Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2011:1161 - Security Advisory
Issued:
2011-08-15
Updated:
2011-08-15

RHSA-2011:1161 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: freetype security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated freetype packages that fix one security issue are now available for
Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently. These packages provide both the FreeType 1 and FreeType 2 font
engines.

A buffer overflow flaw was found in the way the FreeType library handled
malformed font files compressed using UNIX compress. If a user loaded a
specially-crafted compressed font file with an application linked against
FreeType, it could cause the application to crash or, possibly, execute
arbitrary code with the privileges of the user running the application.
(CVE-2011-2895)

Note: This issue only affects the FreeType 2 font engine.

Users are advised to upgrade to these updated packages, which contain a
backported patch to correct this issue. The X server must be restarted (log
out, then log back in) for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 727624 - CVE-2011-2895 BSD compress LZW decoder buffer overflow

CVEs

  • CVE-2011-2895

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
freetype-2.1.9-19.el4.src.rpm SHA-256: 93c64f22342d402543162aa2c9231a50ed1614f2b2c3b99a34a67c7f950c2671
x86_64
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-2.1.9-19.el4.x86_64.rpm SHA-256: 855c6577eab52f08b691782219673562ac01cc23fa0e17ab554485f89b4a5646
freetype-2.1.9-19.el4.x86_64.rpm SHA-256: 855c6577eab52f08b691782219673562ac01cc23fa0e17ab554485f89b4a5646
freetype-demos-2.1.9-19.el4.x86_64.rpm SHA-256: 882668a16a799d171106e49e0a52647202a9590e9ef5b3d6476d9700f21f0431
freetype-demos-2.1.9-19.el4.x86_64.rpm SHA-256: 882668a16a799d171106e49e0a52647202a9590e9ef5b3d6476d9700f21f0431
freetype-devel-2.1.9-19.el4.x86_64.rpm SHA-256: c7f03ad2da46e1d21b53bb7fb161e4c62e3154d86a19739365ace0add838c734
freetype-devel-2.1.9-19.el4.x86_64.rpm SHA-256: c7f03ad2da46e1d21b53bb7fb161e4c62e3154d86a19739365ace0add838c734
freetype-utils-2.1.9-19.el4.x86_64.rpm SHA-256: 7192059a58f233b7ed90d81636929a5275e9b54e676cdef6bf8df2efe950673d
freetype-utils-2.1.9-19.el4.x86_64.rpm SHA-256: 7192059a58f233b7ed90d81636929a5275e9b54e676cdef6bf8df2efe950673d
ia64
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-2.1.9-19.el4.ia64.rpm SHA-256: a3abd95f977773c3e37427fbb5ba2bf4e4a8dfe6aade6f8e65ebac5bb916df36
freetype-2.1.9-19.el4.ia64.rpm SHA-256: a3abd95f977773c3e37427fbb5ba2bf4e4a8dfe6aade6f8e65ebac5bb916df36
freetype-demos-2.1.9-19.el4.ia64.rpm SHA-256: 472169a9abf35fdca599731fb0a17ac610d93bce8a57fd2169e1460146510277
freetype-demos-2.1.9-19.el4.ia64.rpm SHA-256: 472169a9abf35fdca599731fb0a17ac610d93bce8a57fd2169e1460146510277
freetype-devel-2.1.9-19.el4.ia64.rpm SHA-256: 0022144fa1ea6c0a0d3b7b6e1ab8f0d74aa10781dbe0e0ebecd126f0c5a3e302
freetype-devel-2.1.9-19.el4.ia64.rpm SHA-256: 0022144fa1ea6c0a0d3b7b6e1ab8f0d74aa10781dbe0e0ebecd126f0c5a3e302
freetype-utils-2.1.9-19.el4.ia64.rpm SHA-256: 6f3f3e891d96635552131ae581685ac4c1af71ee894fcc26ed0801769da34764
freetype-utils-2.1.9-19.el4.ia64.rpm SHA-256: 6f3f3e891d96635552131ae581685ac4c1af71ee894fcc26ed0801769da34764
i386
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-demos-2.1.9-19.el4.i386.rpm SHA-256: f236648266e17b5d3d44369d7a75475aed656ff7dd9f212558a0a01f5515be31
freetype-demos-2.1.9-19.el4.i386.rpm SHA-256: f236648266e17b5d3d44369d7a75475aed656ff7dd9f212558a0a01f5515be31
freetype-devel-2.1.9-19.el4.i386.rpm SHA-256: 703a847ce0e9ae9088dcfdc780af254fcaaa1aaab5f9ac174ad5e1a1ab059320
freetype-devel-2.1.9-19.el4.i386.rpm SHA-256: 703a847ce0e9ae9088dcfdc780af254fcaaa1aaab5f9ac174ad5e1a1ab059320
freetype-utils-2.1.9-19.el4.i386.rpm SHA-256: 066575800f0f201e6c7ae78f6509110ded6a8eafce797b5a0737cedca25d973e
freetype-utils-2.1.9-19.el4.i386.rpm SHA-256: 066575800f0f201e6c7ae78f6509110ded6a8eafce797b5a0737cedca25d973e

Red Hat Enterprise Linux Workstation 4

SRPM
freetype-2.1.9-19.el4.src.rpm SHA-256: 93c64f22342d402543162aa2c9231a50ed1614f2b2c3b99a34a67c7f950c2671
x86_64
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-2.1.9-19.el4.x86_64.rpm SHA-256: 855c6577eab52f08b691782219673562ac01cc23fa0e17ab554485f89b4a5646
freetype-demos-2.1.9-19.el4.x86_64.rpm SHA-256: 882668a16a799d171106e49e0a52647202a9590e9ef5b3d6476d9700f21f0431
freetype-devel-2.1.9-19.el4.x86_64.rpm SHA-256: c7f03ad2da46e1d21b53bb7fb161e4c62e3154d86a19739365ace0add838c734
freetype-utils-2.1.9-19.el4.x86_64.rpm SHA-256: 7192059a58f233b7ed90d81636929a5275e9b54e676cdef6bf8df2efe950673d
ia64
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-2.1.9-19.el4.ia64.rpm SHA-256: a3abd95f977773c3e37427fbb5ba2bf4e4a8dfe6aade6f8e65ebac5bb916df36
freetype-demos-2.1.9-19.el4.ia64.rpm SHA-256: 472169a9abf35fdca599731fb0a17ac610d93bce8a57fd2169e1460146510277
freetype-devel-2.1.9-19.el4.ia64.rpm SHA-256: 0022144fa1ea6c0a0d3b7b6e1ab8f0d74aa10781dbe0e0ebecd126f0c5a3e302
freetype-utils-2.1.9-19.el4.ia64.rpm SHA-256: 6f3f3e891d96635552131ae581685ac4c1af71ee894fcc26ed0801769da34764
i386
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-demos-2.1.9-19.el4.i386.rpm SHA-256: f236648266e17b5d3d44369d7a75475aed656ff7dd9f212558a0a01f5515be31
freetype-devel-2.1.9-19.el4.i386.rpm SHA-256: 703a847ce0e9ae9088dcfdc780af254fcaaa1aaab5f9ac174ad5e1a1ab059320
freetype-utils-2.1.9-19.el4.i386.rpm SHA-256: 066575800f0f201e6c7ae78f6509110ded6a8eafce797b5a0737cedca25d973e

Red Hat Enterprise Linux Desktop 4

SRPM
freetype-2.1.9-19.el4.src.rpm SHA-256: 93c64f22342d402543162aa2c9231a50ed1614f2b2c3b99a34a67c7f950c2671
x86_64
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-2.1.9-19.el4.x86_64.rpm SHA-256: 855c6577eab52f08b691782219673562ac01cc23fa0e17ab554485f89b4a5646
freetype-demos-2.1.9-19.el4.x86_64.rpm SHA-256: 882668a16a799d171106e49e0a52647202a9590e9ef5b3d6476d9700f21f0431
freetype-devel-2.1.9-19.el4.x86_64.rpm SHA-256: c7f03ad2da46e1d21b53bb7fb161e4c62e3154d86a19739365ace0add838c734
freetype-utils-2.1.9-19.el4.x86_64.rpm SHA-256: 7192059a58f233b7ed90d81636929a5275e9b54e676cdef6bf8df2efe950673d
i386
freetype-2.1.9-19.el4.i386.rpm SHA-256: 287ea13a23ed2f03fa2f6fa45fd319e76941960c376572f708cec7a17b1b47b0
freetype-demos-2.1.9-19.el4.i386.rpm SHA-256: f236648266e17b5d3d44369d7a75475aed656ff7dd9f212558a0a01f5515be31
freetype-devel-2.1.9-19.el4.i386.rpm SHA-256: 703a847ce0e9ae9088dcfdc780af254fcaaa1aaab5f9ac174ad5e1a1ab059320
freetype-utils-2.1.9-19.el4.i386.rpm SHA-256: 066575800f0f201e6c7ae78f6509110ded6a8eafce797b5a0737cedca25d973e

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
freetype-2.1.9-19.el4.src.rpm SHA-256: 93c64f22342d402543162aa2c9231a50ed1614f2b2c3b99a34a67c7f950c2671
s390x
freetype-2.1.9-19.el4.s390.rpm SHA-256: af4c7c9de12c0a4b4153c8642afa31c0b7c3e3621a97360c909cbba723f322fe
freetype-2.1.9-19.el4.s390x.rpm SHA-256: 16fba68c6622aa99ef1063bd4b70ec47813fe23fe8ceb627e6474cc10fd2bab3
freetype-demos-2.1.9-19.el4.s390x.rpm SHA-256: f0589e9a87e5b69ac807e4b90a1e057e1b7e7dc0859d783616cfb519e48406fd
freetype-devel-2.1.9-19.el4.s390x.rpm SHA-256: 0b8457c25b3b4fc55cc6e9f436476a92b955a2d3badc7caa1a11ea031cb337ad
freetype-utils-2.1.9-19.el4.s390x.rpm SHA-256: c0da77481ef4452abb8fa2fe05ec1f9ca512704064300a0dae33e4142cd63a43
s390
freetype-2.1.9-19.el4.s390.rpm SHA-256: af4c7c9de12c0a4b4153c8642afa31c0b7c3e3621a97360c909cbba723f322fe
freetype-demos-2.1.9-19.el4.s390.rpm SHA-256: 50f1e972cf3578a58bf54866f625d3b57586e1d549f8743258bf1edaea3a2aaf
freetype-devel-2.1.9-19.el4.s390.rpm SHA-256: 4ebe8ffe178938e677b272601af11f0d2f594b7a2dec46a59a00c8b8e14ccf61
freetype-utils-2.1.9-19.el4.s390.rpm SHA-256: 4a7e87f5b771ac2dadbd8b271796feab14351a69ce84acc501fa91486c6d8fa5

Red Hat Enterprise Linux for Power, big endian 4

SRPM
freetype-2.1.9-19.el4.src.rpm SHA-256: 93c64f22342d402543162aa2c9231a50ed1614f2b2c3b99a34a67c7f950c2671
ppc
freetype-2.1.9-19.el4.ppc.rpm SHA-256: 860b47e446c77c230b5923758f15658b89f0ca3c9fbcac865c6b2fc9471310ae
freetype-2.1.9-19.el4.ppc64.rpm SHA-256: ec7fa937d8a680d541cb924c1f5c04ed9428229c1b0aebebfc029a402c1570e2
freetype-demos-2.1.9-19.el4.ppc.rpm SHA-256: 8467a18aa53383fc9dce50acf6f1e830e79861db71e475a80daebcc26820ebd5
freetype-devel-2.1.9-19.el4.ppc.rpm SHA-256: 1f3a84049e9d2215873efad590f109736da7f2380b27c782647fe3d496d9732c
freetype-utils-2.1.9-19.el4.ppc.rpm SHA-256: 8860b594fa226c5eacdb62ed338e8dcf0b5c31bbf405e0b69005b4aec7e39ffa

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility