "lastModifiedDate": "2021-06-22T14:37Z", "publishedDate": "2011-11-11T18:55Z" } } }
var-201111-0222
Vulnerability from variot
FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document. Apple iOS is prone to multiple memory corruption vulnerabilities. Successfully exploiting these issues will allow attackers to execute arbitrary code. Failed exploit attempts may cause denial-of-service conditions. The following Apple systems are vulnerable: iOS 3.0 through 5.0 for iPhone 3GS, iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad iOS 4.3 through 5.0 for iPad 2. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. When accessing a maliciously crafted HTTP or HTTPS URL, CFNetwork could navigate to an incorrect server. DigiCert Malaysia has issued certificates with weak keys that it is unable to revoke. An attacker with a privileged network position could intercept user credentials or other sensitive information intended for a site with a certificate issued by DigiCert Malaysia. This issue is addressed by configuring default system trust settings so that DigiCert Malaysia's certificates are not trusted. We would like to acknowledge Bruce Morton of Entrust, Inc. for reporting this issue. This issue may lead to a bypass of codesigning checks. This issue does not affect devices running iOS prior to version 4.3. When resolving a maliciously crafted hostname, libinfo could return an incorrect result. CVE-ID CVE-2011-3441 : Erling Ellingsen of Facebook, Per Johansson of Blocket AB
Passcode Lock Available for: iOS 4.3 through 5.0 for iPad 2 Impact: A person with physical access to a locked iPad 2 may be able to access some of the user's data Description: When a Smart Cover is opened while iPad 2 is confirming power off in the locked state, the iPad does not request a passcode. This allows some access to the iPad, but data protected by Data Protection is inaccessible and apps cannot be launched. CVE-ID CVE-2011-3440
Installation note:
This update is only available through iTunes, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/
iTunes will automatically check Apple's update server on its weekly schedule. When an update is detected, it will download it. When the iPhone, iPod touch or iPad is docked, iTunes will present the user with the option to install the update. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iPhone, iPod touch, or iPad.
The automatic update process may take up to a week depending on the day that iTunes checks for updates. You may manually obtain the update via the Check for Updates button within iTunes.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/freetype < 2.4.8 >= 2.4.8
Description
Multiple vulnerabilities have been discovered in FreeType. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All FreeType users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.4.8"
References
[ 1 ] CVE-2010-1797 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1797 [ 2 ] CVE-2010-2497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2497 [ 3 ] CVE-2010-2498 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2498 [ 4 ] CVE-2010-2499 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2499 [ 5 ] CVE-2010-2500 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2500 [ 6 ] CVE-2010-2519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2519 [ 7 ] CVE-2010-2520 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2520 [ 8 ] CVE-2010-2527 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2527 [ 9 ] CVE-2010-2541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2541 [ 10 ] CVE-2010-2805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2805 [ 11 ] CVE-2010-2806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2806 [ 12 ] CVE-2010-2807 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2807 [ 13 ] CVE-2010-2808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2808 [ 14 ] CVE-2010-3053 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3053 [ 15 ] CVE-2010-3054 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3054 [ 16 ] CVE-2010-3311 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3311 [ 17 ] CVE-2010-3814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3814 [ 18 ] CVE-2010-3855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855 [ 19 ] CVE-2011-0226 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0226 [ 20 ] CVE-2011-3256 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3256 [ 21 ] CVE-2011-3439 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3439
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201201-09.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: freetype security update Advisory ID: RHSA-2011:1455-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1455.html Issue date: 2011-11-16 CVE Names: CVE-2011-3439 =====================================================================
- Summary:
Updated freetype packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
FreeType is a free, high-quality, portable font engine that can open and manage font files. It also loads, hints, and renders individual glyphs efficiently. The freetype packages for Red Hat Enterprise Linux 4 provide both the FreeType 1 and FreeType 2 font engines. The freetype packages for Red Hat Enterprise Linux 5 and 6 provide only the FreeType 2 font engine.
Multiple input validation flaws were found in the way FreeType processed CID-keyed fonts. (CVE-2011-3439)
Note: These issues only affected the FreeType 2 font engine.
Users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. The X server must be restarted (log out, then log back in) for this update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
753799 - CVE-2011-3439 freetype: Multiple security flaws when loading CID-keyed Type 1 fonts
- Package List:
Red Hat Enterprise Linux AS version 4:
Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/freetype-2.1.9-21.el4.src.rpm
i386: freetype-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-demos-2.1.9-21.el4.i386.rpm freetype-devel-2.1.9-21.el4.i386.rpm freetype-utils-2.1.9-21.el4.i386.rpm
ia64: freetype-2.1.9-21.el4.i386.rpm freetype-2.1.9-21.el4.ia64.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.ia64.rpm freetype-demos-2.1.9-21.el4.ia64.rpm freetype-devel-2.1.9-21.el4.ia64.rpm freetype-utils-2.1.9-21.el4.ia64.rpm
ppc: freetype-2.1.9-21.el4.ppc.rpm freetype-2.1.9-21.el4.ppc64.rpm freetype-debuginfo-2.1.9-21.el4.ppc.rpm freetype-debuginfo-2.1.9-21.el4.ppc64.rpm freetype-demos-2.1.9-21.el4.ppc.rpm freetype-devel-2.1.9-21.el4.ppc.rpm freetype-utils-2.1.9-21.el4.ppc.rpm
s390: freetype-2.1.9-21.el4.s390.rpm freetype-debuginfo-2.1.9-21.el4.s390.rpm freetype-demos-2.1.9-21.el4.s390.rpm freetype-devel-2.1.9-21.el4.s390.rpm freetype-utils-2.1.9-21.el4.s390.rpm
s390x: freetype-2.1.9-21.el4.s390.rpm freetype-2.1.9-21.el4.s390x.rpm freetype-debuginfo-2.1.9-21.el4.s390.rpm freetype-debuginfo-2.1.9-21.el4.s390x.rpm freetype-demos-2.1.9-21.el4.s390x.rpm freetype-devel-2.1.9-21.el4.s390x.rpm freetype-utils-2.1.9-21.el4.s390x.rpm
x86_64: freetype-2.1.9-21.el4.i386.rpm freetype-2.1.9-21.el4.x86_64.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.x86_64.rpm freetype-demos-2.1.9-21.el4.x86_64.rpm freetype-devel-2.1.9-21.el4.x86_64.rpm freetype-utils-2.1.9-21.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/freetype-2.1.9-21.el4.src.rpm
i386: freetype-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-demos-2.1.9-21.el4.i386.rpm freetype-devel-2.1.9-21.el4.i386.rpm freetype-utils-2.1.9-21.el4.i386.rpm
x86_64: freetype-2.1.9-21.el4.i386.rpm freetype-2.1.9-21.el4.x86_64.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.x86_64.rpm freetype-demos-2.1.9-21.el4.x86_64.rpm freetype-devel-2.1.9-21.el4.x86_64.rpm freetype-utils-2.1.9-21.el4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/freetype-2.1.9-21.el4.src.rpm
i386: freetype-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-demos-2.1.9-21.el4.i386.rpm freetype-devel-2.1.9-21.el4.i386.rpm freetype-utils-2.1.9-21.el4.i386.rpm
ia64: freetype-2.1.9-21.el4.i386.rpm freetype-2.1.9-21.el4.ia64.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.ia64.rpm freetype-demos-2.1.9-21.el4.ia64.rpm freetype-devel-2.1.9-21.el4.ia64.rpm freetype-utils-2.1.9-21.el4.ia64.rpm
x86_64: freetype-2.1.9-21.el4.i386.rpm freetype-2.1.9-21.el4.x86_64.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.x86_64.rpm freetype-demos-2.1.9-21.el4.x86_64.rpm freetype-devel-2.1.9-21.el4.x86_64.rpm freetype-utils-2.1.9-21.el4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/freetype-2.1.9-21.el4.src.rpm
i386: freetype-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-demos-2.1.9-21.el4.i386.rpm freetype-devel-2.1.9-21.el4.i386.rpm freetype-utils-2.1.9-21.el4.i386.rpm
ia64: freetype-2.1.9-21.el4.i386.rpm freetype-2.1.9-21.el4.ia64.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.ia64.rpm freetype-demos-2.1.9-21.el4.ia64.rpm freetype-devel-2.1.9-21.el4.ia64.rpm freetype-utils-2.1.9-21.el4.ia64.rpm
x86_64: freetype-2.1.9-21.el4.i386.rpm freetype-2.1.9-21.el4.x86_64.rpm freetype-debuginfo-2.1.9-21.el4.i386.rpm freetype-debuginfo-2.1.9-21.el4.x86_64.rpm freetype-demos-2.1.9-21.el4.x86_64.rpm freetype-devel-2.1.9-21.el4.x86_64.rpm freetype-utils-2.1.9-21.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/freetype-2.2.1-28.el5_7.2.src.rpm
i386: freetype-2.2.1-28.el5_7.2.i386.rpm freetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm
x86_64: freetype-2.2.1-28.el5_7.2.i386.rpm freetype-2.2.1-28.el5_7.2.x86_64.rpm freetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm freetype-debuginfo-2.2.1-28.el5_7.2.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/freetype-2.2.1-28.el5_7.2.src.rpm
i386: freetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm freetype-demos-2.2.1-28.el5_7.2.i386.rpm freetype-devel-2.2.1-28.el5_7.2.i386.rpm
x86_64: freetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm freetype-debuginfo-2.2.1-28.el5_7.2.x86_64.rpm freetype-demos-2.2.1-28.el5_7.2.x86_64.rpm freetype-devel-2.2.1-28.el5_7.2.i386.rpm freetype-devel-2.2.1-28.el5_7.2.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/freetype-2.2.1-28.el5_7.2.src.rpm
i386: freetype-2.2.1-28.el5_7.2.i386.rpm freetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm freetype-demos-2.2.1-28.el5_7.2.i386.rpm freetype-devel-2.2.1-28.el5_7.2.i386.rpm
ia64: freetype-2.2.1-28.el5_7.2.i386.rpm freetype-2.2.1-28.el5_7.2.ia64.rpm freetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm freetype-debuginfo-2.2.1-28.el5_7.2.ia64.rpm freetype-demos-2.2.1-28.el5_7.2.ia64.rpm freetype-devel-2.2.1-28.el5_7.2.ia64.rpm
ppc: freetype-2.2.1-28.el5_7.2.ppc.rpm freetype-2.2.1-28.el5_7.2.ppc64.rpm freetype-debuginfo-2.2.1-28.el5_7.2.ppc.rpm freetype-debuginfo-2.2.1-28.el5_7.2.ppc64.rpm freetype-demos-2.2.1-28.el5_7.2.ppc.rpm freetype-devel-2.2.1-28.el5_7.2.ppc.rpm freetype-devel-2.2.1-28.el5_7.2.ppc64.rpm
s390x: freetype-2.2.1-28.el5_7.2.s390.rpm freetype-2.2.1-28.el5_7.2.s390x.rpm freetype-debuginfo-2.2.1-28.el5_7.2.s390.rpm freetype-debuginfo-2.2.1-28.el5_7.2.s390x.rpm freetype-demos-2.2.1-28.el5_7.2.s390x.rpm freetype-devel-2.2.1-28.el5_7.2.s390.rpm freetype-devel-2.2.1-28.el5_7.2.s390x.rpm
x86_64: freetype-2.2.1-28.el5_7.2.i386.rpm freetype-2.2.1-28.el5_7.2.x86_64.rpm freetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm freetype-debuginfo-2.2.1-28.el5_7.2.x86_64.rpm freetype-demos-2.2.1-28.el5_7.2.x86_64.rpm freetype-devel-2.2.1-28.el5_7.2.i386.rpm freetype-devel-2.2.1-28.el5_7.2.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm
i386: freetype-2.3.11-6.el6_1.8.i686.rpm freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm
x86_64: freetype-2.3.11-6.el6_1.8.i686.rpm freetype-2.3.11-6.el6_1.8.x86_64.rpm freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm
i386: freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-demos-2.3.11-6.el6_1.8.i686.rpm freetype-devel-2.3.11-6.el6_1.8.i686.rpm
x86_64: freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm freetype-demos-2.3.11-6.el6_1.8.x86_64.rpm freetype-devel-2.3.11-6.el6_1.8.i686.rpm freetype-devel-2.3.11-6.el6_1.8.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm
x86_64: freetype-2.3.11-6.el6_1.8.i686.rpm freetype-2.3.11-6.el6_1.8.x86_64.rpm freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm
x86_64: freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm freetype-demos-2.3.11-6.el6_1.8.x86_64.rpm freetype-devel-2.3.11-6.el6_1.8.i686.rpm freetype-devel-2.3.11-6.el6_1.8.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm
i386: freetype-2.3.11-6.el6_1.8.i686.rpm freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-devel-2.3.11-6.el6_1.8.i686.rpm
ppc64: freetype-2.3.11-6.el6_1.8.ppc.rpm freetype-2.3.11-6.el6_1.8.ppc64.rpm freetype-debuginfo-2.3.11-6.el6_1.8.ppc.rpm freetype-debuginfo-2.3.11-6.el6_1.8.ppc64.rpm freetype-devel-2.3.11-6.el6_1.8.ppc.rpm freetype-devel-2.3.11-6.el6_1.8.ppc64.rpm
s390x: freetype-2.3.11-6.el6_1.8.s390.rpm freetype-2.3.11-6.el6_1.8.s390x.rpm freetype-debuginfo-2.3.11-6.el6_1.8.s390.rpm freetype-debuginfo-2.3.11-6.el6_1.8.s390x.rpm freetype-devel-2.3.11-6.el6_1.8.s390.rpm freetype-devel-2.3.11-6.el6_1.8.s390x.rpm
x86_64: freetype-2.3.11-6.el6_1.8.i686.rpm freetype-2.3.11-6.el6_1.8.x86_64.rpm freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm freetype-devel-2.3.11-6.el6_1.8.i686.rpm freetype-devel-2.3.11-6.el6_1.8.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm
i386: freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-demos-2.3.11-6.el6_1.8.i686.rpm
ppc64: freetype-debuginfo-2.3.11-6.el6_1.8.ppc64.rpm freetype-demos-2.3.11-6.el6_1.8.ppc64.rpm
s390x: freetype-debuginfo-2.3.11-6.el6_1.8.s390x.rpm freetype-demos-2.3.11-6.el6_1.8.s390x.rpm
x86_64: freetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm freetype-demos-2.3.11-6.el6_1.8.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm
i386: freetype-2.3.11-6.el6_1.8.i686.rpm freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-devel-2.3.11-6.el6_1.8.i686.rpm
x86_64: freetype-2.3.11-6.el6_1.8.i686.rpm freetype-2.3.11-6.el6_1.8.x86_64.rpm freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm freetype-devel-2.3.11-6.el6_1.8.i686.rpm freetype-devel-2.3.11-6.el6_1.8.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm
i386: freetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm freetype-demos-2.3.11-6.el6_1.8.i686.rpm
x86_64: freetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm freetype-demos-2.3.11-6.el6_1.8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-3439.html https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFOxELiXlSAg2UNWIIRAmg3AJ97Gr0i8TaFnRSHpygUtgufIIvBsgCfQ/lt 9X4xr8MjwZa5fRg3cRkFSu4= =DgiA -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security.
For the oldstable distribution (lenny), this problem has been fixed in version 2.3.7-2+lenny8.
For the stable distribution (squeeze), this problem has been fixed in version 2.4.2-2.1+squeeze3.
For the unstable distribution (sid), this problem has been fixed in version 2.4.8-1. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ========================================================================== Ubuntu Security Notice USN-1267-1 November 18, 2011
freetype vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
FreeType could be made to crash or run programs as your login if it opened a specially crafted font file. (CVE-2011-3439)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.10: libfreetype6 2.4.4-2ubuntu1.1
Ubuntu 11.04: libfreetype6 2.4.4-1ubuntu2.2
Ubuntu 10.10: libfreetype6 2.4.2-2ubuntu0.3
Ubuntu 10.04 LTS: libfreetype6 2.3.11-1ubuntu2.5
Ubuntu 8.04 LTS: libfreetype6 2.3.5-1ubuntu4.8.04.7
After a standard system update you need to restart your session to make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201111-0222", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "5.0.1" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.0 to 5.0 (iphone 3gs" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "iphone 4 and iphone 4s for )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.1 to 5.0 (ipod touch (3rd generation) after )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.2 to 5.0 (ipad for )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "4.3 to 5.0 (ipad 2 for )" }, { "model": "ipad", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "iphone", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.3.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.1.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "5.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "1.0.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "hat enterprise linux eus 5.6.z server", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.8" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux enterprise desktop sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.1.10" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux enterprise sdk sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.4.7" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "hat enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.2.10" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.3.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "hat enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.4.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.10" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.4.5" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.3.11" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "hat enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.8" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.4" }, { "model": "hat enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.1.7" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.5" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.4.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.4" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.9" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "hat enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "ios beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "freetype", "scope": "ne", "trust": 0.3, "vendor": "freetype", "version": "2.4.8" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.3.4" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.0.6" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.7" }, { "model": "linux enterprise server for vmware sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.1.9" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.3.5" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.1" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.2" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.3.9" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "hat enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.4" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "hat enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.1" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.5" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.6" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.0.9" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "freetype", "scope": "eq", "trust": 0.3, "vendor": "freetype", "version": "2.3.6" } ], "sources": [ { "db": "BID", "id": "50643" }, { "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "db": "CNNVD", "id": "CNNVD-201111-236" }, { "db": "NVD", "id": "CVE-2011-3439" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:iphone_os", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipad", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:iphone", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipod_touch", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002837" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "BID", "id": "50643" }, { "db": "PACKETSTORM", "id": "106986" } ], "trust": 0.4 }, "cve": "CVE-2011-3439", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2011-3439", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-51384", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-3439", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-3439", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201111-236", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-51384", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-51384" }, { "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "db": "CNNVD", "id": "CNNVD-201111-236" }, { "db": "NVD", "id": "CVE-2011-3439" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document. Apple iOS is prone to multiple memory corruption vulnerabilities. \nSuccessfully exploiting these issues will allow attackers to execute arbitrary code. Failed exploit attempts may cause denial-of-service conditions. \nThe following Apple systems are vulnerable:\niOS 3.0 through 5.0 for iPhone 3GS, iPhone 4 and iPhone 4S\niOS 3.1 through 5.0 for iPod touch (3rd generation) and later\niOS 3.2 through 5.0 for iPad\niOS 4.3 through 5.0 for iPad 2. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. When accessing a maliciously crafted HTTP or HTTPS URL,\nCFNetwork could navigate to an incorrect server. DigiCert Malaysia has issued certificates with\nweak keys that it is unable to revoke. An attacker with a privileged\nnetwork position could intercept user credentials or other sensitive\ninformation intended for a site with a certificate issued by DigiCert\nMalaysia. This issue is addressed by configuring default system trust\nsettings so that DigiCert Malaysia\u0027s certificates are not trusted. We\nwould like to acknowledge Bruce Morton of Entrust, Inc. for reporting\nthis issue. This issue may lead to a bypass\nof codesigning checks. This issue does not affect devices running\niOS prior to version 4.3. When resolving a maliciously crafted hostname, libinfo could\nreturn an incorrect result. \nCVE-ID\nCVE-2011-3441 : Erling Ellingsen of Facebook, Per Johansson of\nBlocket AB\n\nPasscode Lock\nAvailable for: iOS 4.3 through 5.0 for iPad 2\nImpact: A person with physical access to a locked iPad 2 may be able\nto access some of the user\u0027s data\nDescription: When a Smart Cover is opened while iPad 2 is confirming\npower off in the locked state, the iPad does not request a passcode. \nThis allows some access to the iPad, but data protected by Data\nProtection is inaccessible and apps cannot be launched. \nCVE-ID\nCVE-2011-3440\n\nInstallation note:\n\nThis update is only available through iTunes, and will not appear\nin your computer\u0027s Software Update application, or in the Apple\nDownloads site. Make sure you have an Internet connection and have\ninstalled the latest version of iTunes from www.apple.com/itunes/\n\niTunes will automatically check Apple\u0027s update server on its weekly\nschedule. When an update is detected, it will download it. When\nthe iPhone, iPod touch or iPad is docked, iTunes will present the\nuser with the option to install the update. We recommend applying\nthe update immediately if possible. Selecting Don\u0027t Install will\npresent the option the next time you connect your iPhone, iPod touch,\nor iPad. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes checks for updates. You may manually obtain the\nupdate via the Check for Updates button within iTunes. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 media-libs/freetype \u003c 2.4.8 \u003e= 2.4.8\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in FreeType. Please\nreview the CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll FreeType users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=media-libs/freetype-2.4.8\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-1797\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1797\n[ 2 ] CVE-2010-2497\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2497\n[ 3 ] CVE-2010-2498\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2498\n[ 4 ] CVE-2010-2499\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2499\n[ 5 ] CVE-2010-2500\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2500\n[ 6 ] CVE-2010-2519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2519\n[ 7 ] CVE-2010-2520\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2520\n[ 8 ] CVE-2010-2527\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2527\n[ 9 ] CVE-2010-2541\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2541\n[ 10 ] CVE-2010-2805\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2805\n[ 11 ] CVE-2010-2806\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2806\n[ 12 ] CVE-2010-2807\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2807\n[ 13 ] CVE-2010-2808\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2808\n[ 14 ] CVE-2010-3053\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3053\n[ 15 ] CVE-2010-3054\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3054\n[ 16 ] CVE-2010-3311\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3311\n[ 17 ] CVE-2010-3814\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3814\n[ 18 ] CVE-2010-3855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855\n[ 19 ] CVE-2011-0226\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0226\n[ 20 ] CVE-2011-3256\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3256\n[ 21 ] CVE-2011-3439\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3439\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201201-09.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: freetype security update\nAdvisory ID: RHSA-2011:1455-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2011-1455.html\nIssue date: 2011-11-16\nCVE Names: CVE-2011-3439 \n=====================================================================\n\n1. Summary:\n\nUpdated freetype packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4, 5, and 6. \n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section. \n\n2. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop version 4 - i386, x86_64\nRed Hat Enterprise Linux ES version 4 - i386, ia64, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux WS version 4 - i386, ia64, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nFreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. The freetype packages for Red Hat Enterprise Linux 4 provide\nboth the FreeType 1 and FreeType 2 font engines. The freetype packages for\nRed Hat Enterprise Linux 5 and 6 provide only the FreeType 2 font engine. \n\nMultiple input validation flaws were found in the way FreeType processed\nCID-keyed fonts. (CVE-2011-3439)\n\nNote: These issues only affected the FreeType 2 font engine. \n\nUsers are advised to upgrade to these updated packages, which contain a\nbackported patch to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n753799 - CVE-2011-3439 freetype: Multiple security flaws when loading CID-keyed Type 1 fonts\n\n6. Package List:\n\nRed Hat Enterprise Linux AS version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/freetype-2.1.9-21.el4.src.rpm\n\ni386:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-demos-2.1.9-21.el4.i386.rpm\nfreetype-devel-2.1.9-21.el4.i386.rpm\nfreetype-utils-2.1.9-21.el4.i386.rpm\n\nia64:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-2.1.9-21.el4.ia64.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.ia64.rpm\nfreetype-demos-2.1.9-21.el4.ia64.rpm\nfreetype-devel-2.1.9-21.el4.ia64.rpm\nfreetype-utils-2.1.9-21.el4.ia64.rpm\n\nppc:\nfreetype-2.1.9-21.el4.ppc.rpm\nfreetype-2.1.9-21.el4.ppc64.rpm\nfreetype-debuginfo-2.1.9-21.el4.ppc.rpm\nfreetype-debuginfo-2.1.9-21.el4.ppc64.rpm\nfreetype-demos-2.1.9-21.el4.ppc.rpm\nfreetype-devel-2.1.9-21.el4.ppc.rpm\nfreetype-utils-2.1.9-21.el4.ppc.rpm\n\ns390:\nfreetype-2.1.9-21.el4.s390.rpm\nfreetype-debuginfo-2.1.9-21.el4.s390.rpm\nfreetype-demos-2.1.9-21.el4.s390.rpm\nfreetype-devel-2.1.9-21.el4.s390.rpm\nfreetype-utils-2.1.9-21.el4.s390.rpm\n\ns390x:\nfreetype-2.1.9-21.el4.s390.rpm\nfreetype-2.1.9-21.el4.s390x.rpm\nfreetype-debuginfo-2.1.9-21.el4.s390.rpm\nfreetype-debuginfo-2.1.9-21.el4.s390x.rpm\nfreetype-demos-2.1.9-21.el4.s390x.rpm\nfreetype-devel-2.1.9-21.el4.s390x.rpm\nfreetype-utils-2.1.9-21.el4.s390x.rpm\n\nx86_64:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-2.1.9-21.el4.x86_64.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.x86_64.rpm\nfreetype-demos-2.1.9-21.el4.x86_64.rpm\nfreetype-devel-2.1.9-21.el4.x86_64.rpm\nfreetype-utils-2.1.9-21.el4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/freetype-2.1.9-21.el4.src.rpm\n\ni386:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-demos-2.1.9-21.el4.i386.rpm\nfreetype-devel-2.1.9-21.el4.i386.rpm\nfreetype-utils-2.1.9-21.el4.i386.rpm\n\nx86_64:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-2.1.9-21.el4.x86_64.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.x86_64.rpm\nfreetype-demos-2.1.9-21.el4.x86_64.rpm\nfreetype-devel-2.1.9-21.el4.x86_64.rpm\nfreetype-utils-2.1.9-21.el4.x86_64.rpm\n\nRed Hat Enterprise Linux ES version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/freetype-2.1.9-21.el4.src.rpm\n\ni386:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-demos-2.1.9-21.el4.i386.rpm\nfreetype-devel-2.1.9-21.el4.i386.rpm\nfreetype-utils-2.1.9-21.el4.i386.rpm\n\nia64:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-2.1.9-21.el4.ia64.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.ia64.rpm\nfreetype-demos-2.1.9-21.el4.ia64.rpm\nfreetype-devel-2.1.9-21.el4.ia64.rpm\nfreetype-utils-2.1.9-21.el4.ia64.rpm\n\nx86_64:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-2.1.9-21.el4.x86_64.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.x86_64.rpm\nfreetype-demos-2.1.9-21.el4.x86_64.rpm\nfreetype-devel-2.1.9-21.el4.x86_64.rpm\nfreetype-utils-2.1.9-21.el4.x86_64.rpm\n\nRed Hat Enterprise Linux WS version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/freetype-2.1.9-21.el4.src.rpm\n\ni386:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-demos-2.1.9-21.el4.i386.rpm\nfreetype-devel-2.1.9-21.el4.i386.rpm\nfreetype-utils-2.1.9-21.el4.i386.rpm\n\nia64:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-2.1.9-21.el4.ia64.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.ia64.rpm\nfreetype-demos-2.1.9-21.el4.ia64.rpm\nfreetype-devel-2.1.9-21.el4.ia64.rpm\nfreetype-utils-2.1.9-21.el4.ia64.rpm\n\nx86_64:\nfreetype-2.1.9-21.el4.i386.rpm\nfreetype-2.1.9-21.el4.x86_64.rpm\nfreetype-debuginfo-2.1.9-21.el4.i386.rpm\nfreetype-debuginfo-2.1.9-21.el4.x86_64.rpm\nfreetype-demos-2.1.9-21.el4.x86_64.rpm\nfreetype-devel-2.1.9-21.el4.x86_64.rpm\nfreetype-utils-2.1.9-21.el4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/freetype-2.2.1-28.el5_7.2.src.rpm\n\ni386:\nfreetype-2.2.1-28.el5_7.2.i386.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm\n\nx86_64:\nfreetype-2.2.1-28.el5_7.2.i386.rpm\nfreetype-2.2.1-28.el5_7.2.x86_64.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/freetype-2.2.1-28.el5_7.2.src.rpm\n\ni386:\nfreetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm\nfreetype-demos-2.2.1-28.el5_7.2.i386.rpm\nfreetype-devel-2.2.1-28.el5_7.2.i386.rpm\n\nx86_64:\nfreetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.x86_64.rpm\nfreetype-demos-2.2.1-28.el5_7.2.x86_64.rpm\nfreetype-devel-2.2.1-28.el5_7.2.i386.rpm\nfreetype-devel-2.2.1-28.el5_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/freetype-2.2.1-28.el5_7.2.src.rpm\n\ni386:\nfreetype-2.2.1-28.el5_7.2.i386.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm\nfreetype-demos-2.2.1-28.el5_7.2.i386.rpm\nfreetype-devel-2.2.1-28.el5_7.2.i386.rpm\n\nia64:\nfreetype-2.2.1-28.el5_7.2.i386.rpm\nfreetype-2.2.1-28.el5_7.2.ia64.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.ia64.rpm\nfreetype-demos-2.2.1-28.el5_7.2.ia64.rpm\nfreetype-devel-2.2.1-28.el5_7.2.ia64.rpm\n\nppc:\nfreetype-2.2.1-28.el5_7.2.ppc.rpm\nfreetype-2.2.1-28.el5_7.2.ppc64.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.ppc.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.ppc64.rpm\nfreetype-demos-2.2.1-28.el5_7.2.ppc.rpm\nfreetype-devel-2.2.1-28.el5_7.2.ppc.rpm\nfreetype-devel-2.2.1-28.el5_7.2.ppc64.rpm\n\ns390x:\nfreetype-2.2.1-28.el5_7.2.s390.rpm\nfreetype-2.2.1-28.el5_7.2.s390x.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.s390.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.s390x.rpm\nfreetype-demos-2.2.1-28.el5_7.2.s390x.rpm\nfreetype-devel-2.2.1-28.el5_7.2.s390.rpm\nfreetype-devel-2.2.1-28.el5_7.2.s390x.rpm\n\nx86_64:\nfreetype-2.2.1-28.el5_7.2.i386.rpm\nfreetype-2.2.1-28.el5_7.2.x86_64.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.i386.rpm\nfreetype-debuginfo-2.2.1-28.el5_7.2.x86_64.rpm\nfreetype-demos-2.2.1-28.el5_7.2.x86_64.rpm\nfreetype-devel-2.2.1-28.el5_7.2.i386.rpm\nfreetype-devel-2.2.1-28.el5_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm\n\ni386:\nfreetype-2.3.11-6.el6_1.8.i686.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\n\nx86_64:\nfreetype-2.3.11-6.el6_1.8.i686.rpm\nfreetype-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm\n\ni386:\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-demos-2.3.11-6.el6_1.8.i686.rpm\nfreetype-devel-2.3.11-6.el6_1.8.i686.rpm\n\nx86_64:\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-demos-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-devel-2.3.11-6.el6_1.8.i686.rpm\nfreetype-devel-2.3.11-6.el6_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm\n\nx86_64:\nfreetype-2.3.11-6.el6_1.8.i686.rpm\nfreetype-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm\n\nx86_64:\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-demos-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-devel-2.3.11-6.el6_1.8.i686.rpm\nfreetype-devel-2.3.11-6.el6_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm\n\ni386:\nfreetype-2.3.11-6.el6_1.8.i686.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-devel-2.3.11-6.el6_1.8.i686.rpm\n\nppc64:\nfreetype-2.3.11-6.el6_1.8.ppc.rpm\nfreetype-2.3.11-6.el6_1.8.ppc64.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.ppc.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.ppc64.rpm\nfreetype-devel-2.3.11-6.el6_1.8.ppc.rpm\nfreetype-devel-2.3.11-6.el6_1.8.ppc64.rpm\n\ns390x:\nfreetype-2.3.11-6.el6_1.8.s390.rpm\nfreetype-2.3.11-6.el6_1.8.s390x.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.s390.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.s390x.rpm\nfreetype-devel-2.3.11-6.el6_1.8.s390.rpm\nfreetype-devel-2.3.11-6.el6_1.8.s390x.rpm\n\nx86_64:\nfreetype-2.3.11-6.el6_1.8.i686.rpm\nfreetype-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-devel-2.3.11-6.el6_1.8.i686.rpm\nfreetype-devel-2.3.11-6.el6_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm\n\ni386:\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-demos-2.3.11-6.el6_1.8.i686.rpm\n\nppc64:\nfreetype-debuginfo-2.3.11-6.el6_1.8.ppc64.rpm\nfreetype-demos-2.3.11-6.el6_1.8.ppc64.rpm\n\ns390x:\nfreetype-debuginfo-2.3.11-6.el6_1.8.s390x.rpm\nfreetype-demos-2.3.11-6.el6_1.8.s390x.rpm\n\nx86_64:\nfreetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-demos-2.3.11-6.el6_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm\n\ni386:\nfreetype-2.3.11-6.el6_1.8.i686.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-devel-2.3.11-6.el6_1.8.i686.rpm\n\nx86_64:\nfreetype-2.3.11-6.el6_1.8.i686.rpm\nfreetype-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-devel-2.3.11-6.el6_1.8.i686.rpm\nfreetype-devel-2.3.11-6.el6_1.8.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/freetype-2.3.11-6.el6_1.8.src.rpm\n\ni386:\nfreetype-debuginfo-2.3.11-6.el6_1.8.i686.rpm\nfreetype-demos-2.3.11-6.el6_1.8.i686.rpm\n\nx86_64:\nfreetype-debuginfo-2.3.11-6.el6_1.8.x86_64.rpm\nfreetype-demos-2.3.11-6.el6_1.8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-3439.html\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFOxELiXlSAg2UNWIIRAmg3AJ97Gr0i8TaFnRSHpygUtgufIIvBsgCfQ/lt\n9X4xr8MjwZa5fRg3cRkFSu4=\n=DgiA\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. \n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 2.3.7-2+lenny8. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 2.4.2-2.1+squeeze3. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2.4.8-1. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ==========================================================================\nUbuntu Security Notice USN-1267-1\nNovember 18, 2011\n\nfreetype vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 11.10\n- Ubuntu 11.04\n- Ubuntu 10.10\n- Ubuntu 10.04 LTS\n- Ubuntu 8.04 LTS\n\nSummary:\n\nFreeType could be made to crash or run programs as your login if it\nopened a specially crafted font file. (CVE-2011-3439)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 11.10:\n libfreetype6 2.4.4-2ubuntu1.1\n\nUbuntu 11.04:\n libfreetype6 2.4.4-1ubuntu2.2\n\nUbuntu 10.10:\n libfreetype6 2.4.2-2ubuntu0.3\n\nUbuntu 10.04 LTS:\n libfreetype6 2.3.11-1ubuntu2.5\n\nUbuntu 8.04 LTS:\n libfreetype6 2.3.5-1ubuntu4.8.04.7\n\nAfter a standard system update you need to restart your session to make\nall the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2011-3439" }, { "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "db": "BID", "id": "50643" }, { "db": "VULHUB", "id": "VHN-51384" }, { "db": "PACKETSTORM", "id": "106986" }, { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "109368" }, { "db": "PACKETSTORM", "id": "107049" }, { "db": "PACKETSTORM", "id": "107200" }, { "db": "PACKETSTORM", "id": "107171" }, { "db": "PACKETSTORM", "id": "107115" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-3439", "trust": 3.5 }, { "db": "SECUNIA", "id": "46921", "trust": 1.7 }, { "db": "SECUNIA", "id": "48951", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2011-002837", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201111-236", "trust": 0.7 }, { "db": "BID", "id": "50643", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "107200", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "107049", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "107171", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-51384", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "106986", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109005", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109368", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "107115", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-51384" }, { "db": "BID", "id": "50643" }, { "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "db": "PACKETSTORM", "id": "106986" }, { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "109368" }, { "db": "PACKETSTORM", "id": "107049" }, { "db": "PACKETSTORM", "id": "107200" }, { "db": "PACKETSTORM", "id": "107171" }, { "db": "PACKETSTORM", "id": "107115" }, { "db": "CNNVD", "id": "CNNVD-201111-236" }, { "db": "NVD", "id": "CVE-2011-3439" } ] }, "id": "VAR-201111-0222", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-51384" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T22:03:44.862000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT5052", "trust": 0.8, "url": "http://support.apple.com/kb/HT5052" }, { "title": "CVE-2011-3439 Denial of Service (DoS) vulnerability in FreeType", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_3439_denial_of" }, { "title": "Apple iOS \u2018CoreGraphics\u2019 Fixes for arbitrary code execution vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98683" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "db": "CNNVD", "id": "CNNVD-201111-236" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-51384" }, { "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "db": "NVD", "id": "CVE-2011-3439" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2011/nov/msg00001.html" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht5052" }, { "trust": 1.7, "url": "http://secunia.com/advisories/46921" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48951" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3439" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu988283" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3439" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3439" }, { "trust": 0.3, "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_3439_denial_of" }, { "trust": 0.3, "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.8/readme/view" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100154005" }, { "trust": 0.3, "url": "http://www.apple.com/iphone/softwareupdate/" }, { "trust": 0.3, "url": "http://www.apple.com/ipad/" }, { "trust": 0.3, "url": "http://www.apple.com/iphone/" }, { "trust": 0.3, "url": "http://www.apple.com/ipodtouch/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3256" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-3439.html" }, { "trust": 0.2, "url": "https://access.redhat.com/kb/docs/doc-11259" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3246" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3442" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2807" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2520" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0226" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2498" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2805" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3311" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2541" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3439" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2527" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0226" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3311" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3054" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2520" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2500" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2497" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2519" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2499" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2498" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2527" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2806" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201201-09.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3054" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1797" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3053" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2497" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2806" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2500" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2541" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3256" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3053" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2499" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2805" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2808" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1797" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2808" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2807" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3256.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-0094.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-1455.html" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1267-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/freetype/2.4.2-2ubuntu0.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/freetype/2.3.5-1ubuntu4.8.04.7" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/freetype/2.3.11-1ubuntu2.5" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/freetype/2.4.4-2ubuntu1.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/freetype/2.4.4-1ubuntu2.2" } ], "sources": [ { "db": "VULHUB", "id": "VHN-51384" }, { "db": "BID", "id": "50643" }, { "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "db": "PACKETSTORM", "id": "106986" }, { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "109368" }, { "db": "PACKETSTORM", "id": "107049" }, { "db": "PACKETSTORM", "id": "107200" }, { "db": "PACKETSTORM", "id": "107171" }, { "db": "PACKETSTORM", "id": "107115" }, { "db": "CNNVD", "id": "CNNVD-201111-236" }, { "db": "NVD", "id": "CVE-2011-3439" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-51384" }, { "db": "BID", "id": "50643" }, { "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "db": "PACKETSTORM", "id": "106986" }, { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "109368" }, { "db": "PACKETSTORM", "id": "107049" }, { "db": "PACKETSTORM", "id": "107200" }, { "db": "PACKETSTORM", "id": "107171" }, { "db": "PACKETSTORM", "id": "107115" }, { "db": "CNNVD", "id": "CNNVD-201111-236" }, { "db": "NVD", "id": "CVE-2011-3439" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-11-11T00:00:00", "db": "VULHUB", "id": "VHN-51384" }, { "date": "2011-11-10T00:00:00", "db": "BID", "id": "50643" }, { "date": "2011-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "date": "2011-11-15T05:08:20", "db": "PACKETSTORM", "id": "106986" }, { "date": "2012-01-24T04:19:22", "db": "PACKETSTORM", "id": "109005" }, { "date": "2012-02-03T00:18:48", "db": "PACKETSTORM", "id": "109368" }, { "date": "2011-11-17T02:27:33", "db": "PACKETSTORM", "id": "107049" }, { "date": "2011-11-22T01:13:45", "db": "PACKETSTORM", "id": "107200" }, { "date": "2011-11-21T01:26:46", "db": "PACKETSTORM", "id": "107171" }, { "date": "2011-11-18T16:44:18", "db": "PACKETSTORM", "id": "107115" }, { "date": "2011-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201111-236" }, { "date": "2011-11-11T18:55:01.193000", "db": "NVD", "id": "CVE-2011-3439" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-26T00:00:00", "db": "VULHUB", "id": "VHN-51384" }, { "date": "2015-04-13T21:19:00", "db": "BID", "id": "50643" }, { "date": "2012-04-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002837" }, { "date": "2021-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201111-236" }, { "date": "2024-11-21T01:30:30.667000", "db": "NVD", "id": "CVE-2011-3439" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "107200" }, { "db": "PACKETSTORM", "id": "107115" }, { "db": "CNNVD", "id": "CNNVD-201111-236" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple iOS of FreeType Vulnerabilities in arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002837" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "arbitrary", "sources": [ { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "109368" }, { "db": "PACKETSTORM", "id": "107049" }, { "db": "PACKETSTORM", "id": "107200" }, { "db": "PACKETSTORM", "id": "107171" }, { "db": "PACKETSTORM", "id": "107115" } ], "trust": 0.6 } }
opensuse-su-2024:10438-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "freetype2-devel-2.7-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the freetype2-devel-2.7-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10438", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10438-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-0946 page", "url": "https://www.suse.com/security/cve/CVE-2009-0946/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2497 page", "url": "https://www.suse.com/security/cve/CVE-2010-2497/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2805 page", "url": "https://www.suse.com/security/cve/CVE-2010-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3053 page", "url": "https://www.suse.com/security/cve/CVE-2010-3053/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3054 page", "url": "https://www.suse.com/security/cve/CVE-2010-3054/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3311 page", "url": "https://www.suse.com/security/cve/CVE-2010-3311/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3814 page", "url": "https://www.suse.com/security/cve/CVE-2010-3814/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3855 page", "url": "https://www.suse.com/security/cve/CVE-2010-3855/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0226 page", "url": "https://www.suse.com/security/cve/CVE-2011-0226/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3256 page", "url": "https://www.suse.com/security/cve/CVE-2011-3256/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3439 page", "url": "https://www.suse.com/security/cve/CVE-2011-3439/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1126 page", "url": "https://www.suse.com/security/cve/CVE-2012-1126/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1127 page", "url": "https://www.suse.com/security/cve/CVE-2012-1127/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1128 page", "url": "https://www.suse.com/security/cve/CVE-2012-1128/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1129 page", "url": "https://www.suse.com/security/cve/CVE-2012-1129/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1130 page", "url": "https://www.suse.com/security/cve/CVE-2012-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1131 page", "url": "https://www.suse.com/security/cve/CVE-2012-1131/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1132 page", "url": "https://www.suse.com/security/cve/CVE-2012-1132/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1133 page", "url": "https://www.suse.com/security/cve/CVE-2012-1133/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1134 page", "url": "https://www.suse.com/security/cve/CVE-2012-1134/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1135 page", "url": "https://www.suse.com/security/cve/CVE-2012-1135/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1136 page", "url": "https://www.suse.com/security/cve/CVE-2012-1136/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1137 page", "url": "https://www.suse.com/security/cve/CVE-2012-1137/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1138 page", "url": "https://www.suse.com/security/cve/CVE-2012-1138/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1139 page", "url": "https://www.suse.com/security/cve/CVE-2012-1139/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1140 page", "url": "https://www.suse.com/security/cve/CVE-2012-1140/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1141 page", "url": "https://www.suse.com/security/cve/CVE-2012-1141/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1142 page", "url": "https://www.suse.com/security/cve/CVE-2012-1142/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1143 page", "url": "https://www.suse.com/security/cve/CVE-2012-1143/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1144 page", "url": "https://www.suse.com/security/cve/CVE-2012-1144/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5668 page", "url": "https://www.suse.com/security/cve/CVE-2012-5668/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5669 page", "url": "https://www.suse.com/security/cve/CVE-2012-5669/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5670 page", "url": "https://www.suse.com/security/cve/CVE-2012-5670/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2240 page", "url": "https://www.suse.com/security/cve/CVE-2014-2240/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2241 page", "url": "https://www.suse.com/security/cve/CVE-2014-2241/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9656 page", "url": "https://www.suse.com/security/cve/CVE-2014-9656/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9657 page", "url": "https://www.suse.com/security/cve/CVE-2014-9657/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9658 page", "url": "https://www.suse.com/security/cve/CVE-2014-9658/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9659 page", "url": "https://www.suse.com/security/cve/CVE-2014-9659/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9660 page", "url": "https://www.suse.com/security/cve/CVE-2014-9660/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9661 page", "url": "https://www.suse.com/security/cve/CVE-2014-9661/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9662 page", "url": "https://www.suse.com/security/cve/CVE-2014-9662/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9663 page", "url": "https://www.suse.com/security/cve/CVE-2014-9663/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9664 page", "url": "https://www.suse.com/security/cve/CVE-2014-9664/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9665 page", "url": "https://www.suse.com/security/cve/CVE-2014-9665/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9666 page", "url": "https://www.suse.com/security/cve/CVE-2014-9666/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9667 page", "url": "https://www.suse.com/security/cve/CVE-2014-9667/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9668 page", "url": "https://www.suse.com/security/cve/CVE-2014-9668/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9669 page", "url": "https://www.suse.com/security/cve/CVE-2014-9669/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9670 page", "url": "https://www.suse.com/security/cve/CVE-2014-9670/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9671 page", "url": "https://www.suse.com/security/cve/CVE-2014-9671/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9672 page", "url": "https://www.suse.com/security/cve/CVE-2014-9672/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9673 page", "url": "https://www.suse.com/security/cve/CVE-2014-9673/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9674 page", "url": "https://www.suse.com/security/cve/CVE-2014-9674/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9675 page", "url": "https://www.suse.com/security/cve/CVE-2014-9675/" } ], "title": "freetype2-devel-2.7-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10438-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "freetype2-devel-2.7-1.1.aarch64", "product": { "name": "freetype2-devel-2.7-1.1.aarch64", "product_id": "freetype2-devel-2.7-1.1.aarch64" } }, { "category": "product_version", "name": "freetype2-devel-32bit-2.7-1.1.aarch64", "product": { "name": "freetype2-devel-32bit-2.7-1.1.aarch64", "product_id": "freetype2-devel-32bit-2.7-1.1.aarch64" } }, { "category": "product_version", "name": "libfreetype6-2.7-1.1.aarch64", "product": { "name": "libfreetype6-2.7-1.1.aarch64", "product_id": "libfreetype6-2.7-1.1.aarch64" } }, { "category": "product_version", "name": "libfreetype6-32bit-2.7-1.1.aarch64", "product": { "name": "libfreetype6-32bit-2.7-1.1.aarch64", "product_id": "libfreetype6-32bit-2.7-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "freetype2-devel-2.7-1.1.ppc64le", "product": { "name": "freetype2-devel-2.7-1.1.ppc64le", "product_id": "freetype2-devel-2.7-1.1.ppc64le" } }, { "category": "product_version", "name": "freetype2-devel-32bit-2.7-1.1.ppc64le", "product": { "name": "freetype2-devel-32bit-2.7-1.1.ppc64le", "product_id": "freetype2-devel-32bit-2.7-1.1.ppc64le" } }, { "category": "product_version", "name": "libfreetype6-2.7-1.1.ppc64le", "product": { "name": "libfreetype6-2.7-1.1.ppc64le", "product_id": "libfreetype6-2.7-1.1.ppc64le" } }, { "category": "product_version", "name": "libfreetype6-32bit-2.7-1.1.ppc64le", "product": { "name": "libfreetype6-32bit-2.7-1.1.ppc64le", "product_id": "libfreetype6-32bit-2.7-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "freetype2-devel-2.7-1.1.s390x", "product": { "name": "freetype2-devel-2.7-1.1.s390x", "product_id": "freetype2-devel-2.7-1.1.s390x" } }, { "category": "product_version", "name": "freetype2-devel-32bit-2.7-1.1.s390x", "product": { "name": "freetype2-devel-32bit-2.7-1.1.s390x", "product_id": "freetype2-devel-32bit-2.7-1.1.s390x" } }, { "category": "product_version", "name": "libfreetype6-2.7-1.1.s390x", "product": { "name": "libfreetype6-2.7-1.1.s390x", "product_id": "libfreetype6-2.7-1.1.s390x" } }, { "category": "product_version", "name": "libfreetype6-32bit-2.7-1.1.s390x", "product": { "name": "libfreetype6-32bit-2.7-1.1.s390x", "product_id": "libfreetype6-32bit-2.7-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype2-devel-2.7-1.1.x86_64", "product": { "name": "freetype2-devel-2.7-1.1.x86_64", "product_id": "freetype2-devel-2.7-1.1.x86_64" } }, { "category": "product_version", "name": "freetype2-devel-32bit-2.7-1.1.x86_64", "product": { "name": "freetype2-devel-32bit-2.7-1.1.x86_64", "product_id": "freetype2-devel-32bit-2.7-1.1.x86_64" } }, { "category": "product_version", "name": "libfreetype6-2.7-1.1.x86_64", "product": { "name": "libfreetype6-2.7-1.1.x86_64", "product_id": "libfreetype6-2.7-1.1.x86_64" } }, { "category": "product_version", "name": "libfreetype6-32bit-2.7-1.1.x86_64", "product": { "name": "libfreetype6-32bit-2.7-1.1.x86_64", "product_id": "libfreetype6-32bit-2.7-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-2.7-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64" }, "product_reference": "freetype2-devel-2.7-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-2.7-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le" }, "product_reference": "freetype2-devel-2.7-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-2.7-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x" }, "product_reference": "freetype2-devel-2.7-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-2.7-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64" }, "product_reference": "freetype2-devel-2.7-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-32bit-2.7-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64" }, "product_reference": "freetype2-devel-32bit-2.7-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-32bit-2.7-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le" }, "product_reference": "freetype2-devel-32bit-2.7-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-32bit-2.7-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x" }, "product_reference": "freetype2-devel-32bit-2.7-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-32bit-2.7-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64" }, "product_reference": "freetype2-devel-32bit-2.7-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-2.7-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64" }, "product_reference": "libfreetype6-2.7-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-2.7-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le" }, "product_reference": "libfreetype6-2.7-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-2.7-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x" }, "product_reference": "libfreetype6-2.7-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-2.7-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64" }, "product_reference": "libfreetype6-2.7-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-32bit-2.7-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64" }, "product_reference": "libfreetype6-32bit-2.7-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-32bit-2.7-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le" }, "product_reference": "libfreetype6-32bit-2.7-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-32bit-2.7-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x" }, "product_reference": "libfreetype6-32bit-2.7-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-32bit-2.7-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" }, "product_reference": "libfreetype6-32bit-2.7-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0946", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-0946" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-0946", "url": "https://www.suse.com/security/cve/CVE-2009-0946" }, { "category": "external", "summary": "SUSE Bug 485889 for CVE-2009-0946", "url": "https://bugzilla.suse.com/485889" }, { "category": "external", "summary": "SUSE Bug 496289 for CVE-2009-0946", "url": "https://bugzilla.suse.com/496289" }, { "category": "external", "summary": "SUSE Bug 541626 for CVE-2009-0946", "url": "https://bugzilla.suse.com/541626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-0946" }, { "cve": "CVE-2010-2497", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2497" } ], "notes": [ { "category": "general", "text": "Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2497", "url": "https://www.suse.com/security/cve/CVE-2010-2497" }, { "category": "external", "summary": "SUSE Bug 619562 for CVE-2010-2497", "url": "https://bugzilla.suse.com/619562" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-2497", "url": "https://bugzilla.suse.com/635692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2497" }, { "cve": "CVE-2010-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2805" } ], "notes": [ { "category": "general", "text": "The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2805", "url": "https://www.suse.com/security/cve/CVE-2010-2805" }, { "category": "external", "summary": "SUSE Bug 629447 for CVE-2010-2805", "url": "https://bugzilla.suse.com/629447" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-2805", "url": "https://bugzilla.suse.com/635692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2805" }, { "cve": "CVE-2010-3053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3053" } ], "notes": [ { "category": "general", "text": "bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3053", "url": "https://www.suse.com/security/cve/CVE-2010-3053" }, { "category": "external", "summary": "SUSE Bug 633938 for CVE-2010-3053", "url": "https://bugzilla.suse.com/633938" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-3053", "url": "https://bugzilla.suse.com/635692" }, { "category": "external", "summary": "SUSE Bug 645982 for CVE-2010-3053", "url": "https://bugzilla.suse.com/645982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3053" }, { "cve": "CVE-2010-3054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3054" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3054", "url": "https://www.suse.com/security/cve/CVE-2010-3054" }, { "category": "external", "summary": "SUSE Bug 633943 for CVE-2010-3054", "url": "https://bugzilla.suse.com/633943" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-3054", "url": "https://bugzilla.suse.com/635692" }, { "category": "external", "summary": "SUSE Bug 645982 for CVE-2010-3054", "url": "https://bugzilla.suse.com/645982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3054" }, { "cve": "CVE-2010-3311", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3311" } ], "notes": [ { "category": "general", "text": "Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an \"input stream position error\" issue, a different vulnerability than CVE-2010-1797.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3311", "url": "https://www.suse.com/security/cve/CVE-2010-3311" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-3311", "url": "https://bugzilla.suse.com/635692" }, { "category": "external", "summary": "SUSE Bug 641580 for CVE-2010-3311", "url": "https://bugzilla.suse.com/641580" }, { "category": "external", "summary": "SUSE Bug 645982 for CVE-2010-3311", "url": "https://bugzilla.suse.com/645982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2010-3311" }, { "cve": "CVE-2010-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3814" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3814", "url": "https://www.suse.com/security/cve/CVE-2010-3814" }, { "category": "external", "summary": "SUSE Bug 647375 for CVE-2010-3814", "url": "https://bugzilla.suse.com/647375" }, { "category": "external", "summary": "SUSE Bug 689174 for CVE-2010-3814", "url": "https://bugzilla.suse.com/689174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3814" }, { "cve": "CVE-2010-3855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3855" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3855", "url": "https://www.suse.com/security/cve/CVE-2010-3855" }, { "category": "external", "summary": "SUSE Bug 647375 for CVE-2010-3855", "url": "https://bugzilla.suse.com/647375" }, { "category": "external", "summary": "SUSE Bug 689174 for CVE-2010-3855", "url": "https://bugzilla.suse.com/689174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3855" }, { "cve": "CVE-2011-0226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0226" } ], "notes": [ { "category": "general", "text": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0226", "url": "https://www.suse.com/security/cve/CVE-2011-0226" }, { "category": "external", "summary": "SUSE Bug 704612 for CVE-2011-0226", "url": "https://bugzilla.suse.com/704612" }, { "category": "external", "summary": "SUSE Bug 728044 for CVE-2011-0226", "url": "https://bugzilla.suse.com/728044" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-0226" }, { "cve": "CVE-2011-3256", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3256" } ], "notes": [ { "category": "general", "text": "FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3256", "url": "https://www.suse.com/security/cve/CVE-2011-3256" }, { "category": "external", "summary": "SUSE Bug 728044 for CVE-2011-3256", "url": "https://bugzilla.suse.com/728044" }, { "category": "external", "summary": "SUSE Bug 730124 for CVE-2011-3256", "url": "https://bugzilla.suse.com/730124" }, { "category": "external", "summary": "SUSE Bug 748083 for CVE-2011-3256", "url": "https://bugzilla.suse.com/748083" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3256" }, { "cve": "CVE-2011-3439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3439" } ], "notes": [ { "category": "general", "text": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3439", "url": "https://www.suse.com/security/cve/CVE-2011-3439" }, { "category": "external", "summary": "SUSE Bug 730124 for CVE-2011-3439", "url": "https://bugzilla.suse.com/730124" }, { "category": "external", "summary": "SUSE Bug 748083 for CVE-2011-3439", "url": "https://bugzilla.suse.com/748083" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3439" }, { "cve": "CVE-2012-1126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1126" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1126", "url": "https://www.suse.com/security/cve/CVE-2012-1126" }, { "category": "external", "summary": "SUSE Bug 750937 for CVE-2012-1126", "url": "https://bugzilla.suse.com/750937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1126" }, { "cve": "CVE-2012-1127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1127" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1127", "url": "https://www.suse.com/security/cve/CVE-2012-1127" }, { "category": "external", "summary": "SUSE Bug 750947 for CVE-2012-1127", "url": "https://bugzilla.suse.com/750947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1127" }, { "cve": "CVE-2012-1128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1128" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1128", "url": "https://www.suse.com/security/cve/CVE-2012-1128" }, { "category": "external", "summary": "SUSE Bug 750942 for CVE-2012-1128", "url": "https://bugzilla.suse.com/750942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1128" }, { "cve": "CVE-2012-1129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1129" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1129", "url": "https://www.suse.com/security/cve/CVE-2012-1129" }, { "category": "external", "summary": "SUSE Bug 750952 for CVE-2012-1129", "url": "https://bugzilla.suse.com/750952" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1129" }, { "cve": "CVE-2012-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1130" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1130", "url": "https://www.suse.com/security/cve/CVE-2012-1130" }, { "category": "external", "summary": "SUSE Bug 750951 for CVE-2012-1130", "url": "https://bugzilla.suse.com/750951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1130" }, { "cve": "CVE-2012-1131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1131" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1131", "url": "https://www.suse.com/security/cve/CVE-2012-1131" }, { "category": "external", "summary": "SUSE Bug 750953 for CVE-2012-1131", "url": "https://bugzilla.suse.com/750953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1131" }, { "cve": "CVE-2012-1132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1132" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1132", "url": "https://www.suse.com/security/cve/CVE-2012-1132" }, { "category": "external", "summary": "SUSE Bug 750950 for CVE-2012-1132", "url": "https://bugzilla.suse.com/750950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1132" }, { "cve": "CVE-2012-1133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1133" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1133", "url": "https://www.suse.com/security/cve/CVE-2012-1133" }, { "category": "external", "summary": "SUSE Bug 750940 for CVE-2012-1133", "url": "https://bugzilla.suse.com/750940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1133" }, { "cve": "CVE-2012-1134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1134" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1134", "url": "https://www.suse.com/security/cve/CVE-2012-1134" }, { "category": "external", "summary": "SUSE Bug 750945 for CVE-2012-1134", "url": "https://bugzilla.suse.com/750945" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1134" }, { "cve": "CVE-2012-1135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1135" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1135", "url": "https://www.suse.com/security/cve/CVE-2012-1135" }, { "category": "external", "summary": "SUSE Bug 750946 for CVE-2012-1135", "url": "https://bugzilla.suse.com/750946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1135" }, { "cve": "CVE-2012-1136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1136" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1136", "url": "https://www.suse.com/security/cve/CVE-2012-1136" }, { "category": "external", "summary": "SUSE Bug 750939 for CVE-2012-1136", "url": "https://bugzilla.suse.com/750939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1136" }, { "cve": "CVE-2012-1137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1137" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1137", "url": "https://www.suse.com/security/cve/CVE-2012-1137" }, { "category": "external", "summary": "SUSE Bug 750943 for CVE-2012-1137", "url": "https://bugzilla.suse.com/750943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1137" }, { "cve": "CVE-2012-1138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1138" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1138", "url": "https://www.suse.com/security/cve/CVE-2012-1138" }, { "category": "external", "summary": "SUSE Bug 750941 for CVE-2012-1138", "url": "https://bugzilla.suse.com/750941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1138" }, { "cve": "CVE-2012-1139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1139" } ], "notes": [ { "category": "general", "text": "Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1139", "url": "https://www.suse.com/security/cve/CVE-2012-1139" }, { "category": "external", "summary": "SUSE Bug 750938 for CVE-2012-1139", "url": "https://bugzilla.suse.com/750938" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1139" }, { "cve": "CVE-2012-1140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1140" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1140", "url": "https://www.suse.com/security/cve/CVE-2012-1140" }, { "category": "external", "summary": "SUSE Bug 750954 for CVE-2012-1140", "url": "https://bugzilla.suse.com/750954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1140" }, { "cve": "CVE-2012-1141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1141" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1141", "url": "https://www.suse.com/security/cve/CVE-2012-1141" }, { "category": "external", "summary": "SUSE Bug 750955 for CVE-2012-1141", "url": "https://bugzilla.suse.com/750955" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1141" }, { "cve": "CVE-2012-1142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1142" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1142", "url": "https://www.suse.com/security/cve/CVE-2012-1142" }, { "category": "external", "summary": "SUSE Bug 750948 for CVE-2012-1142", "url": "https://bugzilla.suse.com/750948" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1142" }, { "cve": "CVE-2012-1143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1143" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1143", "url": "https://www.suse.com/security/cve/CVE-2012-1143" }, { "category": "external", "summary": "SUSE Bug 750949 for CVE-2012-1143", "url": "https://bugzilla.suse.com/750949" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-1143" }, { "cve": "CVE-2012-1144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1144" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1144", "url": "https://www.suse.com/security/cve/CVE-2012-1144" }, { "category": "external", "summary": "SUSE Bug 750944 for CVE-2012-1144", "url": "https://bugzilla.suse.com/750944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1144" }, { "cve": "CVE-2012-5668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5668" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an \"allocation error\" in the bdf_free_font function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5668", "url": "https://www.suse.com/security/cve/CVE-2012-5668" }, { "category": "external", "summary": "SUSE Bug 795826 for CVE-2012-5668", "url": "https://bugzilla.suse.com/795826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5668" }, { "cve": "CVE-2012-5669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5669" } ], "notes": [ { "category": "general", "text": "The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5669", "url": "https://www.suse.com/security/cve/CVE-2012-5669" }, { "category": "external", "summary": "SUSE Bug 795826 for CVE-2012-5669", "url": "https://bugzilla.suse.com/795826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5669" }, { "cve": "CVE-2012-5670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5670" } ], "notes": [ { "category": "general", "text": "The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5670", "url": "https://www.suse.com/security/cve/CVE-2012-5670" }, { "category": "external", "summary": "SUSE Bug 795826 for CVE-2012-5670", "url": "https://bugzilla.suse.com/795826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5670" }, { "cve": "CVE-2014-2240", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2240" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2240", "url": "https://www.suse.com/security/cve/CVE-2014-2240" }, { "category": "external", "summary": "SUSE Bug 867620 for CVE-2014-2240", "url": "https://bugzilla.suse.com/867620" }, { "category": "external", "summary": "SUSE Bug 916867 for CVE-2014-2240", "url": "https://bugzilla.suse.com/916867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-2240" }, { "cve": "CVE-2014-2241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2241" } ], "notes": [ { "category": "general", "text": "The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2241", "url": "https://www.suse.com/security/cve/CVE-2014-2241" }, { "category": "external", "summary": "SUSE Bug 867620 for CVE-2014-2241", "url": "https://bugzilla.suse.com/867620" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-2241" }, { "cve": "CVE-2014-9656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9656" } ], "notes": [ { "category": "general", "text": "The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9656", "url": "https://www.suse.com/security/cve/CVE-2014-9656" }, { "category": "external", "summary": "SUSE Bug 916847 for CVE-2014-9656", "url": "https://bugzilla.suse.com/916847" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9656" }, { "cve": "CVE-2014-9657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9657" } ], "notes": [ { "category": "general", "text": "The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9657", "url": "https://www.suse.com/security/cve/CVE-2014-9657" }, { "category": "external", "summary": "SUSE Bug 916856 for CVE-2014-9657", "url": "https://bugzilla.suse.com/916856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9657" }, { "cve": "CVE-2014-9658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9658" } ], "notes": [ { "category": "general", "text": "The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9658", "url": "https://www.suse.com/security/cve/CVE-2014-9658" }, { "category": "external", "summary": "SUSE Bug 916857 for CVE-2014-9658", "url": "https://bugzilla.suse.com/916857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9658" }, { "cve": "CVE-2014-9659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9659" } ], "notes": [ { "category": "general", "text": "cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9659", "url": "https://www.suse.com/security/cve/CVE-2014-9659" }, { "category": "external", "summary": "SUSE Bug 916867 for CVE-2014-9659", "url": "https://bugzilla.suse.com/916867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9659" }, { "cve": "CVE-2014-9660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9660" } ], "notes": [ { "category": "general", "text": "The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9660", "url": "https://www.suse.com/security/cve/CVE-2014-9660" }, { "category": "external", "summary": "SUSE Bug 916858 for CVE-2014-9660", "url": "https://bugzilla.suse.com/916858" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9660" }, { "cve": "CVE-2014-9661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9661" } ], "notes": [ { "category": "general", "text": "type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9661", "url": "https://www.suse.com/security/cve/CVE-2014-9661" }, { "category": "external", "summary": "SUSE Bug 916859 for CVE-2014-9661", "url": "https://bugzilla.suse.com/916859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9661" }, { "cve": "CVE-2014-9662", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9662" } ], "notes": [ { "category": "general", "text": "cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9662", "url": "https://www.suse.com/security/cve/CVE-2014-9662" }, { "category": "external", "summary": "SUSE Bug 916860 for CVE-2014-9662", "url": "https://bugzilla.suse.com/916860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9662" }, { "cve": "CVE-2014-9663", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9663" } ], "notes": [ { "category": "general", "text": "The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field\u0027s value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9663", "url": "https://www.suse.com/security/cve/CVE-2014-9663" }, { "category": "external", "summary": "SUSE Bug 916865 for CVE-2014-9663", "url": "https://bugzilla.suse.com/916865" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9663" }, { "cve": "CVE-2014-9664", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9664" } ], "notes": [ { "category": "general", "text": "FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9664", "url": "https://www.suse.com/security/cve/CVE-2014-9664" }, { "category": "external", "summary": "SUSE Bug 916864 for CVE-2014-9664", "url": "https://bugzilla.suse.com/916864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9664" }, { "cve": "CVE-2014-9665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9665" } ], "notes": [ { "category": "general", "text": "The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9665", "url": "https://www.suse.com/security/cve/CVE-2014-9665" }, { "category": "external", "summary": "SUSE Bug 916863 for CVE-2014-9665", "url": "https://bugzilla.suse.com/916863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9665" }, { "cve": "CVE-2014-9666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9666" } ], "notes": [ { "category": "general", "text": "The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9666", "url": "https://www.suse.com/security/cve/CVE-2014-9666" }, { "category": "external", "summary": "SUSE Bug 916862 for CVE-2014-9666", "url": "https://bugzilla.suse.com/916862" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9666" }, { "cve": "CVE-2014-9667", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9667" } ], "notes": [ { "category": "general", "text": "sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9667", "url": "https://www.suse.com/security/cve/CVE-2014-9667" }, { "category": "external", "summary": "SUSE Bug 916861 for CVE-2014-9667", "url": "https://bugzilla.suse.com/916861" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9667" }, { "cve": "CVE-2014-9668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9668" } ], "notes": [ { "category": "general", "text": "The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9668", "url": "https://www.suse.com/security/cve/CVE-2014-9668" }, { "category": "external", "summary": "SUSE Bug 916868 for CVE-2014-9668", "url": "https://bugzilla.suse.com/916868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9668" }, { "cve": "CVE-2014-9669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9669" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9669", "url": "https://www.suse.com/security/cve/CVE-2014-9669" }, { "category": "external", "summary": "SUSE Bug 916870 for CVE-2014-9669", "url": "https://bugzilla.suse.com/916870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9669" }, { "cve": "CVE-2014-9670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9670" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9670", "url": "https://www.suse.com/security/cve/CVE-2014-9670" }, { "category": "external", "summary": "SUSE Bug 916871 for CVE-2014-9670", "url": "https://bugzilla.suse.com/916871" }, { "category": "external", "summary": "SUSE Bug 933247 for CVE-2014-9670", "url": "https://bugzilla.suse.com/933247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9670" }, { "cve": "CVE-2014-9671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9671" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9671", "url": "https://www.suse.com/security/cve/CVE-2014-9671" }, { "category": "external", "summary": "SUSE Bug 916872 for CVE-2014-9671", "url": "https://bugzilla.suse.com/916872" }, { "category": "external", "summary": "SUSE Bug 933247 for CVE-2014-9671", "url": "https://bugzilla.suse.com/933247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9671" }, { "cve": "CVE-2014-9672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9672" } ], "notes": [ { "category": "general", "text": "Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9672", "url": "https://www.suse.com/security/cve/CVE-2014-9672" }, { "category": "external", "summary": "SUSE Bug 916873 for CVE-2014-9672", "url": "https://bugzilla.suse.com/916873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9672" }, { "cve": "CVE-2014-9673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9673" } ], "notes": [ { "category": "general", "text": "Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9673", "url": "https://www.suse.com/security/cve/CVE-2014-9673" }, { "category": "external", "summary": "SUSE Bug 916874 for CVE-2014-9673", "url": "https://bugzilla.suse.com/916874" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9673" }, { "cve": "CVE-2014-9674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9674" } ], "notes": [ { "category": "general", "text": "The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9674", "url": "https://www.suse.com/security/cve/CVE-2014-9674" }, { "category": "external", "summary": "SUSE Bug 916879 for CVE-2014-9674", "url": "https://bugzilla.suse.com/916879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9674" }, { "cve": "CVE-2014-9675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9675" } ], "notes": [ { "category": "general", "text": "bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9675", "url": "https://www.suse.com/security/cve/CVE-2014-9675" }, { "category": "external", "summary": "SUSE Bug 916881 for CVE-2014-9675", "url": "https://bugzilla.suse.com/916881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9675" } ] }
ghsa-g6wc-2mxr-5w42
Vulnerability from github
FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.
{ "affected": [], "aliases": [ "CVE-2011-3439" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-11-11T18:55:00Z", "severity": "HIGH" }, "details": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "id": "GHSA-g6wc-2mxr-5w42", "modified": "2022-05-13T01:09:13Z", "published": "2022-05-13T01:09:13Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3439" }, { "type": "WEB", "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/46921" }, { "type": "WEB", "url": "http://secunia.com/advisories/48951" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5052" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.