Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0094 - Security Advisory
Issued:
2012-02-02
Updated:
2012-02-02

RHSA-2012:0094 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: freetype security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated freetype packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

FreeType is a free, high-quality, portable font engine that can open and
manage font files. It also loads, hints, and renders individual glyphs
efficiently.

Multiple input validation flaws were found in the way FreeType processed
bitmap font files. If a specially-crafted font file was loaded by an
application linked against FreeType, it could cause the application to
crash or, potentially, execute arbitrary code with the privileges of the
user running the application. (CVE-2011-3256)

Multiple input validation flaws were found in the way FreeType processed
CID-keyed fonts. If a specially-crafted font file was loaded by an
application linked against FreeType, it could cause the application to
crash or, potentially, execute arbitrary code with the privileges of the
user running the application. (CVE-2011-3439)

Users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. The X server must be restarted
(log out, then log back in) for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386

Fixes

  • BZ - 746226 - CVE-2011-3256 FreeType FT_Bitmap_New integer overflow to buffer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation
  • BZ - 753799 - CVE-2011-3439 freetype: Multiple security flaws when loading CID-keyed Type 1 fonts

CVEs

  • CVE-2011-3256
  • CVE-2011-3439

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
freetype-2.2.1-28.el5_6.1.src.rpm SHA-256: 7d3b2503c45122f66015771b7afc79ad8c272ef5c2889f59e9bd800168f42484
x86_64
freetype-2.2.1-28.el5_6.1.i386.rpm SHA-256: bce0172b00cc151904fca6e9c3cbf04a21905a04b7ac653444147be95fa678ce
freetype-2.2.1-28.el5_6.1.x86_64.rpm SHA-256: 498f2a003708147714215acb8e16d04f6e9b739fdf528a463e743e0af5848d3b
freetype-demos-2.2.1-28.el5_6.1.x86_64.rpm SHA-256: 7fbdfd313c975f2a82f72c0b237b71db94fe31674cff632599f8e8c14586199f
freetype-devel-2.2.1-28.el5_6.1.i386.rpm SHA-256: 9dbe98330ca9fe5e6362e47de0ea459efe8fd1f3081c039c91e7109a63cc0355
freetype-devel-2.2.1-28.el5_6.1.x86_64.rpm SHA-256: 7c277afba8c4cfb426fee8b37f7144d7d166acab6d61c1a6f5a63f1b6584306a
ia64
freetype-2.2.1-28.el5_6.1.i386.rpm SHA-256: bce0172b00cc151904fca6e9c3cbf04a21905a04b7ac653444147be95fa678ce
freetype-2.2.1-28.el5_6.1.ia64.rpm SHA-256: c72cfea89ff0de51be2e5d03df11ea104fbd6203be0da785b31f24c88d7a23af
freetype-demos-2.2.1-28.el5_6.1.ia64.rpm SHA-256: d34747963aae7ff1c7c4d1053426d8f8faa09f347fa5fa37e3ccc2099f8e9ce7
freetype-devel-2.2.1-28.el5_6.1.ia64.rpm SHA-256: 0607f034c3a8480c1c64f33fb522da12bb45a56de9a6d9439657aa486249aadc
i386
freetype-2.2.1-28.el5_6.1.i386.rpm SHA-256: bce0172b00cc151904fca6e9c3cbf04a21905a04b7ac653444147be95fa678ce
freetype-demos-2.2.1-28.el5_6.1.i386.rpm SHA-256: ba144269239858bf6d07be63063ca5a6eb83cda7b3e5d863c6e8249862cada9d
freetype-devel-2.2.1-28.el5_6.1.i386.rpm SHA-256: 9dbe98330ca9fe5e6362e47de0ea459efe8fd1f3081c039c91e7109a63cc0355

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
freetype-2.2.1-28.el5_6.1.src.rpm SHA-256: 7d3b2503c45122f66015771b7afc79ad8c272ef5c2889f59e9bd800168f42484
x86_64
freetype-2.2.1-28.el5_6.1.i386.rpm SHA-256: bce0172b00cc151904fca6e9c3cbf04a21905a04b7ac653444147be95fa678ce
freetype-2.2.1-28.el5_6.1.x86_64.rpm SHA-256: 498f2a003708147714215acb8e16d04f6e9b739fdf528a463e743e0af5848d3b
freetype-demos-2.2.1-28.el5_6.1.x86_64.rpm SHA-256: 7fbdfd313c975f2a82f72c0b237b71db94fe31674cff632599f8e8c14586199f
freetype-devel-2.2.1-28.el5_6.1.i386.rpm SHA-256: 9dbe98330ca9fe5e6362e47de0ea459efe8fd1f3081c039c91e7109a63cc0355
freetype-devel-2.2.1-28.el5_6.1.x86_64.rpm SHA-256: 7c277afba8c4cfb426fee8b37f7144d7d166acab6d61c1a6f5a63f1b6584306a
ia64
freetype-2.2.1-28.el5_6.1.i386.rpm SHA-256: bce0172b00cc151904fca6e9c3cbf04a21905a04b7ac653444147be95fa678ce
freetype-2.2.1-28.el5_6.1.ia64.rpm SHA-256: c72cfea89ff0de51be2e5d03df11ea104fbd6203be0da785b31f24c88d7a23af
freetype-demos-2.2.1-28.el5_6.1.ia64.rpm SHA-256: d34747963aae7ff1c7c4d1053426d8f8faa09f347fa5fa37e3ccc2099f8e9ce7
freetype-devel-2.2.1-28.el5_6.1.ia64.rpm SHA-256: 0607f034c3a8480c1c64f33fb522da12bb45a56de9a6d9439657aa486249aadc
i386
freetype-2.2.1-28.el5_6.1.i386.rpm SHA-256: bce0172b00cc151904fca6e9c3cbf04a21905a04b7ac653444147be95fa678ce
freetype-demos-2.2.1-28.el5_6.1.i386.rpm SHA-256: ba144269239858bf6d07be63063ca5a6eb83cda7b3e5d863c6e8249862cada9d
freetype-devel-2.2.1-28.el5_6.1.i386.rpm SHA-256: 9dbe98330ca9fe5e6362e47de0ea459efe8fd1f3081c039c91e7109a63cc0355

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
freetype-2.2.1-28.el5_6.1.src.rpm SHA-256: 7d3b2503c45122f66015771b7afc79ad8c272ef5c2889f59e9bd800168f42484
s390x
freetype-2.2.1-28.el5_6.1.s390.rpm SHA-256: 93df5b3f17103b983003f2d2d6c15c8a599faf7c982eafbe2d97cd148a907397
freetype-2.2.1-28.el5_6.1.s390x.rpm SHA-256: d3d4edab42c3c81937e847317d589b83467b94dd5ec592a6786f5749bc4da056
freetype-demos-2.2.1-28.el5_6.1.s390x.rpm SHA-256: 9e7df84206dc2e7da6bd4a848d4c29a3ab3e8543f762b1202bbf0a5050234437
freetype-devel-2.2.1-28.el5_6.1.s390.rpm SHA-256: faf07f4e31e4dd4ae55d4782be976e5a39ae796cc5c190b00dc86fbc1e85eed7
freetype-devel-2.2.1-28.el5_6.1.s390x.rpm SHA-256: 59bf1a483b02491d038da762408095ac68b3b3f873ff75eb8a40950a42684bed

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
freetype-2.2.1-28.el5_6.1.src.rpm SHA-256: 7d3b2503c45122f66015771b7afc79ad8c272ef5c2889f59e9bd800168f42484
ppc
freetype-2.2.1-28.el5_6.1.ppc.rpm SHA-256: 9e91f0c5f1c3dffc9c5cb0f5003953a652b478d6c056eec88b7c22c008092619
freetype-2.2.1-28.el5_6.1.ppc64.rpm SHA-256: d150e05efb3b3710baca7d5952c0478f8909f0ff9c2edefeb2e6a47a6f17fd10
freetype-demos-2.2.1-28.el5_6.1.ppc.rpm SHA-256: c8da23fb8d5d4abab17979f470db8c5ab7e69d6167196e5574b22a907dac1a37
freetype-devel-2.2.1-28.el5_6.1.ppc.rpm SHA-256: 46500e2b17b21651bc2ed8b6cd2b3a07fcca393b753a8291bc8ed1ae7f17e312
freetype-devel-2.2.1-28.el5_6.1.ppc64.rpm SHA-256: 85382441342578469bdc8c0945afa3e9a33a843f7afb82e285b5a2762ce2d669

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
freetype-2.2.1-28.el5_6.1.src.rpm SHA-256: 7d3b2503c45122f66015771b7afc79ad8c272ef5c2889f59e9bd800168f42484
x86_64
freetype-2.2.1-28.el5_6.1.i386.rpm SHA-256: bce0172b00cc151904fca6e9c3cbf04a21905a04b7ac653444147be95fa678ce
freetype-2.2.1-28.el5_6.1.x86_64.rpm SHA-256: 498f2a003708147714215acb8e16d04f6e9b739fdf528a463e743e0af5848d3b
freetype-demos-2.2.1-28.el5_6.1.x86_64.rpm SHA-256: 7fbdfd313c975f2a82f72c0b237b71db94fe31674cff632599f8e8c14586199f
freetype-devel-2.2.1-28.el5_6.1.i386.rpm SHA-256: 9dbe98330ca9fe5e6362e47de0ea459efe8fd1f3081c039c91e7109a63cc0355
freetype-devel-2.2.1-28.el5_6.1.x86_64.rpm SHA-256: 7c277afba8c4cfb426fee8b37f7144d7d166acab6d61c1a6f5a63f1b6584306a
i386
freetype-2.2.1-28.el5_6.1.i386.rpm SHA-256: bce0172b00cc151904fca6e9c3cbf04a21905a04b7ac653444147be95fa678ce
freetype-demos-2.2.1-28.el5_6.1.i386.rpm SHA-256: ba144269239858bf6d07be63063ca5a6eb83cda7b3e5d863c6e8249862cada9d
freetype-devel-2.2.1-28.el5_6.1.i386.rpm SHA-256: 9dbe98330ca9fe5e6362e47de0ea459efe8fd1f3081c039c91e7109a63cc0355

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility