Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-0946 (GCVE-0-2009-0946)
Vulnerability from cvelistv5
Published
2009-04-17 00:00
Modified
2024-08-07 04:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:17.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34967", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34967" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3639" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "34913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34913" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e" }, { "name": "ADV-2009-1621", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "34550", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34550" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "MDVSA-2009:243", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:243" }, { "name": "APPLE-SA-2009-06-08-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "USN-767-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-767-1" }, { "name": "270268", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1" }, { "name": "35198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35198" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35074" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5" }, { "name": "ADV-2009-1522", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "RHSA-2009:1062", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html" }, { "name": "APPLE-SA-2009-06-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "35065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35065" }, { "name": "DSA-1784", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1784" }, { "name": "35210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35210" }, { "name": "GLSA-200905-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200905-05.xml" }, { "name": "35379", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35379" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "name": "oval:org.mitre.oval:def:10149", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog" }, { "name": "SUSE-SR:2009:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "35200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35200" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3613" }, { "name": "RHSA-2009:0329", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "name": "ADV-2009-1058", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1058" }, { "name": "35204", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35204" }, { "name": "34723", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34723" }, { "name": "RHSA-2009:1061", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1061.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34967", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34967" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3639" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "34913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34913" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e" }, { "name": "ADV-2009-1621", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "34550", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34550" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "MDVSA-2009:243", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:243" }, { "name": "APPLE-SA-2009-06-08-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "USN-767-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-767-1" }, { "name": "270268", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1" }, { "name": "35198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35198" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35074" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5" }, { "name": "ADV-2009-1522", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "RHSA-2009:1062", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html" }, { "name": "APPLE-SA-2009-06-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "35065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35065" }, { "name": "DSA-1784", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1784" }, { "name": "35210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35210" }, { "name": "GLSA-200905-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200905-05.xml" }, { "name": "35379", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35379" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "name": "oval:org.mitre.oval:def:10149", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog" }, { "name": "SUSE-SR:2009:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "35200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35200" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3613" }, { "name": "RHSA-2009:0329", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "name": "ADV-2009-1058", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1058" }, { "name": "35204", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35204" }, { "name": "34723", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34723" }, { "name": "RHSA-2009:1061", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1061.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0946", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34967", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34967" }, { "name": "http://support.apple.com/kb/HT3639", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3639" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4435" }, { "name": "34913", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34913" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e" }, { "name": "ADV-2009-1621", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "34550", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34550" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3549" }, { "name": "MDVSA-2009:243", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:243" }, { "name": "APPLE-SA-2009-06-08-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "USN-767-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-767-1" }, { "name": "270268", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1" }, { "name": "35198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35198" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b" }, { "name": "35074", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35074" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5" }, { "name": "ADV-2009-1522", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "RHSA-2009:1062", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html" }, { "name": "APPLE-SA-2009-06-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "35065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35065" }, { "name": "DSA-1784", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1784" }, { "name": "35210", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35210" }, { "name": "GLSA-200905-05", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200905-05.xml" }, { "name": "35379", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35379" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=491384", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "name": "oval:org.mitre.oval:def:10149", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog" }, { "name": "SUSE-SR:2009:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" }, { "name": "TA09-133A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "35200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35200" }, { "name": "http://support.apple.com/kb/HT3613", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3613" }, { "name": "RHSA-2009:0329", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "name": "ADV-2009-1058", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1058" }, { "name": "35204", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35204" }, { "name": "34723", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34723" }, { "name": "RHSA-2009:1061", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1061.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0946", "datePublished": "2009-04-17T00:00:00", "dateReserved": "2009-03-18T00:00:00", "dateUpdated": "2024-08-07T04:57:17.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-0946\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-04-17T00:30:00.250\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de entero en FreeType v2.3.9 y anteriores permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores relacionados con valores grandes en ciertas entradas en (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, y (3) cff/cffload.c.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.3.9\",\"matchCriteriaId\":\"7039ABA3-F36E-4337-8F61-470B2FA1C9EF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B68DF-1440-4587-8458-9C5F4D1E43F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B42AB65-443B-4655-BAEA-4EB4A43D9509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"38C3AEB0-59E2-400A-8943-60C0A223B680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F13F07CC-739B-465C-9184-0E9D708BD4C7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BDA6DB4-A0DA-43CA-AABD-10EEEEB28EAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndIncluding\":\"2.2.1\",\"matchCriteriaId\":\"614C28E3-3645-4B20-95E5-42E7F123ADDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.6.0\",\"versionEndIncluding\":\"10.6.4\",\"matchCriteriaId\":\"C6DA1D55-B689-47CF-A55F-3C16DA4EFFFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE39585-CF3B-4493-96D8-B394544C7643\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1335E35A-D381-4056-9E78-37BC6DF8AD98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.6.0\",\"versionEndIncluding\":\"10.6.4\",\"matchCriteriaId\":\"924AFEE6-E331-4E10-B1B8-1FF1FF801120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09D5933-A7D9-4A61-B863-CD8E7D5E67D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B4CD59-9F37-4EF0-BA43-427CFD6E1329\"}]}]}],\"references\":[{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34723\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34913\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34967\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35065\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35198\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35200\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35204\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35210\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35379\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200905-05.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3613\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3639\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4435\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1784\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:243\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0329.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1061.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1062.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34550\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-767-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1058\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1522\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1621\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=491384\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34913\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34967\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35204\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200905-05.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3613\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3639\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4435\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1784\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:243\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0329.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1061.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1062.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34550\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-767-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1522\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1621\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=491384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
opensuse-su-2024:10172-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ft2demos-2.7-1.1 on GA media
Notes
Title of the patch
ft2demos-2.7-1.1 on GA media
Description of the patch
These are all security issues fixed in the ft2demos-2.7-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10172
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ft2demos-2.7-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ft2demos-2.7-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10172", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10172-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-0946 page", "url": "https://www.suse.com/security/cve/CVE-2009-0946/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2497 page", "url": "https://www.suse.com/security/cve/CVE-2010-2497/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2805 page", "url": "https://www.suse.com/security/cve/CVE-2010-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3053 page", "url": "https://www.suse.com/security/cve/CVE-2010-3053/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3054 page", "url": "https://www.suse.com/security/cve/CVE-2010-3054/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3311 page", "url": "https://www.suse.com/security/cve/CVE-2010-3311/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3814 page", "url": "https://www.suse.com/security/cve/CVE-2010-3814/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0226 page", "url": "https://www.suse.com/security/cve/CVE-2011-0226/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5668 page", "url": "https://www.suse.com/security/cve/CVE-2012-5668/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5669 page", "url": "https://www.suse.com/security/cve/CVE-2012-5669/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5670 page", "url": "https://www.suse.com/security/cve/CVE-2012-5670/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2240 page", "url": "https://www.suse.com/security/cve/CVE-2014-2240/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9656 page", "url": "https://www.suse.com/security/cve/CVE-2014-9656/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9657 page", "url": "https://www.suse.com/security/cve/CVE-2014-9657/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9658 page", "url": "https://www.suse.com/security/cve/CVE-2014-9658/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9659 page", "url": "https://www.suse.com/security/cve/CVE-2014-9659/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9660 page", "url": "https://www.suse.com/security/cve/CVE-2014-9660/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9661 page", "url": "https://www.suse.com/security/cve/CVE-2014-9661/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9662 page", "url": "https://www.suse.com/security/cve/CVE-2014-9662/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9663 page", "url": "https://www.suse.com/security/cve/CVE-2014-9663/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9664 page", "url": "https://www.suse.com/security/cve/CVE-2014-9664/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9665 page", "url": "https://www.suse.com/security/cve/CVE-2014-9665/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9666 page", "url": "https://www.suse.com/security/cve/CVE-2014-9666/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9667 page", "url": "https://www.suse.com/security/cve/CVE-2014-9667/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9668 page", "url": "https://www.suse.com/security/cve/CVE-2014-9668/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9669 page", "url": "https://www.suse.com/security/cve/CVE-2014-9669/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9670 page", "url": "https://www.suse.com/security/cve/CVE-2014-9670/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9671 page", "url": "https://www.suse.com/security/cve/CVE-2014-9671/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9672 page", "url": "https://www.suse.com/security/cve/CVE-2014-9672/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9673 page", "url": "https://www.suse.com/security/cve/CVE-2014-9673/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9674 page", "url": "https://www.suse.com/security/cve/CVE-2014-9674/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9675 page", "url": "https://www.suse.com/security/cve/CVE-2014-9675/" } ], "title": "ft2demos-2.7-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10172-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ft2demos-2.7-1.1.aarch64", "product": { "name": "ft2demos-2.7-1.1.aarch64", "product_id": "ft2demos-2.7-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ft2demos-2.7-1.1.ppc64le", "product": { "name": "ft2demos-2.7-1.1.ppc64le", "product_id": "ft2demos-2.7-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ft2demos-2.7-1.1.s390x", "product": { "name": "ft2demos-2.7-1.1.s390x", "product_id": "ft2demos-2.7-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ft2demos-2.7-1.1.x86_64", "product": { "name": "ft2demos-2.7-1.1.x86_64", "product_id": "ft2demos-2.7-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ft2demos-2.7-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64" }, "product_reference": "ft2demos-2.7-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ft2demos-2.7-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le" }, "product_reference": "ft2demos-2.7-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ft2demos-2.7-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x" }, "product_reference": "ft2demos-2.7-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ft2demos-2.7-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" }, "product_reference": "ft2demos-2.7-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0946", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-0946" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-0946", "url": "https://www.suse.com/security/cve/CVE-2009-0946" }, { "category": "external", "summary": "SUSE Bug 485889 for CVE-2009-0946", "url": "https://bugzilla.suse.com/485889" }, { "category": "external", "summary": "SUSE Bug 496289 for CVE-2009-0946", "url": "https://bugzilla.suse.com/496289" }, { "category": "external", "summary": "SUSE Bug 541626 for CVE-2009-0946", "url": "https://bugzilla.suse.com/541626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-0946" }, { "cve": "CVE-2010-2497", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2497" } ], "notes": [ { "category": "general", "text": "Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2497", "url": "https://www.suse.com/security/cve/CVE-2010-2497" }, { "category": "external", "summary": "SUSE Bug 619562 for CVE-2010-2497", "url": "https://bugzilla.suse.com/619562" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-2497", "url": "https://bugzilla.suse.com/635692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2497" }, { "cve": "CVE-2010-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2805" } ], "notes": [ { "category": "general", "text": "The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2805", "url": "https://www.suse.com/security/cve/CVE-2010-2805" }, { "category": "external", "summary": "SUSE Bug 629447 for CVE-2010-2805", "url": "https://bugzilla.suse.com/629447" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-2805", "url": "https://bugzilla.suse.com/635692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2805" }, { "cve": "CVE-2010-3053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3053" } ], "notes": [ { "category": "general", "text": "bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3053", "url": "https://www.suse.com/security/cve/CVE-2010-3053" }, { "category": "external", "summary": "SUSE Bug 633938 for CVE-2010-3053", "url": "https://bugzilla.suse.com/633938" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-3053", "url": "https://bugzilla.suse.com/635692" }, { "category": "external", "summary": "SUSE Bug 645982 for CVE-2010-3053", "url": "https://bugzilla.suse.com/645982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3053" }, { "cve": "CVE-2010-3054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3054" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3054", "url": "https://www.suse.com/security/cve/CVE-2010-3054" }, { "category": "external", "summary": "SUSE Bug 633943 for CVE-2010-3054", "url": "https://bugzilla.suse.com/633943" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-3054", "url": "https://bugzilla.suse.com/635692" }, { "category": "external", "summary": "SUSE Bug 645982 for CVE-2010-3054", "url": "https://bugzilla.suse.com/645982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3054" }, { "cve": "CVE-2010-3311", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3311" } ], "notes": [ { "category": "general", "text": "Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an \"input stream position error\" issue, a different vulnerability than CVE-2010-1797.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3311", "url": "https://www.suse.com/security/cve/CVE-2010-3311" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-3311", "url": "https://bugzilla.suse.com/635692" }, { "category": "external", "summary": "SUSE Bug 641580 for CVE-2010-3311", "url": "https://bugzilla.suse.com/641580" }, { "category": "external", "summary": "SUSE Bug 645982 for CVE-2010-3311", "url": "https://bugzilla.suse.com/645982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2010-3311" }, { "cve": "CVE-2010-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3814" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3814", "url": "https://www.suse.com/security/cve/CVE-2010-3814" }, { "category": "external", "summary": "SUSE Bug 647375 for CVE-2010-3814", "url": "https://bugzilla.suse.com/647375" }, { "category": "external", "summary": "SUSE Bug 689174 for CVE-2010-3814", "url": "https://bugzilla.suse.com/689174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3814" }, { "cve": "CVE-2011-0226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0226" } ], "notes": [ { "category": "general", "text": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0226", "url": "https://www.suse.com/security/cve/CVE-2011-0226" }, { "category": "external", "summary": "SUSE Bug 704612 for CVE-2011-0226", "url": "https://bugzilla.suse.com/704612" }, { "category": "external", "summary": "SUSE Bug 728044 for CVE-2011-0226", "url": "https://bugzilla.suse.com/728044" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-0226" }, { "cve": "CVE-2012-5668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5668" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an \"allocation error\" in the bdf_free_font function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5668", "url": "https://www.suse.com/security/cve/CVE-2012-5668" }, { "category": "external", "summary": "SUSE Bug 795826 for CVE-2012-5668", "url": "https://bugzilla.suse.com/795826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5668" }, { "cve": "CVE-2012-5669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5669" } ], "notes": [ { "category": "general", "text": "The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5669", "url": "https://www.suse.com/security/cve/CVE-2012-5669" }, { "category": "external", "summary": "SUSE Bug 795826 for CVE-2012-5669", "url": "https://bugzilla.suse.com/795826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5669" }, { "cve": "CVE-2012-5670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5670" } ], "notes": [ { "category": "general", "text": "The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5670", "url": "https://www.suse.com/security/cve/CVE-2012-5670" }, { "category": "external", "summary": "SUSE Bug 795826 for CVE-2012-5670", "url": "https://bugzilla.suse.com/795826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5670" }, { "cve": "CVE-2014-2240", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2240" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2240", "url": "https://www.suse.com/security/cve/CVE-2014-2240" }, { "category": "external", "summary": "SUSE Bug 867620 for CVE-2014-2240", "url": "https://bugzilla.suse.com/867620" }, { "category": "external", "summary": "SUSE Bug 916867 for CVE-2014-2240", "url": "https://bugzilla.suse.com/916867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-2240" }, { "cve": "CVE-2014-9656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9656" } ], "notes": [ { "category": "general", "text": "The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9656", "url": "https://www.suse.com/security/cve/CVE-2014-9656" }, { "category": "external", "summary": "SUSE Bug 916847 for CVE-2014-9656", "url": "https://bugzilla.suse.com/916847" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9656" }, { "cve": "CVE-2014-9657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9657" } ], "notes": [ { "category": "general", "text": "The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9657", "url": "https://www.suse.com/security/cve/CVE-2014-9657" }, { "category": "external", "summary": "SUSE Bug 916856 for CVE-2014-9657", "url": "https://bugzilla.suse.com/916856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9657" }, { "cve": "CVE-2014-9658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9658" } ], "notes": [ { "category": "general", "text": "The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9658", "url": "https://www.suse.com/security/cve/CVE-2014-9658" }, { "category": "external", "summary": "SUSE Bug 916857 for CVE-2014-9658", "url": "https://bugzilla.suse.com/916857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9658" }, { "cve": "CVE-2014-9659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9659" } ], "notes": [ { "category": "general", "text": "cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9659", "url": "https://www.suse.com/security/cve/CVE-2014-9659" }, { "category": "external", "summary": "SUSE Bug 916867 for CVE-2014-9659", "url": "https://bugzilla.suse.com/916867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9659" }, { "cve": "CVE-2014-9660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9660" } ], "notes": [ { "category": "general", "text": "The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9660", "url": "https://www.suse.com/security/cve/CVE-2014-9660" }, { "category": "external", "summary": "SUSE Bug 916858 for CVE-2014-9660", "url": "https://bugzilla.suse.com/916858" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9660" }, { "cve": "CVE-2014-9661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9661" } ], "notes": [ { "category": "general", "text": "type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9661", "url": "https://www.suse.com/security/cve/CVE-2014-9661" }, { "category": "external", "summary": "SUSE Bug 916859 for CVE-2014-9661", "url": "https://bugzilla.suse.com/916859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9661" }, { "cve": "CVE-2014-9662", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9662" } ], "notes": [ { "category": "general", "text": "cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9662", "url": "https://www.suse.com/security/cve/CVE-2014-9662" }, { "category": "external", "summary": "SUSE Bug 916860 for CVE-2014-9662", "url": "https://bugzilla.suse.com/916860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9662" }, { "cve": "CVE-2014-9663", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9663" } ], "notes": [ { "category": "general", "text": "The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field\u0027s value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9663", "url": "https://www.suse.com/security/cve/CVE-2014-9663" }, { "category": "external", "summary": "SUSE Bug 916865 for CVE-2014-9663", "url": "https://bugzilla.suse.com/916865" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9663" }, { "cve": "CVE-2014-9664", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9664" } ], "notes": [ { "category": "general", "text": "FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9664", "url": "https://www.suse.com/security/cve/CVE-2014-9664" }, { "category": "external", "summary": "SUSE Bug 916864 for CVE-2014-9664", "url": "https://bugzilla.suse.com/916864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9664" }, { "cve": "CVE-2014-9665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9665" } ], "notes": [ { "category": "general", "text": "The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9665", "url": "https://www.suse.com/security/cve/CVE-2014-9665" }, { "category": "external", "summary": "SUSE Bug 916863 for CVE-2014-9665", "url": "https://bugzilla.suse.com/916863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9665" }, { "cve": "CVE-2014-9666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9666" } ], "notes": [ { "category": "general", "text": "The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9666", "url": "https://www.suse.com/security/cve/CVE-2014-9666" }, { "category": "external", "summary": "SUSE Bug 916862 for CVE-2014-9666", "url": "https://bugzilla.suse.com/916862" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9666" }, { "cve": "CVE-2014-9667", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9667" } ], "notes": [ { "category": "general", "text": "sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9667", "url": "https://www.suse.com/security/cve/CVE-2014-9667" }, { "category": "external", "summary": "SUSE Bug 916861 for CVE-2014-9667", "url": "https://bugzilla.suse.com/916861" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9667" }, { "cve": "CVE-2014-9668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9668" } ], "notes": [ { "category": "general", "text": "The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9668", "url": "https://www.suse.com/security/cve/CVE-2014-9668" }, { "category": "external", "summary": "SUSE Bug 916868 for CVE-2014-9668", "url": "https://bugzilla.suse.com/916868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9668" }, { "cve": "CVE-2014-9669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9669" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9669", "url": "https://www.suse.com/security/cve/CVE-2014-9669" }, { "category": "external", "summary": "SUSE Bug 916870 for CVE-2014-9669", "url": "https://bugzilla.suse.com/916870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9669" }, { "cve": "CVE-2014-9670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9670" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9670", "url": "https://www.suse.com/security/cve/CVE-2014-9670" }, { "category": "external", "summary": "SUSE Bug 916871 for CVE-2014-9670", "url": "https://bugzilla.suse.com/916871" }, { "category": "external", "summary": "SUSE Bug 933247 for CVE-2014-9670", "url": "https://bugzilla.suse.com/933247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9670" }, { "cve": "CVE-2014-9671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9671" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9671", "url": "https://www.suse.com/security/cve/CVE-2014-9671" }, { "category": "external", "summary": "SUSE Bug 916872 for CVE-2014-9671", "url": "https://bugzilla.suse.com/916872" }, { "category": "external", "summary": "SUSE Bug 933247 for CVE-2014-9671", "url": "https://bugzilla.suse.com/933247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9671" }, { "cve": "CVE-2014-9672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9672" } ], "notes": [ { "category": "general", "text": "Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9672", "url": "https://www.suse.com/security/cve/CVE-2014-9672" }, { "category": "external", "summary": "SUSE Bug 916873 for CVE-2014-9672", "url": "https://bugzilla.suse.com/916873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9672" }, { "cve": "CVE-2014-9673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9673" } ], "notes": [ { "category": "general", "text": "Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9673", "url": "https://www.suse.com/security/cve/CVE-2014-9673" }, { "category": "external", "summary": "SUSE Bug 916874 for CVE-2014-9673", "url": "https://bugzilla.suse.com/916874" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9673" }, { "cve": "CVE-2014-9674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9674" } ], "notes": [ { "category": "general", "text": "The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9674", "url": "https://www.suse.com/security/cve/CVE-2014-9674" }, { "category": "external", "summary": "SUSE Bug 916879 for CVE-2014-9674", "url": "https://bugzilla.suse.com/916879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9674" }, { "cve": "CVE-2014-9675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9675" } ], "notes": [ { "category": "general", "text": "bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9675", "url": "https://www.suse.com/security/cve/CVE-2014-9675" }, { "category": "external", "summary": "SUSE Bug 916881 for CVE-2014-9675", "url": "https://bugzilla.suse.com/916881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ft2demos-2.7-1.1.aarch64", "openSUSE Tumbleweed:ft2demos-2.7-1.1.ppc64le", "openSUSE Tumbleweed:ft2demos-2.7-1.1.s390x", "openSUSE Tumbleweed:ft2demos-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9675" } ] }
opensuse-su-2024:10438-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
freetype2-devel-2.7-1.1 on GA media
Notes
Title of the patch
freetype2-devel-2.7-1.1 on GA media
Description of the patch
These are all security issues fixed in the freetype2-devel-2.7-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10438
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "freetype2-devel-2.7-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the freetype2-devel-2.7-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10438", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10438-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-0946 page", "url": "https://www.suse.com/security/cve/CVE-2009-0946/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2497 page", "url": "https://www.suse.com/security/cve/CVE-2010-2497/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2805 page", "url": "https://www.suse.com/security/cve/CVE-2010-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3053 page", "url": "https://www.suse.com/security/cve/CVE-2010-3053/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3054 page", "url": "https://www.suse.com/security/cve/CVE-2010-3054/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3311 page", "url": "https://www.suse.com/security/cve/CVE-2010-3311/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3814 page", "url": "https://www.suse.com/security/cve/CVE-2010-3814/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3855 page", "url": "https://www.suse.com/security/cve/CVE-2010-3855/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0226 page", "url": "https://www.suse.com/security/cve/CVE-2011-0226/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3256 page", "url": "https://www.suse.com/security/cve/CVE-2011-3256/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3439 page", "url": "https://www.suse.com/security/cve/CVE-2011-3439/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1126 page", "url": "https://www.suse.com/security/cve/CVE-2012-1126/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1127 page", "url": "https://www.suse.com/security/cve/CVE-2012-1127/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1128 page", "url": "https://www.suse.com/security/cve/CVE-2012-1128/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1129 page", "url": "https://www.suse.com/security/cve/CVE-2012-1129/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1130 page", "url": "https://www.suse.com/security/cve/CVE-2012-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1131 page", "url": "https://www.suse.com/security/cve/CVE-2012-1131/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1132 page", "url": "https://www.suse.com/security/cve/CVE-2012-1132/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1133 page", "url": "https://www.suse.com/security/cve/CVE-2012-1133/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1134 page", "url": "https://www.suse.com/security/cve/CVE-2012-1134/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1135 page", "url": "https://www.suse.com/security/cve/CVE-2012-1135/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1136 page", "url": "https://www.suse.com/security/cve/CVE-2012-1136/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1137 page", "url": "https://www.suse.com/security/cve/CVE-2012-1137/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1138 page", "url": "https://www.suse.com/security/cve/CVE-2012-1138/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1139 page", "url": "https://www.suse.com/security/cve/CVE-2012-1139/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1140 page", "url": "https://www.suse.com/security/cve/CVE-2012-1140/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1141 page", "url": "https://www.suse.com/security/cve/CVE-2012-1141/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1142 page", "url": "https://www.suse.com/security/cve/CVE-2012-1142/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1143 page", "url": "https://www.suse.com/security/cve/CVE-2012-1143/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1144 page", "url": "https://www.suse.com/security/cve/CVE-2012-1144/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5668 page", "url": "https://www.suse.com/security/cve/CVE-2012-5668/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5669 page", "url": "https://www.suse.com/security/cve/CVE-2012-5669/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-5670 page", "url": "https://www.suse.com/security/cve/CVE-2012-5670/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2240 page", "url": "https://www.suse.com/security/cve/CVE-2014-2240/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2241 page", "url": "https://www.suse.com/security/cve/CVE-2014-2241/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9656 page", "url": "https://www.suse.com/security/cve/CVE-2014-9656/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9657 page", "url": "https://www.suse.com/security/cve/CVE-2014-9657/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9658 page", "url": "https://www.suse.com/security/cve/CVE-2014-9658/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9659 page", "url": "https://www.suse.com/security/cve/CVE-2014-9659/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9660 page", "url": "https://www.suse.com/security/cve/CVE-2014-9660/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9661 page", "url": "https://www.suse.com/security/cve/CVE-2014-9661/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9662 page", "url": "https://www.suse.com/security/cve/CVE-2014-9662/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9663 page", "url": "https://www.suse.com/security/cve/CVE-2014-9663/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9664 page", "url": "https://www.suse.com/security/cve/CVE-2014-9664/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9665 page", "url": "https://www.suse.com/security/cve/CVE-2014-9665/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9666 page", "url": "https://www.suse.com/security/cve/CVE-2014-9666/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9667 page", "url": "https://www.suse.com/security/cve/CVE-2014-9667/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9668 page", "url": "https://www.suse.com/security/cve/CVE-2014-9668/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9669 page", "url": "https://www.suse.com/security/cve/CVE-2014-9669/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9670 page", "url": "https://www.suse.com/security/cve/CVE-2014-9670/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9671 page", "url": "https://www.suse.com/security/cve/CVE-2014-9671/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9672 page", "url": "https://www.suse.com/security/cve/CVE-2014-9672/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9673 page", "url": "https://www.suse.com/security/cve/CVE-2014-9673/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9674 page", "url": "https://www.suse.com/security/cve/CVE-2014-9674/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9675 page", "url": "https://www.suse.com/security/cve/CVE-2014-9675/" } ], "title": "freetype2-devel-2.7-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10438-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "freetype2-devel-2.7-1.1.aarch64", "product": { "name": "freetype2-devel-2.7-1.1.aarch64", "product_id": "freetype2-devel-2.7-1.1.aarch64" } }, { "category": "product_version", "name": "freetype2-devel-32bit-2.7-1.1.aarch64", "product": { "name": "freetype2-devel-32bit-2.7-1.1.aarch64", "product_id": "freetype2-devel-32bit-2.7-1.1.aarch64" } }, { "category": "product_version", "name": "libfreetype6-2.7-1.1.aarch64", "product": { "name": "libfreetype6-2.7-1.1.aarch64", "product_id": "libfreetype6-2.7-1.1.aarch64" } }, { "category": "product_version", "name": "libfreetype6-32bit-2.7-1.1.aarch64", "product": { "name": "libfreetype6-32bit-2.7-1.1.aarch64", "product_id": "libfreetype6-32bit-2.7-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "freetype2-devel-2.7-1.1.ppc64le", "product": { "name": "freetype2-devel-2.7-1.1.ppc64le", "product_id": "freetype2-devel-2.7-1.1.ppc64le" } }, { "category": "product_version", "name": "freetype2-devel-32bit-2.7-1.1.ppc64le", "product": { "name": "freetype2-devel-32bit-2.7-1.1.ppc64le", "product_id": "freetype2-devel-32bit-2.7-1.1.ppc64le" } }, { "category": "product_version", "name": "libfreetype6-2.7-1.1.ppc64le", "product": { "name": "libfreetype6-2.7-1.1.ppc64le", "product_id": "libfreetype6-2.7-1.1.ppc64le" } }, { "category": "product_version", "name": "libfreetype6-32bit-2.7-1.1.ppc64le", "product": { "name": "libfreetype6-32bit-2.7-1.1.ppc64le", "product_id": "libfreetype6-32bit-2.7-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "freetype2-devel-2.7-1.1.s390x", "product": { "name": "freetype2-devel-2.7-1.1.s390x", "product_id": "freetype2-devel-2.7-1.1.s390x" } }, { "category": "product_version", "name": "freetype2-devel-32bit-2.7-1.1.s390x", "product": { "name": "freetype2-devel-32bit-2.7-1.1.s390x", "product_id": "freetype2-devel-32bit-2.7-1.1.s390x" } }, { "category": "product_version", "name": "libfreetype6-2.7-1.1.s390x", "product": { "name": "libfreetype6-2.7-1.1.s390x", "product_id": "libfreetype6-2.7-1.1.s390x" } }, { "category": "product_version", "name": "libfreetype6-32bit-2.7-1.1.s390x", "product": { "name": "libfreetype6-32bit-2.7-1.1.s390x", "product_id": "libfreetype6-32bit-2.7-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype2-devel-2.7-1.1.x86_64", "product": { "name": "freetype2-devel-2.7-1.1.x86_64", "product_id": "freetype2-devel-2.7-1.1.x86_64" } }, { "category": "product_version", "name": "freetype2-devel-32bit-2.7-1.1.x86_64", "product": { "name": "freetype2-devel-32bit-2.7-1.1.x86_64", "product_id": "freetype2-devel-32bit-2.7-1.1.x86_64" } }, { "category": "product_version", "name": "libfreetype6-2.7-1.1.x86_64", "product": { "name": "libfreetype6-2.7-1.1.x86_64", "product_id": "libfreetype6-2.7-1.1.x86_64" } }, { "category": "product_version", "name": "libfreetype6-32bit-2.7-1.1.x86_64", "product": { "name": "libfreetype6-32bit-2.7-1.1.x86_64", "product_id": "libfreetype6-32bit-2.7-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-2.7-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64" }, "product_reference": "freetype2-devel-2.7-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-2.7-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le" }, "product_reference": "freetype2-devel-2.7-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-2.7-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x" }, "product_reference": "freetype2-devel-2.7-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-2.7-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64" }, "product_reference": "freetype2-devel-2.7-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-32bit-2.7-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64" }, "product_reference": "freetype2-devel-32bit-2.7-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-32bit-2.7-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le" }, "product_reference": "freetype2-devel-32bit-2.7-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-32bit-2.7-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x" }, "product_reference": "freetype2-devel-32bit-2.7-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "freetype2-devel-32bit-2.7-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64" }, "product_reference": "freetype2-devel-32bit-2.7-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-2.7-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64" }, "product_reference": "libfreetype6-2.7-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-2.7-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le" }, "product_reference": "libfreetype6-2.7-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-2.7-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x" }, "product_reference": "libfreetype6-2.7-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-2.7-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64" }, "product_reference": "libfreetype6-2.7-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-32bit-2.7-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64" }, "product_reference": "libfreetype6-32bit-2.7-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-32bit-2.7-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le" }, "product_reference": "libfreetype6-32bit-2.7-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-32bit-2.7-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x" }, "product_reference": "libfreetype6-32bit-2.7-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libfreetype6-32bit-2.7-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" }, "product_reference": "libfreetype6-32bit-2.7-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0946", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-0946" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-0946", "url": "https://www.suse.com/security/cve/CVE-2009-0946" }, { "category": "external", "summary": "SUSE Bug 485889 for CVE-2009-0946", "url": "https://bugzilla.suse.com/485889" }, { "category": "external", "summary": "SUSE Bug 496289 for CVE-2009-0946", "url": "https://bugzilla.suse.com/496289" }, { "category": "external", "summary": "SUSE Bug 541626 for CVE-2009-0946", "url": "https://bugzilla.suse.com/541626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-0946" }, { "cve": "CVE-2010-2497", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2497" } ], "notes": [ { "category": "general", "text": "Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2497", "url": "https://www.suse.com/security/cve/CVE-2010-2497" }, { "category": "external", "summary": "SUSE Bug 619562 for CVE-2010-2497", "url": "https://bugzilla.suse.com/619562" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-2497", "url": "https://bugzilla.suse.com/635692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2497" }, { "cve": "CVE-2010-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2805" } ], "notes": [ { "category": "general", "text": "The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2805", "url": "https://www.suse.com/security/cve/CVE-2010-2805" }, { "category": "external", "summary": "SUSE Bug 629447 for CVE-2010-2805", "url": "https://bugzilla.suse.com/629447" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-2805", "url": "https://bugzilla.suse.com/635692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2805" }, { "cve": "CVE-2010-3053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3053" } ], "notes": [ { "category": "general", "text": "bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3053", "url": "https://www.suse.com/security/cve/CVE-2010-3053" }, { "category": "external", "summary": "SUSE Bug 633938 for CVE-2010-3053", "url": "https://bugzilla.suse.com/633938" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-3053", "url": "https://bugzilla.suse.com/635692" }, { "category": "external", "summary": "SUSE Bug 645982 for CVE-2010-3053", "url": "https://bugzilla.suse.com/645982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3053" }, { "cve": "CVE-2010-3054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3054" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3054", "url": "https://www.suse.com/security/cve/CVE-2010-3054" }, { "category": "external", "summary": "SUSE Bug 633943 for CVE-2010-3054", "url": "https://bugzilla.suse.com/633943" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-3054", "url": "https://bugzilla.suse.com/635692" }, { "category": "external", "summary": "SUSE Bug 645982 for CVE-2010-3054", "url": "https://bugzilla.suse.com/645982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3054" }, { "cve": "CVE-2010-3311", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3311" } ], "notes": [ { "category": "general", "text": "Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an \"input stream position error\" issue, a different vulnerability than CVE-2010-1797.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3311", "url": "https://www.suse.com/security/cve/CVE-2010-3311" }, { "category": "external", "summary": "SUSE Bug 635692 for CVE-2010-3311", "url": "https://bugzilla.suse.com/635692" }, { "category": "external", "summary": "SUSE Bug 641580 for CVE-2010-3311", "url": "https://bugzilla.suse.com/641580" }, { "category": "external", "summary": "SUSE Bug 645982 for CVE-2010-3311", "url": "https://bugzilla.suse.com/645982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2010-3311" }, { "cve": "CVE-2010-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3814" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3814", "url": "https://www.suse.com/security/cve/CVE-2010-3814" }, { "category": "external", "summary": "SUSE Bug 647375 for CVE-2010-3814", "url": "https://bugzilla.suse.com/647375" }, { "category": "external", "summary": "SUSE Bug 689174 for CVE-2010-3814", "url": "https://bugzilla.suse.com/689174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3814" }, { "cve": "CVE-2010-3855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3855" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3855", "url": "https://www.suse.com/security/cve/CVE-2010-3855" }, { "category": "external", "summary": "SUSE Bug 647375 for CVE-2010-3855", "url": "https://bugzilla.suse.com/647375" }, { "category": "external", "summary": "SUSE Bug 689174 for CVE-2010-3855", "url": "https://bugzilla.suse.com/689174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3855" }, { "cve": "CVE-2011-0226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0226" } ], "notes": [ { "category": "general", "text": "Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0226", "url": "https://www.suse.com/security/cve/CVE-2011-0226" }, { "category": "external", "summary": "SUSE Bug 704612 for CVE-2011-0226", "url": "https://bugzilla.suse.com/704612" }, { "category": "external", "summary": "SUSE Bug 728044 for CVE-2011-0226", "url": "https://bugzilla.suse.com/728044" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-0226" }, { "cve": "CVE-2011-3256", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3256" } ], "notes": [ { "category": "general", "text": "FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3256", "url": "https://www.suse.com/security/cve/CVE-2011-3256" }, { "category": "external", "summary": "SUSE Bug 728044 for CVE-2011-3256", "url": "https://bugzilla.suse.com/728044" }, { "category": "external", "summary": "SUSE Bug 730124 for CVE-2011-3256", "url": "https://bugzilla.suse.com/730124" }, { "category": "external", "summary": "SUSE Bug 748083 for CVE-2011-3256", "url": "https://bugzilla.suse.com/748083" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3256" }, { "cve": "CVE-2011-3439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3439" } ], "notes": [ { "category": "general", "text": "FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3439", "url": "https://www.suse.com/security/cve/CVE-2011-3439" }, { "category": "external", "summary": "SUSE Bug 730124 for CVE-2011-3439", "url": "https://bugzilla.suse.com/730124" }, { "category": "external", "summary": "SUSE Bug 748083 for CVE-2011-3439", "url": "https://bugzilla.suse.com/748083" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-3439" }, { "cve": "CVE-2012-1126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1126" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1126", "url": "https://www.suse.com/security/cve/CVE-2012-1126" }, { "category": "external", "summary": "SUSE Bug 750937 for CVE-2012-1126", "url": "https://bugzilla.suse.com/750937" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1126" }, { "cve": "CVE-2012-1127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1127" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1127", "url": "https://www.suse.com/security/cve/CVE-2012-1127" }, { "category": "external", "summary": "SUSE Bug 750947 for CVE-2012-1127", "url": "https://bugzilla.suse.com/750947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1127" }, { "cve": "CVE-2012-1128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1128" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1128", "url": "https://www.suse.com/security/cve/CVE-2012-1128" }, { "category": "external", "summary": "SUSE Bug 750942 for CVE-2012-1128", "url": "https://bugzilla.suse.com/750942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1128" }, { "cve": "CVE-2012-1129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1129" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1129", "url": "https://www.suse.com/security/cve/CVE-2012-1129" }, { "category": "external", "summary": "SUSE Bug 750952 for CVE-2012-1129", "url": "https://bugzilla.suse.com/750952" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1129" }, { "cve": "CVE-2012-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1130" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1130", "url": "https://www.suse.com/security/cve/CVE-2012-1130" }, { "category": "external", "summary": "SUSE Bug 750951 for CVE-2012-1130", "url": "https://bugzilla.suse.com/750951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1130" }, { "cve": "CVE-2012-1131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1131" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1131", "url": "https://www.suse.com/security/cve/CVE-2012-1131" }, { "category": "external", "summary": "SUSE Bug 750953 for CVE-2012-1131", "url": "https://bugzilla.suse.com/750953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1131" }, { "cve": "CVE-2012-1132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1132" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1132", "url": "https://www.suse.com/security/cve/CVE-2012-1132" }, { "category": "external", "summary": "SUSE Bug 750950 for CVE-2012-1132", "url": "https://bugzilla.suse.com/750950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1132" }, { "cve": "CVE-2012-1133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1133" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1133", "url": "https://www.suse.com/security/cve/CVE-2012-1133" }, { "category": "external", "summary": "SUSE Bug 750940 for CVE-2012-1133", "url": "https://bugzilla.suse.com/750940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1133" }, { "cve": "CVE-2012-1134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1134" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1134", "url": "https://www.suse.com/security/cve/CVE-2012-1134" }, { "category": "external", "summary": "SUSE Bug 750945 for CVE-2012-1134", "url": "https://bugzilla.suse.com/750945" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1134" }, { "cve": "CVE-2012-1135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1135" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1135", "url": "https://www.suse.com/security/cve/CVE-2012-1135" }, { "category": "external", "summary": "SUSE Bug 750946 for CVE-2012-1135", "url": "https://bugzilla.suse.com/750946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1135" }, { "cve": "CVE-2012-1136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1136" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1136", "url": "https://www.suse.com/security/cve/CVE-2012-1136" }, { "category": "external", "summary": "SUSE Bug 750939 for CVE-2012-1136", "url": "https://bugzilla.suse.com/750939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1136" }, { "cve": "CVE-2012-1137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1137" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1137", "url": "https://www.suse.com/security/cve/CVE-2012-1137" }, { "category": "external", "summary": "SUSE Bug 750943 for CVE-2012-1137", "url": "https://bugzilla.suse.com/750943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1137" }, { "cve": "CVE-2012-1138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1138" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1138", "url": "https://www.suse.com/security/cve/CVE-2012-1138" }, { "category": "external", "summary": "SUSE Bug 750941 for CVE-2012-1138", "url": "https://bugzilla.suse.com/750941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1138" }, { "cve": "CVE-2012-1139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1139" } ], "notes": [ { "category": "general", "text": "Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1139", "url": "https://www.suse.com/security/cve/CVE-2012-1139" }, { "category": "external", "summary": "SUSE Bug 750938 for CVE-2012-1139", "url": "https://bugzilla.suse.com/750938" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1139" }, { "cve": "CVE-2012-1140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1140" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1140", "url": "https://www.suse.com/security/cve/CVE-2012-1140" }, { "category": "external", "summary": "SUSE Bug 750954 for CVE-2012-1140", "url": "https://bugzilla.suse.com/750954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1140" }, { "cve": "CVE-2012-1141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1141" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1141", "url": "https://www.suse.com/security/cve/CVE-2012-1141" }, { "category": "external", "summary": "SUSE Bug 750955 for CVE-2012-1141", "url": "https://bugzilla.suse.com/750955" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1141" }, { "cve": "CVE-2012-1142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1142" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1142", "url": "https://www.suse.com/security/cve/CVE-2012-1142" }, { "category": "external", "summary": "SUSE Bug 750948 for CVE-2012-1142", "url": "https://bugzilla.suse.com/750948" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1142" }, { "cve": "CVE-2012-1143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1143" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1143", "url": "https://www.suse.com/security/cve/CVE-2012-1143" }, { "category": "external", "summary": "SUSE Bug 750949 for CVE-2012-1143", "url": "https://bugzilla.suse.com/750949" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-1143" }, { "cve": "CVE-2012-1144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1144" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1144", "url": "https://www.suse.com/security/cve/CVE-2012-1144" }, { "category": "external", "summary": "SUSE Bug 750944 for CVE-2012-1144", "url": "https://bugzilla.suse.com/750944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2012-1144" }, { "cve": "CVE-2012-5668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5668" } ], "notes": [ { "category": "general", "text": "FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an \"allocation error\" in the bdf_free_font function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5668", "url": "https://www.suse.com/security/cve/CVE-2012-5668" }, { "category": "external", "summary": "SUSE Bug 795826 for CVE-2012-5668", "url": "https://bugzilla.suse.com/795826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5668" }, { "cve": "CVE-2012-5669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5669" } ], "notes": [ { "category": "general", "text": "The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5669", "url": "https://www.suse.com/security/cve/CVE-2012-5669" }, { "category": "external", "summary": "SUSE Bug 795826 for CVE-2012-5669", "url": "https://bugzilla.suse.com/795826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5669" }, { "cve": "CVE-2012-5670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-5670" } ], "notes": [ { "category": "general", "text": "The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-5670", "url": "https://www.suse.com/security/cve/CVE-2012-5670" }, { "category": "external", "summary": "SUSE Bug 795826 for CVE-2012-5670", "url": "https://bugzilla.suse.com/795826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-5670" }, { "cve": "CVE-2014-2240", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2240" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2240", "url": "https://www.suse.com/security/cve/CVE-2014-2240" }, { "category": "external", "summary": "SUSE Bug 867620 for CVE-2014-2240", "url": "https://bugzilla.suse.com/867620" }, { "category": "external", "summary": "SUSE Bug 916867 for CVE-2014-2240", "url": "https://bugzilla.suse.com/916867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-2240" }, { "cve": "CVE-2014-2241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2241" } ], "notes": [ { "category": "general", "text": "The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2241", "url": "https://www.suse.com/security/cve/CVE-2014-2241" }, { "category": "external", "summary": "SUSE Bug 867620 for CVE-2014-2241", "url": "https://bugzilla.suse.com/867620" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-2241" }, { "cve": "CVE-2014-9656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9656" } ], "notes": [ { "category": "general", "text": "The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9656", "url": "https://www.suse.com/security/cve/CVE-2014-9656" }, { "category": "external", "summary": "SUSE Bug 916847 for CVE-2014-9656", "url": "https://bugzilla.suse.com/916847" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9656" }, { "cve": "CVE-2014-9657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9657" } ], "notes": [ { "category": "general", "text": "The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9657", "url": "https://www.suse.com/security/cve/CVE-2014-9657" }, { "category": "external", "summary": "SUSE Bug 916856 for CVE-2014-9657", "url": "https://bugzilla.suse.com/916856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9657" }, { "cve": "CVE-2014-9658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9658" } ], "notes": [ { "category": "general", "text": "The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9658", "url": "https://www.suse.com/security/cve/CVE-2014-9658" }, { "category": "external", "summary": "SUSE Bug 916857 for CVE-2014-9658", "url": "https://bugzilla.suse.com/916857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9658" }, { "cve": "CVE-2014-9659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9659" } ], "notes": [ { "category": "general", "text": "cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9659", "url": "https://www.suse.com/security/cve/CVE-2014-9659" }, { "category": "external", "summary": "SUSE Bug 916867 for CVE-2014-9659", "url": "https://bugzilla.suse.com/916867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9659" }, { "cve": "CVE-2014-9660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9660" } ], "notes": [ { "category": "general", "text": "The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9660", "url": "https://www.suse.com/security/cve/CVE-2014-9660" }, { "category": "external", "summary": "SUSE Bug 916858 for CVE-2014-9660", "url": "https://bugzilla.suse.com/916858" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9660" }, { "cve": "CVE-2014-9661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9661" } ], "notes": [ { "category": "general", "text": "type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9661", "url": "https://www.suse.com/security/cve/CVE-2014-9661" }, { "category": "external", "summary": "SUSE Bug 916859 for CVE-2014-9661", "url": "https://bugzilla.suse.com/916859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9661" }, { "cve": "CVE-2014-9662", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9662" } ], "notes": [ { "category": "general", "text": "cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9662", "url": "https://www.suse.com/security/cve/CVE-2014-9662" }, { "category": "external", "summary": "SUSE Bug 916860 for CVE-2014-9662", "url": "https://bugzilla.suse.com/916860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9662" }, { "cve": "CVE-2014-9663", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9663" } ], "notes": [ { "category": "general", "text": "The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field\u0027s value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9663", "url": "https://www.suse.com/security/cve/CVE-2014-9663" }, { "category": "external", "summary": "SUSE Bug 916865 for CVE-2014-9663", "url": "https://bugzilla.suse.com/916865" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9663" }, { "cve": "CVE-2014-9664", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9664" } ], "notes": [ { "category": "general", "text": "FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9664", "url": "https://www.suse.com/security/cve/CVE-2014-9664" }, { "category": "external", "summary": "SUSE Bug 916864 for CVE-2014-9664", "url": "https://bugzilla.suse.com/916864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9664" }, { "cve": "CVE-2014-9665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9665" } ], "notes": [ { "category": "general", "text": "The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9665", "url": "https://www.suse.com/security/cve/CVE-2014-9665" }, { "category": "external", "summary": "SUSE Bug 916863 for CVE-2014-9665", "url": "https://bugzilla.suse.com/916863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9665" }, { "cve": "CVE-2014-9666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9666" } ], "notes": [ { "category": "general", "text": "The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9666", "url": "https://www.suse.com/security/cve/CVE-2014-9666" }, { "category": "external", "summary": "SUSE Bug 916862 for CVE-2014-9666", "url": "https://bugzilla.suse.com/916862" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9666" }, { "cve": "CVE-2014-9667", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9667" } ], "notes": [ { "category": "general", "text": "sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9667", "url": "https://www.suse.com/security/cve/CVE-2014-9667" }, { "category": "external", "summary": "SUSE Bug 916861 for CVE-2014-9667", "url": "https://bugzilla.suse.com/916861" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9667" }, { "cve": "CVE-2014-9668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9668" } ], "notes": [ { "category": "general", "text": "The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9668", "url": "https://www.suse.com/security/cve/CVE-2014-9668" }, { "category": "external", "summary": "SUSE Bug 916868 for CVE-2014-9668", "url": "https://bugzilla.suse.com/916868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9668" }, { "cve": "CVE-2014-9669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9669" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9669", "url": "https://www.suse.com/security/cve/CVE-2014-9669" }, { "category": "external", "summary": "SUSE Bug 916870 for CVE-2014-9669", "url": "https://bugzilla.suse.com/916870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9669" }, { "cve": "CVE-2014-9670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9670" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9670", "url": "https://www.suse.com/security/cve/CVE-2014-9670" }, { "category": "external", "summary": "SUSE Bug 916871 for CVE-2014-9670", "url": "https://bugzilla.suse.com/916871" }, { "category": "external", "summary": "SUSE Bug 933247 for CVE-2014-9670", "url": "https://bugzilla.suse.com/933247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9670" }, { "cve": "CVE-2014-9671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9671" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9671", "url": "https://www.suse.com/security/cve/CVE-2014-9671" }, { "category": "external", "summary": "SUSE Bug 916872 for CVE-2014-9671", "url": "https://bugzilla.suse.com/916872" }, { "category": "external", "summary": "SUSE Bug 933247 for CVE-2014-9671", "url": "https://bugzilla.suse.com/933247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9671" }, { "cve": "CVE-2014-9672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9672" } ], "notes": [ { "category": "general", "text": "Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9672", "url": "https://www.suse.com/security/cve/CVE-2014-9672" }, { "category": "external", "summary": "SUSE Bug 916873 for CVE-2014-9672", "url": "https://bugzilla.suse.com/916873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9672" }, { "cve": "CVE-2014-9673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9673" } ], "notes": [ { "category": "general", "text": "Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9673", "url": "https://www.suse.com/security/cve/CVE-2014-9673" }, { "category": "external", "summary": "SUSE Bug 916874 for CVE-2014-9673", "url": "https://bugzilla.suse.com/916874" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9673" }, { "cve": "CVE-2014-9674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9674" } ], "notes": [ { "category": "general", "text": "The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9674", "url": "https://www.suse.com/security/cve/CVE-2014-9674" }, { "category": "external", "summary": "SUSE Bug 916879 for CVE-2014-9674", "url": "https://bugzilla.suse.com/916879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9674" }, { "cve": "CVE-2014-9675", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9675" } ], "notes": [ { "category": "general", "text": "bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9675", "url": "https://www.suse.com/security/cve/CVE-2014-9675" }, { "category": "external", "summary": "SUSE Bug 916881 for CVE-2014-9675", "url": "https://bugzilla.suse.com/916881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-2.7-1.1.x86_64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:freetype2-devel-32bit-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-2.7-1.1.x86_64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.aarch64", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.ppc64le", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.s390x", "openSUSE Tumbleweed:libfreetype6-32bit-2.7-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9675" } ] }
rhsa-2009:1061
Vulnerability from csaf_redhat
Published
2009-05-22 12:06
Modified
2024-11-22 02:41
Summary
Red Hat Security Advisory: freetype security update
Notes
Topic
Updated freetype packages that fix various security issues are now
available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. These packages provide the FreeType 2 font engine.
Tavis Ormandy of the Google Security Team discovered several integer
overflow flaws in the FreeType 2 font engine. If a user loaded a
carefully-crafted font file with an application linked against FreeType 2,
it could cause the application to crash or, possibly, execute arbitrary
code with the privileges of the user running the application.
(CVE-2009-0946)
Users are advised to upgrade to these updated packages, which contain a
backported patch to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix various security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. These packages provide the FreeType 2 font engine.\n\nTavis Ormandy of the Google Security Team discovered several integer\noverflow flaws in the FreeType 2 font engine. If a user loaded a\ncarefully-crafted font file with an application linked against FreeType 2,\nit could cause the application to crash or, possibly, execute arbitrary\ncode with the privileges of the user running the application.\n(CVE-2009-0946)\n\nUsers are advised to upgrade to these updated packages, which contain a\nbackported patch to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1061", "url": "https://access.redhat.com/errata/RHSA-2009:1061" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "491384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1061.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2024-11-22T02:41:38+00:00", "generator": { "date": "2024-11-22T02:41:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1061", "initial_release_date": "2009-05-22T12:06:00+00:00", "revision_history": [ { "date": "2009-05-22T12:06:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-05-22T08:11:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:41:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-demos-0:2.2.1-21.el5_3.x86_64", "product": { "name": "freetype-demos-0:2.2.1-21.el5_3.x86_64", "product_id": "freetype-demos-0:2.2.1-21.el5_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-21.el5_3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-21.el5_3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-21.el5_3.x86_64", "product": { "name": "freetype-devel-0:2.2.1-21.el5_3.x86_64", "product_id": "freetype-devel-0:2.2.1-21.el5_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-21.el5_3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-21.el5_3.x86_64", "product": { "name": "freetype-0:2.2.1-21.el5_3.x86_64", "product_id": "freetype-0:2.2.1-21.el5_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-21.el5_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-21.el5_3.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.i386", "product_id": "freetype-debuginfo-0:2.2.1-21.el5_3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-21.el5_3?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-21.el5_3.i386", "product": { "name": "freetype-devel-0:2.2.1-21.el5_3.i386", "product_id": "freetype-devel-0:2.2.1-21.el5_3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-21.el5_3?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-21.el5_3.i386", "product": { "name": "freetype-demos-0:2.2.1-21.el5_3.i386", "product_id": "freetype-demos-0:2.2.1-21.el5_3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-21.el5_3?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-21.el5_3.i386", "product": { "name": "freetype-0:2.2.1-21.el5_3.i386", "product_id": "freetype-0:2.2.1-21.el5_3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-21.el5_3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.2.1-21.el5_3.src", "product": { "name": "freetype-0:2.2.1-21.el5_3.src", "product_id": "freetype-0:2.2.1-21.el5_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-21.el5_3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-demos-0:2.2.1-21.el5_3.ia64", "product": { "name": "freetype-demos-0:2.2.1-21.el5_3.ia64", "product_id": "freetype-demos-0:2.2.1-21.el5_3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-21.el5_3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "product_id": "freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-21.el5_3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-21.el5_3.ia64", "product": { "name": "freetype-0:2.2.1-21.el5_3.ia64", "product_id": "freetype-0:2.2.1-21.el5_3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-21.el5_3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-21.el5_3.ia64", "product": { "name": "freetype-devel-0:2.2.1-21.el5_3.ia64", "product_id": "freetype-devel-0:2.2.1-21.el5_3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-21.el5_3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-demos-0:2.2.1-21.el5_3.ppc", "product": { "name": "freetype-demos-0:2.2.1-21.el5_3.ppc", "product_id": "freetype-demos-0:2.2.1-21.el5_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-21.el5_3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "product_id": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-21.el5_3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-21.el5_3.ppc", "product": { "name": "freetype-0:2.2.1-21.el5_3.ppc", "product_id": "freetype-0:2.2.1-21.el5_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-21.el5_3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-21.el5_3.ppc", "product": { "name": "freetype-devel-0:2.2.1-21.el5_3.ppc", "product_id": "freetype-devel-0:2.2.1-21.el5_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-21.el5_3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-21.el5_3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-21.el5_3.ppc64", "product": { "name": "freetype-0:2.2.1-21.el5_3.ppc64", "product_id": "freetype-0:2.2.1-21.el5_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-21.el5_3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-21.el5_3.ppc64", "product": { "name": "freetype-devel-0:2.2.1-21.el5_3.ppc64", "product_id": "freetype-devel-0:2.2.1-21.el5_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-21.el5_3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-demos-0:2.2.1-21.el5_3.s390x", "product": { "name": "freetype-demos-0:2.2.1-21.el5_3.s390x", "product_id": "freetype-demos-0:2.2.1-21.el5_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-21.el5_3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "product_id": "freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-21.el5_3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-21.el5_3.s390x", "product": { "name": "freetype-0:2.2.1-21.el5_3.s390x", "product_id": "freetype-0:2.2.1-21.el5_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-21.el5_3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-21.el5_3.s390x", "product": { "name": "freetype-devel-0:2.2.1-21.el5_3.s390x", "product_id": "freetype-devel-0:2.2.1-21.el5_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-21.el5_3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390", "product_id": "freetype-debuginfo-0:2.2.1-21.el5_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-21.el5_3?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-21.el5_3.s390", "product": { "name": "freetype-0:2.2.1-21.el5_3.s390", "product_id": "freetype-0:2.2.1-21.el5_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-21.el5_3?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-21.el5_3.s390", "product": { "name": "freetype-devel-0:2.2.1-21.el5_3.s390", "product_id": "freetype-devel-0:2.2.1-21.el5_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-21.el5_3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ppc64" }, "product_reference": "freetype-0:2.2.1-21.el5_3.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-21.el5_3.s390" }, "product_reference": "freetype-0:2.2.1-21.el5_3.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-21.el5_3.src" }, "product_reference": "freetype-0:2.2.1-21.el5_3.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.s390" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-21.el5_3.ppc64" }, "product_reference": "freetype-0:2.2.1-21.el5_3.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-21.el5_3.s390" }, "product_reference": "freetype-0:2.2.1-21.el5_3.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-21.el5_3.src" }, "product_reference": "freetype-0:2.2.1-21.el5_3.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-21.el5_3.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-21.el5_3.s390" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-21.el5_3.ppc64" }, "product_reference": "freetype-0:2.2.1-21.el5_3.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-21.el5_3.s390" }, "product_reference": "freetype-0:2.2.1-21.el5_3.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-21.el5_3.src" }, "product_reference": "freetype-0:2.2.1-21.el5_3.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-21.el5_3.i386" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-21.el5_3.ia64" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-21.el5_3.ppc" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-21.el5_3.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-21.el5_3.s390" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-21.el5_3.s390x" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-21.el5_3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-21.el5_3.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-21.el5_3.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0946", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491384" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: multiple integer overflows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:freetype-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ppc64", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.s390", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.src", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.s390", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-0:2.2.1-21.el5_3.i386", "5Client:freetype-0:2.2.1-21.el5_3.ia64", "5Client:freetype-0:2.2.1-21.el5_3.ppc", "5Client:freetype-0:2.2.1-21.el5_3.ppc64", "5Client:freetype-0:2.2.1-21.el5_3.s390", "5Client:freetype-0:2.2.1-21.el5_3.s390x", "5Client:freetype-0:2.2.1-21.el5_3.src", "5Client:freetype-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.i386", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.s390", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-demos-0:2.2.1-21.el5_3.i386", "5Client:freetype-demos-0:2.2.1-21.el5_3.ia64", "5Client:freetype-demos-0:2.2.1-21.el5_3.ppc", "5Client:freetype-demos-0:2.2.1-21.el5_3.s390x", "5Client:freetype-demos-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-devel-0:2.2.1-21.el5_3.i386", "5Client:freetype-devel-0:2.2.1-21.el5_3.ia64", "5Client:freetype-devel-0:2.2.1-21.el5_3.ppc", "5Client:freetype-devel-0:2.2.1-21.el5_3.ppc64", "5Client:freetype-devel-0:2.2.1-21.el5_3.s390", "5Client:freetype-devel-0:2.2.1-21.el5_3.s390x", "5Client:freetype-devel-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-0:2.2.1-21.el5_3.i386", "5Server:freetype-0:2.2.1-21.el5_3.ia64", "5Server:freetype-0:2.2.1-21.el5_3.ppc", "5Server:freetype-0:2.2.1-21.el5_3.ppc64", "5Server:freetype-0:2.2.1-21.el5_3.s390", "5Server:freetype-0:2.2.1-21.el5_3.s390x", "5Server:freetype-0:2.2.1-21.el5_3.src", "5Server:freetype-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.i386", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.s390", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-demos-0:2.2.1-21.el5_3.i386", "5Server:freetype-demos-0:2.2.1-21.el5_3.ia64", "5Server:freetype-demos-0:2.2.1-21.el5_3.ppc", "5Server:freetype-demos-0:2.2.1-21.el5_3.s390x", "5Server:freetype-demos-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-devel-0:2.2.1-21.el5_3.i386", "5Server:freetype-devel-0:2.2.1-21.el5_3.ia64", "5Server:freetype-devel-0:2.2.1-21.el5_3.ppc", "5Server:freetype-devel-0:2.2.1-21.el5_3.ppc64", "5Server:freetype-devel-0:2.2.1-21.el5_3.s390", "5Server:freetype-devel-0:2.2.1-21.el5_3.s390x", "5Server:freetype-devel-0:2.2.1-21.el5_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0946" }, { "category": "external", "summary": "RHBZ#491384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0946", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0946" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0946", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0946" } ], "release_date": "2009-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:06:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:freetype-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ppc64", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.s390", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.src", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.s390", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-0:2.2.1-21.el5_3.i386", "5Client:freetype-0:2.2.1-21.el5_3.ia64", "5Client:freetype-0:2.2.1-21.el5_3.ppc", "5Client:freetype-0:2.2.1-21.el5_3.ppc64", "5Client:freetype-0:2.2.1-21.el5_3.s390", "5Client:freetype-0:2.2.1-21.el5_3.s390x", "5Client:freetype-0:2.2.1-21.el5_3.src", "5Client:freetype-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.i386", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.s390", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-demos-0:2.2.1-21.el5_3.i386", "5Client:freetype-demos-0:2.2.1-21.el5_3.ia64", "5Client:freetype-demos-0:2.2.1-21.el5_3.ppc", "5Client:freetype-demos-0:2.2.1-21.el5_3.s390x", "5Client:freetype-demos-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-devel-0:2.2.1-21.el5_3.i386", "5Client:freetype-devel-0:2.2.1-21.el5_3.ia64", "5Client:freetype-devel-0:2.2.1-21.el5_3.ppc", "5Client:freetype-devel-0:2.2.1-21.el5_3.ppc64", "5Client:freetype-devel-0:2.2.1-21.el5_3.s390", "5Client:freetype-devel-0:2.2.1-21.el5_3.s390x", "5Client:freetype-devel-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-0:2.2.1-21.el5_3.i386", "5Server:freetype-0:2.2.1-21.el5_3.ia64", "5Server:freetype-0:2.2.1-21.el5_3.ppc", "5Server:freetype-0:2.2.1-21.el5_3.ppc64", "5Server:freetype-0:2.2.1-21.el5_3.s390", "5Server:freetype-0:2.2.1-21.el5_3.s390x", "5Server:freetype-0:2.2.1-21.el5_3.src", "5Server:freetype-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.i386", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.s390", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-demos-0:2.2.1-21.el5_3.i386", "5Server:freetype-demos-0:2.2.1-21.el5_3.ia64", "5Server:freetype-demos-0:2.2.1-21.el5_3.ppc", "5Server:freetype-demos-0:2.2.1-21.el5_3.s390x", "5Server:freetype-demos-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-devel-0:2.2.1-21.el5_3.i386", "5Server:freetype-devel-0:2.2.1-21.el5_3.ia64", "5Server:freetype-devel-0:2.2.1-21.el5_3.ppc", "5Server:freetype-devel-0:2.2.1-21.el5_3.ppc64", "5Server:freetype-devel-0:2.2.1-21.el5_3.s390", "5Server:freetype-devel-0:2.2.1-21.el5_3.s390x", "5Server:freetype-devel-0:2.2.1-21.el5_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1061" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:freetype-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.ppc64", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.s390", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.src", "5Client-Workstation:freetype-0:2.2.1-21.el5_3.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-21.el5_3.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.i386", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.s390", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-0:2.2.1-21.el5_3.i386", "5Client:freetype-0:2.2.1-21.el5_3.ia64", "5Client:freetype-0:2.2.1-21.el5_3.ppc", "5Client:freetype-0:2.2.1-21.el5_3.ppc64", "5Client:freetype-0:2.2.1-21.el5_3.s390", "5Client:freetype-0:2.2.1-21.el5_3.s390x", "5Client:freetype-0:2.2.1-21.el5_3.src", "5Client:freetype-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.i386", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.s390", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "5Client:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-demos-0:2.2.1-21.el5_3.i386", "5Client:freetype-demos-0:2.2.1-21.el5_3.ia64", "5Client:freetype-demos-0:2.2.1-21.el5_3.ppc", "5Client:freetype-demos-0:2.2.1-21.el5_3.s390x", "5Client:freetype-demos-0:2.2.1-21.el5_3.x86_64", "5Client:freetype-devel-0:2.2.1-21.el5_3.i386", "5Client:freetype-devel-0:2.2.1-21.el5_3.ia64", "5Client:freetype-devel-0:2.2.1-21.el5_3.ppc", "5Client:freetype-devel-0:2.2.1-21.el5_3.ppc64", "5Client:freetype-devel-0:2.2.1-21.el5_3.s390", "5Client:freetype-devel-0:2.2.1-21.el5_3.s390x", "5Client:freetype-devel-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-0:2.2.1-21.el5_3.i386", "5Server:freetype-0:2.2.1-21.el5_3.ia64", "5Server:freetype-0:2.2.1-21.el5_3.ppc", "5Server:freetype-0:2.2.1-21.el5_3.ppc64", "5Server:freetype-0:2.2.1-21.el5_3.s390", "5Server:freetype-0:2.2.1-21.el5_3.s390x", "5Server:freetype-0:2.2.1-21.el5_3.src", "5Server:freetype-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.i386", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ia64", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ppc", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.ppc64", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.s390", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.s390x", "5Server:freetype-debuginfo-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-demos-0:2.2.1-21.el5_3.i386", "5Server:freetype-demos-0:2.2.1-21.el5_3.ia64", "5Server:freetype-demos-0:2.2.1-21.el5_3.ppc", "5Server:freetype-demos-0:2.2.1-21.el5_3.s390x", "5Server:freetype-demos-0:2.2.1-21.el5_3.x86_64", "5Server:freetype-devel-0:2.2.1-21.el5_3.i386", "5Server:freetype-devel-0:2.2.1-21.el5_3.ia64", "5Server:freetype-devel-0:2.2.1-21.el5_3.ppc", "5Server:freetype-devel-0:2.2.1-21.el5_3.ppc64", "5Server:freetype-devel-0:2.2.1-21.el5_3.s390", "5Server:freetype-devel-0:2.2.1-21.el5_3.s390x", "5Server:freetype-devel-0:2.2.1-21.el5_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: multiple integer overflows" } ] }
rhsa-2009:1062
Vulnerability from csaf_redhat
Published
2009-05-22 12:06
Modified
2024-11-22 02:41
Summary
Red Hat Security Advisory: freetype security update
Notes
Topic
Updated freetype packages that fix various security issues are now
available for Red Hat Enterprise Linux 2.1.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. These packages provide both the FreeType 1 and FreeType 2
font engines.
Tavis Ormandy of the Google Security Team discovered several integer
overflow flaws in the FreeType 2 font engine. If a user loaded a
carefully-crafted font file with an application linked against FreeType 2,
it could cause the application to crash or, possibly, execute arbitrary
code with the privileges of the user running the application.
(CVE-2009-0946)
Chris Evans discovered multiple integer overflow flaws in the FreeType font
engine. If a user loaded a carefully-crafted font file with an application
linked against FreeType, it could cause the application to crash or,
possibly, execute arbitrary code with the privileges of the user running
the application. (CVE-2006-1861)
An integer overflow flaw was found in the way the FreeType font engine
processed TrueType® Font (TTF) files. If a user loaded a carefully-crafted
font file with an application linked against FreeType, it could cause the
application to crash or, possibly, execute arbitrary code with the
privileges of the user running the application. (CVE-2007-2754)
Note: For the FreeType 2 font engine, the CVE-2006-1861 and CVE-2007-2754
flaws were addressed via RHSA-2006:0500 and RHSA-2007:0403 respectively.
This update provides corresponding updates for the FreeType 1 font engine,
included in the freetype packages distributed in Red Hat Enterprise Linux
2.1.
Users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix various security issues are now\navailable for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. These packages provide both the FreeType 1 and FreeType 2\nfont engines.\n\nTavis Ormandy of the Google Security Team discovered several integer\noverflow flaws in the FreeType 2 font engine. If a user loaded a\ncarefully-crafted font file with an application linked against FreeType 2,\nit could cause the application to crash or, possibly, execute arbitrary\ncode with the privileges of the user running the application.\n(CVE-2009-0946)\n\nChris Evans discovered multiple integer overflow flaws in the FreeType font\nengine. If a user loaded a carefully-crafted font file with an application\nlinked against FreeType, it could cause the application to crash or,\npossibly, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2006-1861)\n\nAn integer overflow flaw was found in the way the FreeType font engine\nprocessed TrueType\u00ae Font (TTF) files. If a user loaded a carefully-crafted\nfont file with an application linked against FreeType, it could cause the\napplication to crash or, possibly, execute arbitrary code with the\nprivileges of the user running the application. (CVE-2007-2754)\n\nNote: For the FreeType 2 font engine, the CVE-2006-1861 and CVE-2007-2754\nflaws were addressed via RHSA-2006:0500 and RHSA-2007:0403 respectively.\nThis update provides corresponding updates for the FreeType 1 font engine,\nincluded in the freetype packages distributed in Red Hat Enterprise Linux\n2.1.\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1062", "url": "https://access.redhat.com/errata/RHSA-2009:1062" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "240200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200" }, { "category": "external", "summary": "484437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437" }, { "category": "external", "summary": "491384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1062.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2024-11-22T02:41:42+00:00", "generator": { "date": "2024-11-22T02:41:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1062", "initial_release_date": "2009-05-22T12:06:00+00:00", "revision_history": [ { "date": "2009-05-22T12:06:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-05-22T08:06:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:41:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.0.3-17.el21.ia64", "product": { "name": "freetype-utils-0:2.0.3-17.el21.ia64", "product_id": "freetype-utils-0:2.0.3-17.el21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.0.3-17.el21?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.0.3-17.el21.ia64", "product": { "name": "freetype-devel-0:2.0.3-17.el21.ia64", "product_id": "freetype-devel-0:2.0.3-17.el21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.0.3-17.el21?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.0.3-17.el21.ia64", "product": { "name": "freetype-0:2.0.3-17.el21.ia64", "product_id": "freetype-0:2.0.3-17.el21.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.0.3-17.el21?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.0.3-17.el21.src", "product": { "name": "freetype-0:2.0.3-17.el21.src", "product_id": "freetype-0:2.0.3-17.el21.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.0.3-17.el21?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-utils-0:2.0.3-17.el21.i386", "product": { "name": "freetype-utils-0:2.0.3-17.el21.i386", "product_id": "freetype-utils-0:2.0.3-17.el21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.0.3-17.el21?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.0.3-17.el21.i386", "product": { "name": "freetype-devel-0:2.0.3-17.el21.i386", "product_id": "freetype-devel-0:2.0.3-17.el21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.0.3-17.el21?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.0.3-17.el21.i386", "product": { "name": "freetype-0:2.0.3-17.el21.i386", "product_id": "freetype-0:2.0.3-17.el21.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.0.3-17.el21?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-0:2.0.3-17.el21.src" }, "product_reference": "freetype-0:2.0.3-17.el21.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-devel-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-utils-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-0:2.0.3-17.el21.src" }, "product_reference": "freetype-0:2.0.3-17.el21.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-devel-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-utils-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-0:2.0.3-17.el21.src" }, "product_reference": "freetype-0:2.0.3-17.el21.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-devel-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-utils-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.0.3-17.el21.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-0:2.0.3-17.el21.src" }, "product_reference": "freetype-0:2.0.3-17.el21.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-devel-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-devel-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-utils-0:2.0.3-17.el21.i386" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.0.3-17.el21.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" }, "product_reference": "freetype-utils-0:2.0.3-17.el21.ia64", "relates_to_product_reference": "2.1WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-1861", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2006-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "484437" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c. NOTE: item 4 was originally identified by CVE-2006-2493.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: multiple integer overflow vulnerabilities", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1861" }, { "category": "external", "summary": "RHBZ#484437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1861", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1861" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1861", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1861" } ], "release_date": "2006-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:06:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1062" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "freetype: multiple integer overflow vulnerabilities" }, { "cve": "CVE-2007-2754", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2007-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "240200" } ], "notes": [ { "category": "description", "text": "Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype integer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2754" }, { "category": "external", "summary": "RHBZ#240200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2754", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754" } ], "release_date": "2007-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:06:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1062" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "freetype integer overflow" }, { "cve": "CVE-2009-0946", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491384" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: multiple integer overflows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0946" }, { "category": "external", "summary": "RHBZ#491384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0946", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0946" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0946", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0946" } ], "release_date": "2009-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:06:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1062" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "2.1AS:freetype-0:2.0.3-17.el21.i386", "2.1AS:freetype-0:2.0.3-17.el21.ia64", "2.1AS:freetype-0:2.0.3-17.el21.src", "2.1AS:freetype-devel-0:2.0.3-17.el21.i386", "2.1AS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AS:freetype-utils-0:2.0.3-17.el21.i386", "2.1AS:freetype-utils-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.i386", "2.1AW:freetype-0:2.0.3-17.el21.ia64", "2.1AW:freetype-0:2.0.3-17.el21.src", "2.1AW:freetype-devel-0:2.0.3-17.el21.i386", "2.1AW:freetype-devel-0:2.0.3-17.el21.ia64", "2.1AW:freetype-utils-0:2.0.3-17.el21.i386", "2.1AW:freetype-utils-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.i386", "2.1ES:freetype-0:2.0.3-17.el21.ia64", "2.1ES:freetype-0:2.0.3-17.el21.src", "2.1ES:freetype-devel-0:2.0.3-17.el21.i386", "2.1ES:freetype-devel-0:2.0.3-17.el21.ia64", "2.1ES:freetype-utils-0:2.0.3-17.el21.i386", "2.1ES:freetype-utils-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.i386", "2.1WS:freetype-0:2.0.3-17.el21.ia64", "2.1WS:freetype-0:2.0.3-17.el21.src", "2.1WS:freetype-devel-0:2.0.3-17.el21.i386", "2.1WS:freetype-devel-0:2.0.3-17.el21.ia64", "2.1WS:freetype-utils-0:2.0.3-17.el21.i386", "2.1WS:freetype-utils-0:2.0.3-17.el21.ia64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: multiple integer overflows" } ] }
rhsa-2009:0329
Vulnerability from csaf_redhat
Published
2009-05-22 12:21
Modified
2024-11-22 02:41
Summary
Red Hat Security Advisory: freetype security update
Notes
Topic
Updated freetype packages that fix various security issues are now
available for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. These packages provide both the FreeType 1 and FreeType 2
font engines.
Tavis Ormandy of the Google Security Team discovered several integer
overflow flaws in the FreeType 2 font engine. If a user loaded a
carefully-crafted font file with an application linked against FreeType 2,
it could cause the application to crash or, possibly, execute arbitrary
code with the privileges of the user running the application.
(CVE-2009-0946)
Chris Evans discovered multiple integer overflow flaws in the FreeType font
engine. If a user loaded a carefully-crafted font file with an application
linked against FreeType, it could cause the application to crash or,
possibly, execute arbitrary code with the privileges of the user running
the application. (CVE-2006-1861)
An integer overflow flaw was found in the way the FreeType font engine
processed TrueType® Font (TTF) files. If a user loaded a carefully-crafted
font file with an application linked against FreeType, it could cause the
application to crash or, possibly, execute arbitrary code with the
privileges of the user running the application. (CVE-2007-2754)
A flaw was discovered in the FreeType TTF font-file format parser when the
TrueType virtual machine Byte Code Interpreter (BCI) is enabled. If a user
loaded a carefully-crafted font file with an application linked against
FreeType, it could cause the application to crash or, possibly, execute
arbitrary code with the privileges of the user running the application.
(CVE-2008-1808)
The CVE-2008-1808 flaw did not affect the freetype packages as distributed
in Red Hat Enterprise Linux 3 and 4, as they are not compiled with TrueType
BCI support. A fix for this flaw has been included in this update as users
may choose to recompile the freetype packages in order to enable TrueType
BCI support. Red Hat does not, however, provide support for modified and
recompiled packages.
Note: For the FreeType 2 font engine, the CVE-2006-1861, CVE-2007-2754,
and CVE-2008-1808 flaws were addressed via RHSA-2006:0500, RHSA-2007:0403,
and RHSA-2008:0556 respectively. This update provides corresponding
updates for the FreeType 1 font engine, included in the freetype packages
distributed in Red Hat Enterprise Linux 3 and 4.
Users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix various security issues are now\navailable for Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. These packages provide both the FreeType 1 and FreeType 2\nfont engines.\n\nTavis Ormandy of the Google Security Team discovered several integer\noverflow flaws in the FreeType 2 font engine. If a user loaded a\ncarefully-crafted font file with an application linked against FreeType 2,\nit could cause the application to crash or, possibly, execute arbitrary\ncode with the privileges of the user running the application.\n(CVE-2009-0946)\n\nChris Evans discovered multiple integer overflow flaws in the FreeType font\nengine. If a user loaded a carefully-crafted font file with an application\nlinked against FreeType, it could cause the application to crash or,\npossibly, execute arbitrary code with the privileges of the user running\nthe application. (CVE-2006-1861)\n\nAn integer overflow flaw was found in the way the FreeType font engine\nprocessed TrueType\u00ae Font (TTF) files. If a user loaded a carefully-crafted\nfont file with an application linked against FreeType, it could cause the\napplication to crash or, possibly, execute arbitrary code with the\nprivileges of the user running the application. (CVE-2007-2754)\n\nA flaw was discovered in the FreeType TTF font-file format parser when the\nTrueType virtual machine Byte Code Interpreter (BCI) is enabled. If a user\nloaded a carefully-crafted font file with an application linked against\nFreeType, it could cause the application to crash or, possibly, execute\narbitrary code with the privileges of the user running the application.\n(CVE-2008-1808)\n\nThe CVE-2008-1808 flaw did not affect the freetype packages as distributed\nin Red Hat Enterprise Linux 3 and 4, as they are not compiled with TrueType\nBCI support. A fix for this flaw has been included in this update as users\nmay choose to recompile the freetype packages in order to enable TrueType\nBCI support. Red Hat does not, however, provide support for modified and\nrecompiled packages.\n\nNote: For the FreeType 2 font engine, the CVE-2006-1861, CVE-2007-2754,\nand CVE-2008-1808 flaws were addressed via RHSA-2006:0500, RHSA-2007:0403,\nand RHSA-2008:0556 respectively. This update provides corresponding\nupdates for the FreeType 1 font engine, included in the freetype packages\ndistributed in Red Hat Enterprise Linux 3 and 4.\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:0329", "url": "https://access.redhat.com/errata/RHSA-2009:0329" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.redhat.com/support/policy/soc/production/", "url": "http://www.redhat.com/support/policy/soc/production/" }, { "category": "external", "summary": "240200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200" }, { "category": "external", "summary": "450774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450774" }, { "category": "external", "summary": "484437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437" }, { "category": "external", "summary": "491384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0329.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2024-11-22T02:41:34+00:00", "generator": { "date": "2024-11-22T02:41:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:0329", "initial_release_date": "2009-05-22T12:21:00+00:00", "revision_history": [ { "date": "2009-05-22T12:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-05-22T08:21:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:41:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-12.el3.ia64", "product": { "name": "freetype-0:2.1.4-12.el3.ia64", "product_id": "freetype-0:2.1.4-12.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-12.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-12.el3.ia64", "product": { "name": "freetype-devel-0:2.1.4-12.el3.ia64", "product_id": "freetype-devel-0:2.1.4-12.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-12.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-12.el3.ia64", "product": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ia64", "product_id": "freetype-debuginfo-0:2.1.4-12.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-12.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-10.el4.7.ia64", "product": { "name": "freetype-utils-0:2.1.9-10.el4.7.ia64", "product_id": "freetype-utils-0:2.1.9-10.el4.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-10.el4.7?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-10.el4.7.ia64", "product": { "name": "freetype-devel-0:2.1.9-10.el4.7.ia64", "product_id": "freetype-devel-0:2.1.9-10.el4.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-10.el4.7?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-10.el4.7.ia64", "product": { "name": "freetype-demos-0:2.1.9-10.el4.7.ia64", "product_id": "freetype-demos-0:2.1.9-10.el4.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-10.el4.7?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "product": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "product_id": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-10.el4.7?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-10.el4.7.ia64", "product": { "name": "freetype-0:2.1.9-10.el4.7.ia64", "product_id": "freetype-0:2.1.9-10.el4.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-10.el4.7?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-12.el3.i386", "product": { "name": "freetype-0:2.1.4-12.el3.i386", "product_id": "freetype-0:2.1.4-12.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-12.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-12.el3.i386", "product": { "name": "freetype-debuginfo-0:2.1.4-12.el3.i386", "product_id": "freetype-debuginfo-0:2.1.4-12.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-12.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-12.el3.i386", "product": { "name": "freetype-devel-0:2.1.4-12.el3.i386", "product_id": "freetype-devel-0:2.1.4-12.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-12.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-10.el4.7.i386", "product": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.i386", "product_id": "freetype-debuginfo-0:2.1.9-10.el4.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-10.el4.7?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-10.el4.7.i386", "product": { "name": "freetype-0:2.1.9-10.el4.7.i386", "product_id": "freetype-0:2.1.9-10.el4.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-10.el4.7?arch=i386" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-10.el4.7.i386", "product": { "name": "freetype-utils-0:2.1.9-10.el4.7.i386", "product_id": "freetype-utils-0:2.1.9-10.el4.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-10.el4.7?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-10.el4.7.i386", "product": { "name": "freetype-devel-0:2.1.9-10.el4.7.i386", "product_id": "freetype-devel-0:2.1.9-10.el4.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-10.el4.7?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-10.el4.7.i386", "product": { "name": "freetype-demos-0:2.1.9-10.el4.7.i386", "product_id": "freetype-demos-0:2.1.9-10.el4.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-10.el4.7?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-12.el3.src", "product": { "name": "freetype-0:2.1.4-12.el3.src", "product_id": "freetype-0:2.1.4-12.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-12.el3?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-10.el4.7.src", "product": { "name": "freetype-0:2.1.9-10.el4.7.src", "product_id": "freetype-0:2.1.9-10.el4.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-10.el4.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-12.el3.x86_64", "product": { "name": "freetype-0:2.1.4-12.el3.x86_64", "product_id": "freetype-0:2.1.4-12.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-12.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-12.el3.x86_64", "product": { "name": "freetype-devel-0:2.1.4-12.el3.x86_64", "product_id": "freetype-devel-0:2.1.4-12.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-12.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-12.el3.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.4-12.el3.x86_64", "product_id": "freetype-debuginfo-0:2.1.4-12.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-12.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-10.el4.7.x86_64", "product": { "name": "freetype-utils-0:2.1.9-10.el4.7.x86_64", "product_id": "freetype-utils-0:2.1.9-10.el4.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-10.el4.7?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-10.el4.7.x86_64", "product": { "name": "freetype-devel-0:2.1.9-10.el4.7.x86_64", "product_id": "freetype-devel-0:2.1.9-10.el4.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-10.el4.7?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-10.el4.7.x86_64", "product": { "name": "freetype-demos-0:2.1.9-10.el4.7.x86_64", "product_id": "freetype-demos-0:2.1.9-10.el4.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-10.el4.7?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "product_id": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-10.el4.7?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-10.el4.7.x86_64", "product": { "name": "freetype-0:2.1.9-10.el4.7.x86_64", "product_id": "freetype-0:2.1.9-10.el4.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-10.el4.7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-12.el3.ppc64", "product": { "name": "freetype-0:2.1.4-12.el3.ppc64", "product_id": "freetype-0:2.1.4-12.el3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-12.el3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc64", "product_id": "freetype-debuginfo-0:2.1.4-12.el3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-12.el3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "product_id": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-10.el4.7?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-10.el4.7.ppc64", "product": { "name": "freetype-0:2.1.9-10.el4.7.ppc64", "product_id": "freetype-0:2.1.9-10.el4.7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-10.el4.7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-12.el3.ppc", "product": { "name": "freetype-0:2.1.4-12.el3.ppc", "product_id": "freetype-0:2.1.4-12.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-12.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-12.el3.ppc", "product": { "name": "freetype-devel-0:2.1.4-12.el3.ppc", "product_id": "freetype-devel-0:2.1.4-12.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-12.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc", "product": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc", "product_id": "freetype-debuginfo-0:2.1.4-12.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-12.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-10.el4.7.ppc", "product": { "name": "freetype-utils-0:2.1.9-10.el4.7.ppc", "product_id": "freetype-utils-0:2.1.9-10.el4.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-10.el4.7?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-10.el4.7.ppc", "product": { "name": "freetype-devel-0:2.1.9-10.el4.7.ppc", "product_id": "freetype-devel-0:2.1.9-10.el4.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-10.el4.7?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-10.el4.7.ppc", "product": { "name": "freetype-demos-0:2.1.9-10.el4.7.ppc", "product_id": "freetype-demos-0:2.1.9-10.el4.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-10.el4.7?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "product": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "product_id": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-10.el4.7?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-10.el4.7.ppc", "product": { "name": "freetype-0:2.1.9-10.el4.7.ppc", "product_id": "freetype-0:2.1.9-10.el4.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-10.el4.7?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-12.el3.s390x", "product": { "name": "freetype-0:2.1.4-12.el3.s390x", "product_id": "freetype-0:2.1.4-12.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-12.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-12.el3.s390x", "product": { "name": "freetype-devel-0:2.1.4-12.el3.s390x", "product_id": "freetype-devel-0:2.1.4-12.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-12.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-12.el3.s390x", "product": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390x", "product_id": "freetype-debuginfo-0:2.1.4-12.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-12.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-10.el4.7.s390x", "product": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390x", "product_id": "freetype-utils-0:2.1.9-10.el4.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-10.el4.7?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-10.el4.7.s390x", "product": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390x", "product_id": "freetype-devel-0:2.1.9-10.el4.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-10.el4.7?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-10.el4.7.s390x", "product": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390x", "product_id": "freetype-demos-0:2.1.9-10.el4.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-10.el4.7?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "product": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "product_id": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-10.el4.7?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-10.el4.7.s390x", "product": { "name": "freetype-0:2.1.9-10.el4.7.s390x", "product_id": "freetype-0:2.1.9-10.el4.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-10.el4.7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-12.el3.s390", "product": { "name": "freetype-0:2.1.4-12.el3.s390", "product_id": "freetype-0:2.1.4-12.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-12.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-12.el3.s390", "product": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390", "product_id": "freetype-debuginfo-0:2.1.4-12.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-12.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-12.el3.s390", "product": { "name": "freetype-devel-0:2.1.4-12.el3.s390", "product_id": "freetype-devel-0:2.1.4-12.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-12.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390", "product": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390", "product_id": "freetype-debuginfo-0:2.1.9-10.el4.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-10.el4.7?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-10.el4.7.s390", "product": { "name": "freetype-0:2.1.9-10.el4.7.s390", "product_id": "freetype-0:2.1.9-10.el4.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-10.el4.7?arch=s390" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-10.el4.7.s390", "product": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390", "product_id": "freetype-utils-0:2.1.9-10.el4.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-10.el4.7?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-10.el4.7.s390", "product": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390", "product_id": "freetype-devel-0:2.1.9-10.el4.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-10.el4.7?arch=s390" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-10.el4.7.s390", "product": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390", "product_id": "freetype-demos-0:2.1.9-10.el4.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-10.el4.7?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-12.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-12.el3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-12.el3.src" }, "product_reference": "freetype-0:2.1.4-12.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-12.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-12.el3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-12.el3.src" }, "product_reference": "freetype-0:2.1.4-12.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-12.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-12.el3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-12.el3.src" }, "product_reference": "freetype-0:2.1.4-12.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-12.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-12.el3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-12.el3.src" }, "product_reference": "freetype-0:2.1.4-12.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-12.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-12.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-12.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-12.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-12.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-12.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-12.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-12.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-12.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-12.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-10.el4.7.ppc64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-10.el4.7.src" }, "product_reference": "freetype-0:2.1.9-10.el4.7.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-10.el4.7.src" }, "product_reference": "freetype-0:2.1.9-10.el4.7.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-10.el4.7.ppc64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-10.el4.7.src" }, "product_reference": "freetype-0:2.1.9-10.el4.7.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-10.el4.7.ppc64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-10.el4.7.src" }, "product_reference": "freetype-0:2.1.9-10.el4.7.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-10.el4.7.i386" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-10.el4.7.s390" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-10.el4.7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-10.el4.7.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-1861", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2006-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "484437" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c. NOTE: item 4 was originally identified by CVE-2006-2493.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: multiple integer overflow vulnerabilities", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:freetype-0:2.1.4-12.el3.i386", "3AS:freetype-0:2.1.4-12.el3.ia64", "3AS:freetype-0:2.1.4-12.el3.ppc", "3AS:freetype-0:2.1.4-12.el3.ppc64", "3AS:freetype-0:2.1.4-12.el3.s390", "3AS:freetype-0:2.1.4-12.el3.s390x", "3AS:freetype-0:2.1.4-12.el3.src", "3AS:freetype-0:2.1.4-12.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3AS:freetype-devel-0:2.1.4-12.el3.i386", "3AS:freetype-devel-0:2.1.4-12.el3.ia64", "3AS:freetype-devel-0:2.1.4-12.el3.ppc", "3AS:freetype-devel-0:2.1.4-12.el3.s390", "3AS:freetype-devel-0:2.1.4-12.el3.s390x", "3AS:freetype-devel-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-0:2.1.4-12.el3.i386", "3Desktop:freetype-0:2.1.4-12.el3.ia64", "3Desktop:freetype-0:2.1.4-12.el3.ppc", "3Desktop:freetype-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-0:2.1.4-12.el3.s390", "3Desktop:freetype-0:2.1.4-12.el3.s390x", "3Desktop:freetype-0:2.1.4-12.el3.src", "3Desktop:freetype-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-12.el3.i386", "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64", "3ES:freetype-0:2.1.4-12.el3.i386", "3ES:freetype-0:2.1.4-12.el3.ia64", "3ES:freetype-0:2.1.4-12.el3.ppc", "3ES:freetype-0:2.1.4-12.el3.ppc64", "3ES:freetype-0:2.1.4-12.el3.s390", "3ES:freetype-0:2.1.4-12.el3.s390x", "3ES:freetype-0:2.1.4-12.el3.src", "3ES:freetype-0:2.1.4-12.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3ES:freetype-devel-0:2.1.4-12.el3.i386", "3ES:freetype-devel-0:2.1.4-12.el3.ia64", "3ES:freetype-devel-0:2.1.4-12.el3.ppc", "3ES:freetype-devel-0:2.1.4-12.el3.s390", "3ES:freetype-devel-0:2.1.4-12.el3.s390x", "3ES:freetype-devel-0:2.1.4-12.el3.x86_64", "3WS:freetype-0:2.1.4-12.el3.i386", "3WS:freetype-0:2.1.4-12.el3.ia64", "3WS:freetype-0:2.1.4-12.el3.ppc", "3WS:freetype-0:2.1.4-12.el3.ppc64", "3WS:freetype-0:2.1.4-12.el3.s390", "3WS:freetype-0:2.1.4-12.el3.s390x", "3WS:freetype-0:2.1.4-12.el3.src", "3WS:freetype-0:2.1.4-12.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3WS:freetype-devel-0:2.1.4-12.el3.i386", "3WS:freetype-devel-0:2.1.4-12.el3.ia64", "3WS:freetype-devel-0:2.1.4-12.el3.ppc", "3WS:freetype-devel-0:2.1.4-12.el3.s390", "3WS:freetype-devel-0:2.1.4-12.el3.s390x", "3WS:freetype-devel-0:2.1.4-12.el3.x86_64", "4AS:freetype-0:2.1.9-10.el4.7.i386", "4AS:freetype-0:2.1.9-10.el4.7.ia64", "4AS:freetype-0:2.1.9-10.el4.7.ppc", "4AS:freetype-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-0:2.1.9-10.el4.7.s390", "4AS:freetype-0:2.1.9-10.el4.7.s390x", "4AS:freetype-0:2.1.9-10.el4.7.src", "4AS:freetype-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-demos-0:2.1.9-10.el4.7.i386", "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-devel-0:2.1.9-10.el4.7.i386", "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-utils-0:2.1.9-10.el4.7.i386", "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-0:2.1.9-10.el4.7.src", "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-0:2.1.9-10.el4.7.i386", "4ES:freetype-0:2.1.9-10.el4.7.ia64", "4ES:freetype-0:2.1.9-10.el4.7.ppc", "4ES:freetype-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-0:2.1.9-10.el4.7.s390", "4ES:freetype-0:2.1.9-10.el4.7.s390x", "4ES:freetype-0:2.1.9-10.el4.7.src", "4ES:freetype-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-demos-0:2.1.9-10.el4.7.i386", "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64", "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x", "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-devel-0:2.1.9-10.el4.7.i386", "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64", "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x", "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-utils-0:2.1.9-10.el4.7.i386", "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64", "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x", "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-0:2.1.9-10.el4.7.i386", "4WS:freetype-0:2.1.9-10.el4.7.ia64", "4WS:freetype-0:2.1.9-10.el4.7.ppc", "4WS:freetype-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-0:2.1.9-10.el4.7.s390", "4WS:freetype-0:2.1.9-10.el4.7.s390x", "4WS:freetype-0:2.1.9-10.el4.7.src", "4WS:freetype-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-demos-0:2.1.9-10.el4.7.i386", "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-devel-0:2.1.9-10.el4.7.i386", "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-utils-0:2.1.9-10.el4.7.i386", "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1861" }, { "category": "external", "summary": "RHBZ#484437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1861", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1861" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1861", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1861" } ], "release_date": "2006-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:freetype-0:2.1.4-12.el3.i386", "3AS:freetype-0:2.1.4-12.el3.ia64", "3AS:freetype-0:2.1.4-12.el3.ppc", "3AS:freetype-0:2.1.4-12.el3.ppc64", "3AS:freetype-0:2.1.4-12.el3.s390", "3AS:freetype-0:2.1.4-12.el3.s390x", "3AS:freetype-0:2.1.4-12.el3.src", "3AS:freetype-0:2.1.4-12.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3AS:freetype-devel-0:2.1.4-12.el3.i386", "3AS:freetype-devel-0:2.1.4-12.el3.ia64", "3AS:freetype-devel-0:2.1.4-12.el3.ppc", "3AS:freetype-devel-0:2.1.4-12.el3.s390", "3AS:freetype-devel-0:2.1.4-12.el3.s390x", "3AS:freetype-devel-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-0:2.1.4-12.el3.i386", "3Desktop:freetype-0:2.1.4-12.el3.ia64", "3Desktop:freetype-0:2.1.4-12.el3.ppc", "3Desktop:freetype-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-0:2.1.4-12.el3.s390", "3Desktop:freetype-0:2.1.4-12.el3.s390x", "3Desktop:freetype-0:2.1.4-12.el3.src", "3Desktop:freetype-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-12.el3.i386", "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64", "3ES:freetype-0:2.1.4-12.el3.i386", "3ES:freetype-0:2.1.4-12.el3.ia64", "3ES:freetype-0:2.1.4-12.el3.ppc", "3ES:freetype-0:2.1.4-12.el3.ppc64", "3ES:freetype-0:2.1.4-12.el3.s390", "3ES:freetype-0:2.1.4-12.el3.s390x", "3ES:freetype-0:2.1.4-12.el3.src", "3ES:freetype-0:2.1.4-12.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3ES:freetype-devel-0:2.1.4-12.el3.i386", "3ES:freetype-devel-0:2.1.4-12.el3.ia64", "3ES:freetype-devel-0:2.1.4-12.el3.ppc", "3ES:freetype-devel-0:2.1.4-12.el3.s390", "3ES:freetype-devel-0:2.1.4-12.el3.s390x", "3ES:freetype-devel-0:2.1.4-12.el3.x86_64", "3WS:freetype-0:2.1.4-12.el3.i386", "3WS:freetype-0:2.1.4-12.el3.ia64", "3WS:freetype-0:2.1.4-12.el3.ppc", "3WS:freetype-0:2.1.4-12.el3.ppc64", "3WS:freetype-0:2.1.4-12.el3.s390", "3WS:freetype-0:2.1.4-12.el3.s390x", "3WS:freetype-0:2.1.4-12.el3.src", "3WS:freetype-0:2.1.4-12.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3WS:freetype-devel-0:2.1.4-12.el3.i386", "3WS:freetype-devel-0:2.1.4-12.el3.ia64", "3WS:freetype-devel-0:2.1.4-12.el3.ppc", "3WS:freetype-devel-0:2.1.4-12.el3.s390", "3WS:freetype-devel-0:2.1.4-12.el3.s390x", "3WS:freetype-devel-0:2.1.4-12.el3.x86_64", "4AS:freetype-0:2.1.9-10.el4.7.i386", "4AS:freetype-0:2.1.9-10.el4.7.ia64", "4AS:freetype-0:2.1.9-10.el4.7.ppc", "4AS:freetype-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-0:2.1.9-10.el4.7.s390", "4AS:freetype-0:2.1.9-10.el4.7.s390x", "4AS:freetype-0:2.1.9-10.el4.7.src", "4AS:freetype-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-demos-0:2.1.9-10.el4.7.i386", "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-devel-0:2.1.9-10.el4.7.i386", "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-utils-0:2.1.9-10.el4.7.i386", "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-0:2.1.9-10.el4.7.src", "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-0:2.1.9-10.el4.7.i386", "4ES:freetype-0:2.1.9-10.el4.7.ia64", "4ES:freetype-0:2.1.9-10.el4.7.ppc", "4ES:freetype-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-0:2.1.9-10.el4.7.s390", "4ES:freetype-0:2.1.9-10.el4.7.s390x", "4ES:freetype-0:2.1.9-10.el4.7.src", "4ES:freetype-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-demos-0:2.1.9-10.el4.7.i386", "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64", "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x", "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-devel-0:2.1.9-10.el4.7.i386", "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64", "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x", "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-utils-0:2.1.9-10.el4.7.i386", "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64", "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x", "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-0:2.1.9-10.el4.7.i386", "4WS:freetype-0:2.1.9-10.el4.7.ia64", "4WS:freetype-0:2.1.9-10.el4.7.ppc", "4WS:freetype-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-0:2.1.9-10.el4.7.s390", "4WS:freetype-0:2.1.9-10.el4.7.s390x", "4WS:freetype-0:2.1.9-10.el4.7.src", "4WS:freetype-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-demos-0:2.1.9-10.el4.7.i386", "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-devel-0:2.1.9-10.el4.7.i386", "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-utils-0:2.1.9-10.el4.7.i386", "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0329" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "freetype: multiple integer overflow vulnerabilities" }, { "cve": "CVE-2007-2754", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2007-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "240200" } ], "notes": [ { "category": "description", "text": "Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype integer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:freetype-0:2.1.4-12.el3.i386", "3AS:freetype-0:2.1.4-12.el3.ia64", "3AS:freetype-0:2.1.4-12.el3.ppc", "3AS:freetype-0:2.1.4-12.el3.ppc64", "3AS:freetype-0:2.1.4-12.el3.s390", "3AS:freetype-0:2.1.4-12.el3.s390x", "3AS:freetype-0:2.1.4-12.el3.src", "3AS:freetype-0:2.1.4-12.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3AS:freetype-devel-0:2.1.4-12.el3.i386", "3AS:freetype-devel-0:2.1.4-12.el3.ia64", "3AS:freetype-devel-0:2.1.4-12.el3.ppc", "3AS:freetype-devel-0:2.1.4-12.el3.s390", "3AS:freetype-devel-0:2.1.4-12.el3.s390x", "3AS:freetype-devel-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-0:2.1.4-12.el3.i386", "3Desktop:freetype-0:2.1.4-12.el3.ia64", "3Desktop:freetype-0:2.1.4-12.el3.ppc", "3Desktop:freetype-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-0:2.1.4-12.el3.s390", "3Desktop:freetype-0:2.1.4-12.el3.s390x", "3Desktop:freetype-0:2.1.4-12.el3.src", "3Desktop:freetype-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-12.el3.i386", "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64", "3ES:freetype-0:2.1.4-12.el3.i386", "3ES:freetype-0:2.1.4-12.el3.ia64", "3ES:freetype-0:2.1.4-12.el3.ppc", "3ES:freetype-0:2.1.4-12.el3.ppc64", "3ES:freetype-0:2.1.4-12.el3.s390", "3ES:freetype-0:2.1.4-12.el3.s390x", "3ES:freetype-0:2.1.4-12.el3.src", "3ES:freetype-0:2.1.4-12.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3ES:freetype-devel-0:2.1.4-12.el3.i386", "3ES:freetype-devel-0:2.1.4-12.el3.ia64", "3ES:freetype-devel-0:2.1.4-12.el3.ppc", "3ES:freetype-devel-0:2.1.4-12.el3.s390", "3ES:freetype-devel-0:2.1.4-12.el3.s390x", "3ES:freetype-devel-0:2.1.4-12.el3.x86_64", "3WS:freetype-0:2.1.4-12.el3.i386", "3WS:freetype-0:2.1.4-12.el3.ia64", "3WS:freetype-0:2.1.4-12.el3.ppc", "3WS:freetype-0:2.1.4-12.el3.ppc64", "3WS:freetype-0:2.1.4-12.el3.s390", "3WS:freetype-0:2.1.4-12.el3.s390x", "3WS:freetype-0:2.1.4-12.el3.src", "3WS:freetype-0:2.1.4-12.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3WS:freetype-devel-0:2.1.4-12.el3.i386", "3WS:freetype-devel-0:2.1.4-12.el3.ia64", "3WS:freetype-devel-0:2.1.4-12.el3.ppc", "3WS:freetype-devel-0:2.1.4-12.el3.s390", "3WS:freetype-devel-0:2.1.4-12.el3.s390x", "3WS:freetype-devel-0:2.1.4-12.el3.x86_64", "4AS:freetype-0:2.1.9-10.el4.7.i386", "4AS:freetype-0:2.1.9-10.el4.7.ia64", "4AS:freetype-0:2.1.9-10.el4.7.ppc", "4AS:freetype-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-0:2.1.9-10.el4.7.s390", "4AS:freetype-0:2.1.9-10.el4.7.s390x", "4AS:freetype-0:2.1.9-10.el4.7.src", "4AS:freetype-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-demos-0:2.1.9-10.el4.7.i386", "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-devel-0:2.1.9-10.el4.7.i386", "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-utils-0:2.1.9-10.el4.7.i386", "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-0:2.1.9-10.el4.7.src", "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-0:2.1.9-10.el4.7.i386", "4ES:freetype-0:2.1.9-10.el4.7.ia64", "4ES:freetype-0:2.1.9-10.el4.7.ppc", "4ES:freetype-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-0:2.1.9-10.el4.7.s390", "4ES:freetype-0:2.1.9-10.el4.7.s390x", "4ES:freetype-0:2.1.9-10.el4.7.src", "4ES:freetype-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-demos-0:2.1.9-10.el4.7.i386", "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64", "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x", "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-devel-0:2.1.9-10.el4.7.i386", "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64", "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x", "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-utils-0:2.1.9-10.el4.7.i386", "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64", "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x", "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-0:2.1.9-10.el4.7.i386", "4WS:freetype-0:2.1.9-10.el4.7.ia64", "4WS:freetype-0:2.1.9-10.el4.7.ppc", "4WS:freetype-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-0:2.1.9-10.el4.7.s390", "4WS:freetype-0:2.1.9-10.el4.7.s390x", "4WS:freetype-0:2.1.9-10.el4.7.src", "4WS:freetype-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-demos-0:2.1.9-10.el4.7.i386", "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-devel-0:2.1.9-10.el4.7.i386", "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-utils-0:2.1.9-10.el4.7.i386", "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2754" }, { "category": "external", "summary": "RHBZ#240200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2754", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754" } ], "release_date": "2007-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:freetype-0:2.1.4-12.el3.i386", "3AS:freetype-0:2.1.4-12.el3.ia64", "3AS:freetype-0:2.1.4-12.el3.ppc", "3AS:freetype-0:2.1.4-12.el3.ppc64", "3AS:freetype-0:2.1.4-12.el3.s390", "3AS:freetype-0:2.1.4-12.el3.s390x", "3AS:freetype-0:2.1.4-12.el3.src", "3AS:freetype-0:2.1.4-12.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3AS:freetype-devel-0:2.1.4-12.el3.i386", "3AS:freetype-devel-0:2.1.4-12.el3.ia64", "3AS:freetype-devel-0:2.1.4-12.el3.ppc", "3AS:freetype-devel-0:2.1.4-12.el3.s390", "3AS:freetype-devel-0:2.1.4-12.el3.s390x", "3AS:freetype-devel-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-0:2.1.4-12.el3.i386", "3Desktop:freetype-0:2.1.4-12.el3.ia64", "3Desktop:freetype-0:2.1.4-12.el3.ppc", "3Desktop:freetype-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-0:2.1.4-12.el3.s390", "3Desktop:freetype-0:2.1.4-12.el3.s390x", "3Desktop:freetype-0:2.1.4-12.el3.src", "3Desktop:freetype-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-12.el3.i386", "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64", "3ES:freetype-0:2.1.4-12.el3.i386", "3ES:freetype-0:2.1.4-12.el3.ia64", "3ES:freetype-0:2.1.4-12.el3.ppc", "3ES:freetype-0:2.1.4-12.el3.ppc64", "3ES:freetype-0:2.1.4-12.el3.s390", "3ES:freetype-0:2.1.4-12.el3.s390x", "3ES:freetype-0:2.1.4-12.el3.src", "3ES:freetype-0:2.1.4-12.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3ES:freetype-devel-0:2.1.4-12.el3.i386", "3ES:freetype-devel-0:2.1.4-12.el3.ia64", "3ES:freetype-devel-0:2.1.4-12.el3.ppc", "3ES:freetype-devel-0:2.1.4-12.el3.s390", "3ES:freetype-devel-0:2.1.4-12.el3.s390x", "3ES:freetype-devel-0:2.1.4-12.el3.x86_64", "3WS:freetype-0:2.1.4-12.el3.i386", "3WS:freetype-0:2.1.4-12.el3.ia64", "3WS:freetype-0:2.1.4-12.el3.ppc", "3WS:freetype-0:2.1.4-12.el3.ppc64", "3WS:freetype-0:2.1.4-12.el3.s390", "3WS:freetype-0:2.1.4-12.el3.s390x", "3WS:freetype-0:2.1.4-12.el3.src", "3WS:freetype-0:2.1.4-12.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3WS:freetype-devel-0:2.1.4-12.el3.i386", "3WS:freetype-devel-0:2.1.4-12.el3.ia64", "3WS:freetype-devel-0:2.1.4-12.el3.ppc", "3WS:freetype-devel-0:2.1.4-12.el3.s390", "3WS:freetype-devel-0:2.1.4-12.el3.s390x", "3WS:freetype-devel-0:2.1.4-12.el3.x86_64", "4AS:freetype-0:2.1.9-10.el4.7.i386", "4AS:freetype-0:2.1.9-10.el4.7.ia64", "4AS:freetype-0:2.1.9-10.el4.7.ppc", "4AS:freetype-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-0:2.1.9-10.el4.7.s390", "4AS:freetype-0:2.1.9-10.el4.7.s390x", "4AS:freetype-0:2.1.9-10.el4.7.src", "4AS:freetype-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-demos-0:2.1.9-10.el4.7.i386", "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-devel-0:2.1.9-10.el4.7.i386", "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-utils-0:2.1.9-10.el4.7.i386", "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-0:2.1.9-10.el4.7.src", "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-0:2.1.9-10.el4.7.i386", "4ES:freetype-0:2.1.9-10.el4.7.ia64", "4ES:freetype-0:2.1.9-10.el4.7.ppc", "4ES:freetype-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-0:2.1.9-10.el4.7.s390", "4ES:freetype-0:2.1.9-10.el4.7.s390x", "4ES:freetype-0:2.1.9-10.el4.7.src", "4ES:freetype-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-demos-0:2.1.9-10.el4.7.i386", "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64", "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x", "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-devel-0:2.1.9-10.el4.7.i386", "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64", "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x", "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-utils-0:2.1.9-10.el4.7.i386", "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64", "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x", "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-0:2.1.9-10.el4.7.i386", "4WS:freetype-0:2.1.9-10.el4.7.ia64", "4WS:freetype-0:2.1.9-10.el4.7.ppc", "4WS:freetype-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-0:2.1.9-10.el4.7.s390", "4WS:freetype-0:2.1.9-10.el4.7.s390x", "4WS:freetype-0:2.1.9-10.el4.7.src", "4WS:freetype-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-demos-0:2.1.9-10.el4.7.i386", "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-devel-0:2.1.9-10.el4.7.i386", "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-utils-0:2.1.9-10.el4.7.i386", "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0329" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "freetype integer overflow" }, { "cve": "CVE-2008-1808", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2008-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "450774" } ], "notes": [ { "category": "description", "text": "Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "FreeType off-by-one flaws", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:freetype-0:2.1.4-12.el3.i386", "3AS:freetype-0:2.1.4-12.el3.ia64", "3AS:freetype-0:2.1.4-12.el3.ppc", "3AS:freetype-0:2.1.4-12.el3.ppc64", "3AS:freetype-0:2.1.4-12.el3.s390", "3AS:freetype-0:2.1.4-12.el3.s390x", "3AS:freetype-0:2.1.4-12.el3.src", "3AS:freetype-0:2.1.4-12.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3AS:freetype-devel-0:2.1.4-12.el3.i386", "3AS:freetype-devel-0:2.1.4-12.el3.ia64", "3AS:freetype-devel-0:2.1.4-12.el3.ppc", "3AS:freetype-devel-0:2.1.4-12.el3.s390", "3AS:freetype-devel-0:2.1.4-12.el3.s390x", "3AS:freetype-devel-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-0:2.1.4-12.el3.i386", "3Desktop:freetype-0:2.1.4-12.el3.ia64", "3Desktop:freetype-0:2.1.4-12.el3.ppc", "3Desktop:freetype-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-0:2.1.4-12.el3.s390", "3Desktop:freetype-0:2.1.4-12.el3.s390x", "3Desktop:freetype-0:2.1.4-12.el3.src", "3Desktop:freetype-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-12.el3.i386", "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64", "3ES:freetype-0:2.1.4-12.el3.i386", "3ES:freetype-0:2.1.4-12.el3.ia64", "3ES:freetype-0:2.1.4-12.el3.ppc", "3ES:freetype-0:2.1.4-12.el3.ppc64", "3ES:freetype-0:2.1.4-12.el3.s390", "3ES:freetype-0:2.1.4-12.el3.s390x", "3ES:freetype-0:2.1.4-12.el3.src", "3ES:freetype-0:2.1.4-12.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3ES:freetype-devel-0:2.1.4-12.el3.i386", "3ES:freetype-devel-0:2.1.4-12.el3.ia64", "3ES:freetype-devel-0:2.1.4-12.el3.ppc", "3ES:freetype-devel-0:2.1.4-12.el3.s390", "3ES:freetype-devel-0:2.1.4-12.el3.s390x", "3ES:freetype-devel-0:2.1.4-12.el3.x86_64", "3WS:freetype-0:2.1.4-12.el3.i386", "3WS:freetype-0:2.1.4-12.el3.ia64", "3WS:freetype-0:2.1.4-12.el3.ppc", "3WS:freetype-0:2.1.4-12.el3.ppc64", "3WS:freetype-0:2.1.4-12.el3.s390", "3WS:freetype-0:2.1.4-12.el3.s390x", "3WS:freetype-0:2.1.4-12.el3.src", "3WS:freetype-0:2.1.4-12.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3WS:freetype-devel-0:2.1.4-12.el3.i386", "3WS:freetype-devel-0:2.1.4-12.el3.ia64", "3WS:freetype-devel-0:2.1.4-12.el3.ppc", "3WS:freetype-devel-0:2.1.4-12.el3.s390", "3WS:freetype-devel-0:2.1.4-12.el3.s390x", "3WS:freetype-devel-0:2.1.4-12.el3.x86_64", "4AS:freetype-0:2.1.9-10.el4.7.i386", "4AS:freetype-0:2.1.9-10.el4.7.ia64", "4AS:freetype-0:2.1.9-10.el4.7.ppc", "4AS:freetype-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-0:2.1.9-10.el4.7.s390", "4AS:freetype-0:2.1.9-10.el4.7.s390x", "4AS:freetype-0:2.1.9-10.el4.7.src", "4AS:freetype-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-demos-0:2.1.9-10.el4.7.i386", "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-devel-0:2.1.9-10.el4.7.i386", "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-utils-0:2.1.9-10.el4.7.i386", "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-0:2.1.9-10.el4.7.src", "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-0:2.1.9-10.el4.7.i386", "4ES:freetype-0:2.1.9-10.el4.7.ia64", "4ES:freetype-0:2.1.9-10.el4.7.ppc", "4ES:freetype-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-0:2.1.9-10.el4.7.s390", "4ES:freetype-0:2.1.9-10.el4.7.s390x", "4ES:freetype-0:2.1.9-10.el4.7.src", "4ES:freetype-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-demos-0:2.1.9-10.el4.7.i386", "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64", "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x", "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-devel-0:2.1.9-10.el4.7.i386", "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64", "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x", "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-utils-0:2.1.9-10.el4.7.i386", "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64", "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x", "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-0:2.1.9-10.el4.7.i386", "4WS:freetype-0:2.1.9-10.el4.7.ia64", "4WS:freetype-0:2.1.9-10.el4.7.ppc", "4WS:freetype-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-0:2.1.9-10.el4.7.s390", "4WS:freetype-0:2.1.9-10.el4.7.s390x", "4WS:freetype-0:2.1.9-10.el4.7.src", "4WS:freetype-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-demos-0:2.1.9-10.el4.7.i386", "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-devel-0:2.1.9-10.el4.7.i386", "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-utils-0:2.1.9-10.el4.7.i386", "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1808" }, { "category": "external", "summary": "RHBZ#450774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450774" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1808", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1808" } ], "release_date": "2008-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:freetype-0:2.1.4-12.el3.i386", "3AS:freetype-0:2.1.4-12.el3.ia64", "3AS:freetype-0:2.1.4-12.el3.ppc", "3AS:freetype-0:2.1.4-12.el3.ppc64", "3AS:freetype-0:2.1.4-12.el3.s390", "3AS:freetype-0:2.1.4-12.el3.s390x", "3AS:freetype-0:2.1.4-12.el3.src", "3AS:freetype-0:2.1.4-12.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3AS:freetype-devel-0:2.1.4-12.el3.i386", "3AS:freetype-devel-0:2.1.4-12.el3.ia64", "3AS:freetype-devel-0:2.1.4-12.el3.ppc", "3AS:freetype-devel-0:2.1.4-12.el3.s390", "3AS:freetype-devel-0:2.1.4-12.el3.s390x", "3AS:freetype-devel-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-0:2.1.4-12.el3.i386", "3Desktop:freetype-0:2.1.4-12.el3.ia64", "3Desktop:freetype-0:2.1.4-12.el3.ppc", "3Desktop:freetype-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-0:2.1.4-12.el3.s390", "3Desktop:freetype-0:2.1.4-12.el3.s390x", "3Desktop:freetype-0:2.1.4-12.el3.src", "3Desktop:freetype-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-12.el3.i386", "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64", "3ES:freetype-0:2.1.4-12.el3.i386", "3ES:freetype-0:2.1.4-12.el3.ia64", "3ES:freetype-0:2.1.4-12.el3.ppc", "3ES:freetype-0:2.1.4-12.el3.ppc64", "3ES:freetype-0:2.1.4-12.el3.s390", "3ES:freetype-0:2.1.4-12.el3.s390x", "3ES:freetype-0:2.1.4-12.el3.src", "3ES:freetype-0:2.1.4-12.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3ES:freetype-devel-0:2.1.4-12.el3.i386", "3ES:freetype-devel-0:2.1.4-12.el3.ia64", "3ES:freetype-devel-0:2.1.4-12.el3.ppc", "3ES:freetype-devel-0:2.1.4-12.el3.s390", "3ES:freetype-devel-0:2.1.4-12.el3.s390x", "3ES:freetype-devel-0:2.1.4-12.el3.x86_64", "3WS:freetype-0:2.1.4-12.el3.i386", "3WS:freetype-0:2.1.4-12.el3.ia64", "3WS:freetype-0:2.1.4-12.el3.ppc", "3WS:freetype-0:2.1.4-12.el3.ppc64", "3WS:freetype-0:2.1.4-12.el3.s390", "3WS:freetype-0:2.1.4-12.el3.s390x", "3WS:freetype-0:2.1.4-12.el3.src", "3WS:freetype-0:2.1.4-12.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3WS:freetype-devel-0:2.1.4-12.el3.i386", "3WS:freetype-devel-0:2.1.4-12.el3.ia64", "3WS:freetype-devel-0:2.1.4-12.el3.ppc", "3WS:freetype-devel-0:2.1.4-12.el3.s390", "3WS:freetype-devel-0:2.1.4-12.el3.s390x", "3WS:freetype-devel-0:2.1.4-12.el3.x86_64", "4AS:freetype-0:2.1.9-10.el4.7.i386", "4AS:freetype-0:2.1.9-10.el4.7.ia64", "4AS:freetype-0:2.1.9-10.el4.7.ppc", "4AS:freetype-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-0:2.1.9-10.el4.7.s390", "4AS:freetype-0:2.1.9-10.el4.7.s390x", "4AS:freetype-0:2.1.9-10.el4.7.src", "4AS:freetype-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-demos-0:2.1.9-10.el4.7.i386", "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-devel-0:2.1.9-10.el4.7.i386", "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-utils-0:2.1.9-10.el4.7.i386", "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-0:2.1.9-10.el4.7.src", "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-0:2.1.9-10.el4.7.i386", "4ES:freetype-0:2.1.9-10.el4.7.ia64", "4ES:freetype-0:2.1.9-10.el4.7.ppc", "4ES:freetype-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-0:2.1.9-10.el4.7.s390", "4ES:freetype-0:2.1.9-10.el4.7.s390x", "4ES:freetype-0:2.1.9-10.el4.7.src", "4ES:freetype-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-demos-0:2.1.9-10.el4.7.i386", "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64", "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x", "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-devel-0:2.1.9-10.el4.7.i386", "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64", "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x", "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-utils-0:2.1.9-10.el4.7.i386", "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64", "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x", "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-0:2.1.9-10.el4.7.i386", "4WS:freetype-0:2.1.9-10.el4.7.ia64", "4WS:freetype-0:2.1.9-10.el4.7.ppc", "4WS:freetype-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-0:2.1.9-10.el4.7.s390", "4WS:freetype-0:2.1.9-10.el4.7.s390x", "4WS:freetype-0:2.1.9-10.el4.7.src", "4WS:freetype-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-demos-0:2.1.9-10.el4.7.i386", "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-devel-0:2.1.9-10.el4.7.i386", "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-utils-0:2.1.9-10.el4.7.i386", "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0329" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "FreeType off-by-one flaws" }, { "cve": "CVE-2009-0946", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491384" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "freetype: multiple integer overflows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:freetype-0:2.1.4-12.el3.i386", "3AS:freetype-0:2.1.4-12.el3.ia64", "3AS:freetype-0:2.1.4-12.el3.ppc", "3AS:freetype-0:2.1.4-12.el3.ppc64", "3AS:freetype-0:2.1.4-12.el3.s390", "3AS:freetype-0:2.1.4-12.el3.s390x", "3AS:freetype-0:2.1.4-12.el3.src", "3AS:freetype-0:2.1.4-12.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3AS:freetype-devel-0:2.1.4-12.el3.i386", "3AS:freetype-devel-0:2.1.4-12.el3.ia64", "3AS:freetype-devel-0:2.1.4-12.el3.ppc", "3AS:freetype-devel-0:2.1.4-12.el3.s390", "3AS:freetype-devel-0:2.1.4-12.el3.s390x", "3AS:freetype-devel-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-0:2.1.4-12.el3.i386", "3Desktop:freetype-0:2.1.4-12.el3.ia64", "3Desktop:freetype-0:2.1.4-12.el3.ppc", "3Desktop:freetype-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-0:2.1.4-12.el3.s390", "3Desktop:freetype-0:2.1.4-12.el3.s390x", "3Desktop:freetype-0:2.1.4-12.el3.src", "3Desktop:freetype-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-12.el3.i386", "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64", "3ES:freetype-0:2.1.4-12.el3.i386", "3ES:freetype-0:2.1.4-12.el3.ia64", "3ES:freetype-0:2.1.4-12.el3.ppc", "3ES:freetype-0:2.1.4-12.el3.ppc64", "3ES:freetype-0:2.1.4-12.el3.s390", "3ES:freetype-0:2.1.4-12.el3.s390x", "3ES:freetype-0:2.1.4-12.el3.src", "3ES:freetype-0:2.1.4-12.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3ES:freetype-devel-0:2.1.4-12.el3.i386", "3ES:freetype-devel-0:2.1.4-12.el3.ia64", "3ES:freetype-devel-0:2.1.4-12.el3.ppc", "3ES:freetype-devel-0:2.1.4-12.el3.s390", "3ES:freetype-devel-0:2.1.4-12.el3.s390x", "3ES:freetype-devel-0:2.1.4-12.el3.x86_64", "3WS:freetype-0:2.1.4-12.el3.i386", "3WS:freetype-0:2.1.4-12.el3.ia64", "3WS:freetype-0:2.1.4-12.el3.ppc", "3WS:freetype-0:2.1.4-12.el3.ppc64", "3WS:freetype-0:2.1.4-12.el3.s390", "3WS:freetype-0:2.1.4-12.el3.s390x", "3WS:freetype-0:2.1.4-12.el3.src", "3WS:freetype-0:2.1.4-12.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3WS:freetype-devel-0:2.1.4-12.el3.i386", "3WS:freetype-devel-0:2.1.4-12.el3.ia64", "3WS:freetype-devel-0:2.1.4-12.el3.ppc", "3WS:freetype-devel-0:2.1.4-12.el3.s390", "3WS:freetype-devel-0:2.1.4-12.el3.s390x", "3WS:freetype-devel-0:2.1.4-12.el3.x86_64", "4AS:freetype-0:2.1.9-10.el4.7.i386", "4AS:freetype-0:2.1.9-10.el4.7.ia64", "4AS:freetype-0:2.1.9-10.el4.7.ppc", "4AS:freetype-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-0:2.1.9-10.el4.7.s390", "4AS:freetype-0:2.1.9-10.el4.7.s390x", "4AS:freetype-0:2.1.9-10.el4.7.src", "4AS:freetype-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-demos-0:2.1.9-10.el4.7.i386", "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-devel-0:2.1.9-10.el4.7.i386", "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-utils-0:2.1.9-10.el4.7.i386", "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-0:2.1.9-10.el4.7.src", "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-0:2.1.9-10.el4.7.i386", "4ES:freetype-0:2.1.9-10.el4.7.ia64", "4ES:freetype-0:2.1.9-10.el4.7.ppc", "4ES:freetype-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-0:2.1.9-10.el4.7.s390", "4ES:freetype-0:2.1.9-10.el4.7.s390x", "4ES:freetype-0:2.1.9-10.el4.7.src", "4ES:freetype-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-demos-0:2.1.9-10.el4.7.i386", "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64", "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x", "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-devel-0:2.1.9-10.el4.7.i386", "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64", "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x", "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-utils-0:2.1.9-10.el4.7.i386", "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64", "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x", "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-0:2.1.9-10.el4.7.i386", "4WS:freetype-0:2.1.9-10.el4.7.ia64", "4WS:freetype-0:2.1.9-10.el4.7.ppc", "4WS:freetype-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-0:2.1.9-10.el4.7.s390", "4WS:freetype-0:2.1.9-10.el4.7.s390x", "4WS:freetype-0:2.1.9-10.el4.7.src", "4WS:freetype-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-demos-0:2.1.9-10.el4.7.i386", "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-devel-0:2.1.9-10.el4.7.i386", "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-utils-0:2.1.9-10.el4.7.i386", "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0946" }, { "category": "external", "summary": "RHBZ#491384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0946", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0946" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0946", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0946" } ], "release_date": "2009-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-05-22T12:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:freetype-0:2.1.4-12.el3.i386", "3AS:freetype-0:2.1.4-12.el3.ia64", "3AS:freetype-0:2.1.4-12.el3.ppc", "3AS:freetype-0:2.1.4-12.el3.ppc64", "3AS:freetype-0:2.1.4-12.el3.s390", "3AS:freetype-0:2.1.4-12.el3.s390x", "3AS:freetype-0:2.1.4-12.el3.src", "3AS:freetype-0:2.1.4-12.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3AS:freetype-devel-0:2.1.4-12.el3.i386", "3AS:freetype-devel-0:2.1.4-12.el3.ia64", "3AS:freetype-devel-0:2.1.4-12.el3.ppc", "3AS:freetype-devel-0:2.1.4-12.el3.s390", "3AS:freetype-devel-0:2.1.4-12.el3.s390x", "3AS:freetype-devel-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-0:2.1.4-12.el3.i386", "3Desktop:freetype-0:2.1.4-12.el3.ia64", "3Desktop:freetype-0:2.1.4-12.el3.ppc", "3Desktop:freetype-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-0:2.1.4-12.el3.s390", "3Desktop:freetype-0:2.1.4-12.el3.s390x", "3Desktop:freetype-0:2.1.4-12.el3.src", "3Desktop:freetype-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-12.el3.i386", "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64", "3ES:freetype-0:2.1.4-12.el3.i386", "3ES:freetype-0:2.1.4-12.el3.ia64", "3ES:freetype-0:2.1.4-12.el3.ppc", "3ES:freetype-0:2.1.4-12.el3.ppc64", "3ES:freetype-0:2.1.4-12.el3.s390", "3ES:freetype-0:2.1.4-12.el3.s390x", "3ES:freetype-0:2.1.4-12.el3.src", "3ES:freetype-0:2.1.4-12.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3ES:freetype-devel-0:2.1.4-12.el3.i386", "3ES:freetype-devel-0:2.1.4-12.el3.ia64", "3ES:freetype-devel-0:2.1.4-12.el3.ppc", "3ES:freetype-devel-0:2.1.4-12.el3.s390", "3ES:freetype-devel-0:2.1.4-12.el3.s390x", "3ES:freetype-devel-0:2.1.4-12.el3.x86_64", "3WS:freetype-0:2.1.4-12.el3.i386", "3WS:freetype-0:2.1.4-12.el3.ia64", "3WS:freetype-0:2.1.4-12.el3.ppc", "3WS:freetype-0:2.1.4-12.el3.ppc64", "3WS:freetype-0:2.1.4-12.el3.s390", "3WS:freetype-0:2.1.4-12.el3.s390x", "3WS:freetype-0:2.1.4-12.el3.src", "3WS:freetype-0:2.1.4-12.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3WS:freetype-devel-0:2.1.4-12.el3.i386", "3WS:freetype-devel-0:2.1.4-12.el3.ia64", "3WS:freetype-devel-0:2.1.4-12.el3.ppc", "3WS:freetype-devel-0:2.1.4-12.el3.s390", "3WS:freetype-devel-0:2.1.4-12.el3.s390x", "3WS:freetype-devel-0:2.1.4-12.el3.x86_64", "4AS:freetype-0:2.1.9-10.el4.7.i386", "4AS:freetype-0:2.1.9-10.el4.7.ia64", "4AS:freetype-0:2.1.9-10.el4.7.ppc", "4AS:freetype-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-0:2.1.9-10.el4.7.s390", "4AS:freetype-0:2.1.9-10.el4.7.s390x", "4AS:freetype-0:2.1.9-10.el4.7.src", "4AS:freetype-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-demos-0:2.1.9-10.el4.7.i386", "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-devel-0:2.1.9-10.el4.7.i386", "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-utils-0:2.1.9-10.el4.7.i386", "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-0:2.1.9-10.el4.7.src", "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-0:2.1.9-10.el4.7.i386", "4ES:freetype-0:2.1.9-10.el4.7.ia64", "4ES:freetype-0:2.1.9-10.el4.7.ppc", "4ES:freetype-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-0:2.1.9-10.el4.7.s390", "4ES:freetype-0:2.1.9-10.el4.7.s390x", "4ES:freetype-0:2.1.9-10.el4.7.src", "4ES:freetype-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-demos-0:2.1.9-10.el4.7.i386", "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64", "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x", "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-devel-0:2.1.9-10.el4.7.i386", "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64", "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x", "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-utils-0:2.1.9-10.el4.7.i386", "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64", "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x", "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-0:2.1.9-10.el4.7.i386", "4WS:freetype-0:2.1.9-10.el4.7.ia64", "4WS:freetype-0:2.1.9-10.el4.7.ppc", "4WS:freetype-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-0:2.1.9-10.el4.7.s390", "4WS:freetype-0:2.1.9-10.el4.7.s390x", "4WS:freetype-0:2.1.9-10.el4.7.src", "4WS:freetype-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-demos-0:2.1.9-10.el4.7.i386", "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-devel-0:2.1.9-10.el4.7.i386", "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-utils-0:2.1.9-10.el4.7.i386", "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0329" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:freetype-0:2.1.4-12.el3.i386", "3AS:freetype-0:2.1.4-12.el3.ia64", "3AS:freetype-0:2.1.4-12.el3.ppc", "3AS:freetype-0:2.1.4-12.el3.ppc64", "3AS:freetype-0:2.1.4-12.el3.s390", "3AS:freetype-0:2.1.4-12.el3.s390x", "3AS:freetype-0:2.1.4-12.el3.src", "3AS:freetype-0:2.1.4-12.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3AS:freetype-devel-0:2.1.4-12.el3.i386", "3AS:freetype-devel-0:2.1.4-12.el3.ia64", "3AS:freetype-devel-0:2.1.4-12.el3.ppc", "3AS:freetype-devel-0:2.1.4-12.el3.s390", "3AS:freetype-devel-0:2.1.4-12.el3.s390x", "3AS:freetype-devel-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-0:2.1.4-12.el3.i386", "3Desktop:freetype-0:2.1.4-12.el3.ia64", "3Desktop:freetype-0:2.1.4-12.el3.ppc", "3Desktop:freetype-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-0:2.1.4-12.el3.s390", "3Desktop:freetype-0:2.1.4-12.el3.s390x", "3Desktop:freetype-0:2.1.4-12.el3.src", "3Desktop:freetype-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-12.el3.i386", "3Desktop:freetype-devel-0:2.1.4-12.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-12.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390", "3Desktop:freetype-devel-0:2.1.4-12.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-12.el3.x86_64", "3ES:freetype-0:2.1.4-12.el3.i386", "3ES:freetype-0:2.1.4-12.el3.ia64", "3ES:freetype-0:2.1.4-12.el3.ppc", "3ES:freetype-0:2.1.4-12.el3.ppc64", "3ES:freetype-0:2.1.4-12.el3.s390", "3ES:freetype-0:2.1.4-12.el3.s390x", "3ES:freetype-0:2.1.4-12.el3.src", "3ES:freetype-0:2.1.4-12.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3ES:freetype-devel-0:2.1.4-12.el3.i386", "3ES:freetype-devel-0:2.1.4-12.el3.ia64", "3ES:freetype-devel-0:2.1.4-12.el3.ppc", "3ES:freetype-devel-0:2.1.4-12.el3.s390", "3ES:freetype-devel-0:2.1.4-12.el3.s390x", "3ES:freetype-devel-0:2.1.4-12.el3.x86_64", "3WS:freetype-0:2.1.4-12.el3.i386", "3WS:freetype-0:2.1.4-12.el3.ia64", "3WS:freetype-0:2.1.4-12.el3.ppc", "3WS:freetype-0:2.1.4-12.el3.ppc64", "3WS:freetype-0:2.1.4-12.el3.s390", "3WS:freetype-0:2.1.4-12.el3.s390x", "3WS:freetype-0:2.1.4-12.el3.src", "3WS:freetype-0:2.1.4-12.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-12.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-12.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-12.el3.x86_64", "3WS:freetype-devel-0:2.1.4-12.el3.i386", "3WS:freetype-devel-0:2.1.4-12.el3.ia64", "3WS:freetype-devel-0:2.1.4-12.el3.ppc", "3WS:freetype-devel-0:2.1.4-12.el3.s390", "3WS:freetype-devel-0:2.1.4-12.el3.s390x", "3WS:freetype-devel-0:2.1.4-12.el3.x86_64", "4AS:freetype-0:2.1.9-10.el4.7.i386", "4AS:freetype-0:2.1.9-10.el4.7.ia64", "4AS:freetype-0:2.1.9-10.el4.7.ppc", "4AS:freetype-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-0:2.1.9-10.el4.7.s390", "4AS:freetype-0:2.1.9-10.el4.7.s390x", "4AS:freetype-0:2.1.9-10.el4.7.src", "4AS:freetype-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4AS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-demos-0:2.1.9-10.el4.7.i386", "4AS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4AS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390", "4AS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4AS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-devel-0:2.1.9-10.el4.7.i386", "4AS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4AS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390", "4AS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4AS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4AS:freetype-utils-0:2.1.9-10.el4.7.i386", "4AS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4AS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390", "4AS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4AS:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-0:2.1.9-10.el4.7.src", "4Desktop:freetype-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.i386", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ia64", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.ppc", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.s390x", "4Desktop:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-0:2.1.9-10.el4.7.i386", "4ES:freetype-0:2.1.9-10.el4.7.ia64", "4ES:freetype-0:2.1.9-10.el4.7.ppc", "4ES:freetype-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-0:2.1.9-10.el4.7.s390", "4ES:freetype-0:2.1.9-10.el4.7.s390x", "4ES:freetype-0:2.1.9-10.el4.7.src", "4ES:freetype-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4ES:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-demos-0:2.1.9-10.el4.7.i386", "4ES:freetype-demos-0:2.1.9-10.el4.7.ia64", "4ES:freetype-demos-0:2.1.9-10.el4.7.ppc", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390", "4ES:freetype-demos-0:2.1.9-10.el4.7.s390x", "4ES:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-devel-0:2.1.9-10.el4.7.i386", "4ES:freetype-devel-0:2.1.9-10.el4.7.ia64", "4ES:freetype-devel-0:2.1.9-10.el4.7.ppc", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390", "4ES:freetype-devel-0:2.1.9-10.el4.7.s390x", "4ES:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4ES:freetype-utils-0:2.1.9-10.el4.7.i386", "4ES:freetype-utils-0:2.1.9-10.el4.7.ia64", "4ES:freetype-utils-0:2.1.9-10.el4.7.ppc", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390", "4ES:freetype-utils-0:2.1.9-10.el4.7.s390x", "4ES:freetype-utils-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-0:2.1.9-10.el4.7.i386", "4WS:freetype-0:2.1.9-10.el4.7.ia64", "4WS:freetype-0:2.1.9-10.el4.7.ppc", "4WS:freetype-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-0:2.1.9-10.el4.7.s390", "4WS:freetype-0:2.1.9-10.el4.7.s390x", "4WS:freetype-0:2.1.9-10.el4.7.src", "4WS:freetype-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.i386", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ia64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.ppc64", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.s390x", "4WS:freetype-debuginfo-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-demos-0:2.1.9-10.el4.7.i386", "4WS:freetype-demos-0:2.1.9-10.el4.7.ia64", "4WS:freetype-demos-0:2.1.9-10.el4.7.ppc", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390", "4WS:freetype-demos-0:2.1.9-10.el4.7.s390x", "4WS:freetype-demos-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-devel-0:2.1.9-10.el4.7.i386", "4WS:freetype-devel-0:2.1.9-10.el4.7.ia64", "4WS:freetype-devel-0:2.1.9-10.el4.7.ppc", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390", "4WS:freetype-devel-0:2.1.9-10.el4.7.s390x", "4WS:freetype-devel-0:2.1.9-10.el4.7.x86_64", "4WS:freetype-utils-0:2.1.9-10.el4.7.i386", "4WS:freetype-utils-0:2.1.9-10.el4.7.ia64", "4WS:freetype-utils-0:2.1.9-10.el4.7.ppc", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390", "4WS:freetype-utils-0:2.1.9-10.el4.7.s390x", "4WS:freetype-utils-0:2.1.9-10.el4.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freetype: multiple integer overflows" } ] }
gsd-2009-0946
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2009-0946", "description": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "id": "GSD-2009-0946", "references": [ "https://www.suse.com/security/cve/CVE-2009-0946.html", "https://www.debian.org/security/2009/dsa-1784", "https://access.redhat.com/errata/RHSA-2009:1062", "https://access.redhat.com/errata/RHSA-2009:1061", "https://access.redhat.com/errata/RHSA-2009:0329", "https://linux.oracle.com/cve/CVE-2009-0946.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-0946" ], "details": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "id": "GSD-2009-0946", "modified": "2023-12-13T01:19:44.762404Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0946", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34967", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34967" }, { "name": "http://support.apple.com/kb/HT3639", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3639" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4435" }, { "name": "34913", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34913" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e" }, { "name": "ADV-2009-1621", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "34550", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34550" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3549" }, { "name": "MDVSA-2009:243", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:243" }, { "name": "APPLE-SA-2009-06-08-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "USN-767-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-767-1" }, { "name": "270268", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1" }, { "name": "35198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35198" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b" }, { "name": "35074", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35074" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5" }, { "name": "ADV-2009-1522", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "RHSA-2009:1062", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html" }, { "name": "APPLE-SA-2009-06-17-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "35065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35065" }, { "name": "DSA-1784", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1784" }, { "name": "35210", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35210" }, { "name": "GLSA-200905-05", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200905-05.xml" }, { "name": "35379", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35379" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=491384", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "name": "oval:org.mitre.oval:def:10149", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog" }, { "name": "SUSE-SR:2009:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" }, { "name": "TA09-133A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "35200", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35200" }, { "name": "http://support.apple.com/kb/HT3613", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3613" }, { "name": "RHSA-2009:0329", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "name": "ADV-2009-1058", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1058" }, { "name": "35204", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35204" }, { "name": "34723", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34723" }, { "name": "RHSA-2009:1061", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1061.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.3.9", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.2.1", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.6.4", "versionStartIncluding": "10.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.6.4", "versionStartIncluding": "10.6.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0946" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=491384", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "name": "34723", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/34723" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog", "refsource": "CONFIRM", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog" }, { "name": "ADV-2009-1058", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1058" }, { "name": "34550", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/34550" }, { "name": "34913", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/34913" }, { "name": "USN-767-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-767-1" }, { "name": "34967", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/34967" }, { "name": "DSA-1784", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2009/dsa-1784" }, { "name": "35065", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35065" }, { "name": "SUSE-SR:2009:010", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "TA09-133A", "refsource": "CERT", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "35074", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35074" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "RHSA-2009:1062", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html" }, { "name": "35200", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35200" }, { "name": "RHSA-2009:1061", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1061.html" }, { "name": "35204", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35204" }, { "name": "RHSA-2009:0329", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "name": "35198", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35198" }, { "name": "GLSA-200905-05", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200905-05.xml" }, { "name": "35210", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35210" }, { "name": "APPLE-SA-2009-06-08-1", "refsource": "APPLE", "tags": [ "Broken Link" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "ADV-2009-1522", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "http://support.apple.com/kb/HT3613", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3613" }, { "name": "35379", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35379" }, { "name": "ADV-2009-1621", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "http://support.apple.com/kb/HT3639", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3639" }, { "name": "APPLE-SA-2009-06-17-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "270268", "refsource": "SUNALERT", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1" }, { "name": "MDVSA-2009:243", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:243" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "oval:org.mitre.oval:def:10149", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2021-04-05T19:25Z", "publishedDate": "2009-04-17T00:30Z" } } }
ghsa-g82w-w4fh-33xc
Vulnerability from github
Published
2022-05-02 03:19
Modified
2022-05-02 03:19
VLAI Severity ?
Details
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
{ "affected": [], "aliases": [ "CVE-2009-0946" ], "database_specific": { "cwe_ids": [ "CWE-190" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-04-17T00:30:00Z", "severity": "HIGH" }, "details": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.", "id": "GHSA-g82w-w4fh-33xc", "modified": "2022-05-02T03:19:59Z", "published": "2022-05-02T03:19:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0946" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149" }, { "type": "WEB", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5" }, { "type": "WEB", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b" }, { "type": "WEB", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e" }, { "type": "WEB", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/34723" }, { "type": "WEB", "url": "http://secunia.com/advisories/34913" }, { "type": "WEB", "url": "http://secunia.com/advisories/34967" }, { "type": "WEB", "url": "http://secunia.com/advisories/35065" }, { "type": "WEB", "url": "http://secunia.com/advisories/35074" }, { "type": "WEB", "url": "http://secunia.com/advisories/35198" }, { "type": "WEB", "url": "http://secunia.com/advisories/35200" }, { "type": "WEB", "url": "http://secunia.com/advisories/35204" }, { "type": "WEB", "url": "http://secunia.com/advisories/35210" }, { "type": "WEB", "url": "http://secunia.com/advisories/35379" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200905-05.xml" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3549" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3613" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3639" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4435" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1784" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:243" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1061.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/34550" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-767-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1058" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1621" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2009-0946
Vulnerability from fkie_nvd
Published
2009-04-17 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | Patch, Third Party Advisory | |
cve@mitre.org | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b | Patch, Third Party Advisory | |
cve@mitre.org | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e | Patch, Third Party Advisory | |
cve@mitre.org | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog | Release Notes, Third Party Advisory | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html | Broken Link | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/34723 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/34913 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/34967 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/35065 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/35074 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/35198 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/35200 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/35204 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/35210 | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/35379 | Third Party Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200905-05.xml | Third Party Advisory | |
cve@mitre.org | http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1 | Broken Link | |
cve@mitre.org | http://support.apple.com/kb/HT3549 | Third Party Advisory | |
cve@mitre.org | http://support.apple.com/kb/HT3613 | Third Party Advisory | |
cve@mitre.org | http://support.apple.com/kb/HT3639 | Third Party Advisory | |
cve@mitre.org | http://support.apple.com/kb/HT4435 | Broken Link | |
cve@mitre.org | http://www.debian.org/security/2009/dsa-1784 | Third Party Advisory | |
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2009:243 | Third Party Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2009-0329.html | Third Party Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2009-1061.html | Third Party Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2009-1062.html | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/34550 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-767-1 | Third Party Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/1058 | Third Party Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/1297 | Third Party Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/1522 | Third Party Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/1621 | Third Party Advisory | |
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=491384 | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34723 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34913 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34967 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35065 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35074 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35198 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35200 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35204 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35210 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35379 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200905-05.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3549 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3613 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3639 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4435 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1784 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:243 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-0329.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1061.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1062.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34550 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-767-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1058 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1297 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1522 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1621 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=491384 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
freetype | freetype | * | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 5.0 | |
debian | debian_linux | 6.0 | |
canonical | ubuntu_linux | 6.06 | |
canonical | ubuntu_linux | 8.04 | |
canonical | ubuntu_linux | 8.10 | |
canonical | ubuntu_linux | 9.04 | |
opensuse | opensuse | 10.3 | |
opensuse | opensuse | 11.0 | |
opensuse | opensuse | 11.1 | |
suse | linux_enterprise_server | 10 | |
suse | linux_enterprise_server | 11 | |
apple | safari | 4.0 | |
apple | iphone_os | * | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.4.11 | |
apple | mac_os_x | 10.5.8 | |
apple | mac_os_x_server | * | |
apple | mac_os_x_server | 10.4.11 | |
apple | mac_os_x_server | 10.5.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "matchCriteriaId": "7039ABA3-F36E-4337-8F61-470B2FA1C9EF", "versionEndIncluding": "2.3.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*", "matchCriteriaId": "38C3AEB0-59E2-400A-8943-60C0A223B680", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "matchCriteriaId": "F13F07CC-739B-465C-9184-0E9D708BD4C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BDA6DB4-A0DA-43CA-AABD-10EEEEB28EAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "614C28E3-3645-4B20-95E5-42E7F123ADDB", "versionEndIncluding": "2.2.1", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6DA1D55-B689-47CF-A55F-3C16DA4EFFFF", "versionEndIncluding": "10.6.4", "versionStartIncluding": "10.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "1335E35A-D381-4056-9E78-37BC6DF8AD98", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "924AFEE6-E331-4E10-B1B8-1FF1FF801120", "versionEndIncluding": "10.6.4", "versionStartIncluding": "10.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "82B4CD59-9F37-4EF0-BA43-427CFD6E1329", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de entero en FreeType v2.3.9 y anteriores permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores relacionados con valores grandes en ciertas entradas en (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, y (3) cff/cffload.c." } ], "id": "CVE-2009-0946", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-17T00:30:00.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/34723" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/34913" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/34967" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35065" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35074" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35198" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35200" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35204" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35210" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35379" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200905-05.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3549" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3613" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3639" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://support.apple.com/kb/HT4435" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2009/dsa-1784" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:243" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1061.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/34550" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-767-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1058" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a18788b14db60ae3673f932249cd02d33a227c4e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/34723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/34913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/34967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35204" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200905-05.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270268-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://support.apple.com/kb/HT4435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2009/dsa-1784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/34550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-767-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10149" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…