Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-1797
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:53.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "name": "14538", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/14538" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "name": "ADV-2010-2018", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "name": "66828", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/66828" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "name": "USN-972-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "name": "APPLE-SA-2010-08-11-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "name": "40816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40816" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4292" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "name": "42151", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42151" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4291" }, { "name": "40982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40982" }, { "name": "ADV-2010-2106", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "name": "APPLE-SA-2010-08-11-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "name": "48951", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48951" }, { "name": "appleios-pdf-code-execution(60856)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" }, { "name": "40807", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40807" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "name": "14538", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/14538" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "name": "ADV-2010-2018", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "name": "66828", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/66828" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "name": "USN-972-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "name": "APPLE-SA-2010-08-11-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "name": "40816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40816" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4292" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "name": "42151", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42151" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4291" }, { "name": "40982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40982" }, { "name": "ADV-2010-2106", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "name": "APPLE-SA-2010-08-11-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "name": "48951", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48951" }, { "name": "appleios-pdf-code-execution(60856)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" }, { "name": "40807", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40807" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2010-1797", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621144", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "name": "14538", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/14538" }, { "name": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "name": "ADV-2010-2018", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "name": "66828", "refsource": "OSVDB", "url": "http://osvdb.org/66828" }, { "name": "http://www.f-secure.com/weblog/archives/00002002.html", "refsource": "MISC", "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "name": "USN-972-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "name": "APPLE-SA-2010-08-11-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "name": "40816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40816" }, { "name": "http://support.apple.com/kb/HT4292", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4292" }, { "name": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "refsource": "CONFIRM", "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "name": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "refsource": "CONFIRM", "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "name": "42151", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42151" }, { "name": "http://support.apple.com/kb/HT4291", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4291" }, { "name": "40982", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40982" }, { "name": "ADV-2010-2106", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "name": "APPLE-SA-2010-08-11-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "name": "48951", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48951" }, { "name": "appleios-pdf-code-execution(60856)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" }, { "name": "40807", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40807" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2010-1797", "datePublished": "2010-08-16T18:25:00", "dateReserved": "2010-05-06T00:00:00", "dateUpdated": "2024-08-07T01:35:53.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"B669868B-F358-4D5B-9D64-4A462F261553\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E28FB0CB-D636-4F85-B5F7-70EC30053925\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"A14B31DE-AA3D-4FA2-A4F4-0A6A51AFA7FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EC16D1C-065A-4D1A-BA6E-528A71DF65CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"4261E5C1-DC93-437E-B84F-A30380AFDC40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"079BB54C-25FD-4B26-B171-368911960F76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27319629-171F-42AA-A95F-2D71F78097D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"DF292FED-19A4-4031-9B1F-151C0146F3B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"5183082C-556F-479F-9FC1-42B59BBB840B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"AAC3FBF0-F128-412D-9FD5-13BB2EB92DD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"297F9438-0F04-4128-94A8-A504B600929E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"2FFCFEA4-C5E2-4C46-B8C3-ADCDBA4B85EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"7E7AA027-8CF9-49BD-A000-82880E41D622\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8618621-F871-4531-9F6C-7D60F2BF8B75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"4FA51920-223B-4DF4-802C-188F5A8B0563\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"4385635D-46F2-4642-9C78-1346DC120492\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"824DED2D-FA1D-46FC-8252-6E25546DAE29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"2C63C36E-1997-4F44-80AD-E665CE46A278\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"20DAE911-C037-4F10-82A3-EF42D5FB71D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1641DDFA-3BF1-467F-8EC3-98114FF9F07B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF40CDA4-4716-4815-9ED0-093FE266734C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"02BFDD6F-B9C3-42BB-A84A-828193FAA137\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"0A66D6DC-9A48-4BD6-9E01-0D9FF388457C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"CFD4325B-A86A-4C1B-930F-56C17FB6281D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"C59B8C50-BF5D-4E9A-8E5B-99B34E974B5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D06D54D-97FD-49FD-B251-CC86FBA68CA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"2904DEFA-7769-43DB-B3D0-B552AE8F06A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"D4CE4199-BBF5-4F42-8BBC-BD946079C912\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25A5D868-0016-44AB-80E6-E5DF91F15455\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"0AD5106E-CD7C-4952-A9B1-5F72D99276E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"34346F55-4972-427B-8F96-780FA91DB95D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"B7235341-983F-4578-98DC-39BC278A7556\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"BA5C2D75-4019-45EB-8AF9-A850B5349507\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"AD136376-331D-494F-9D12-7E631546E8CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863383DA-0BC6-4A96-835A-A96128EC0202\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"A066B59B-D5C8-4AA8-9CC7-5D34F4AB88AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"F07B3FE7-96B3-493A-A230-5642BA11FBDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"9FB0870F-82CF-4C97-BDC6-F0C4BBE7462D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51D3BE2B-5A01-4AD4-A436-0056B50A535D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"E357722F-4976-4E47-BFB5-709480BAE267\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"F43A6FEC-ECA9-44A4-AD00-FDC6F3990DC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A20F171-79FE-43B9-8309-B18341639FA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"7CA92907-90C9-4BD6-8EE8-8FA6298C3D0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"52283848-67CC-4E4B-A849-1225F2BCBD9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"126EF22D-29BC-4366-97BC-B261311E6251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"220590DA-2B6A-4FC9-B456-3053EED9D96E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"3FE3CDE8-6497-445E-A845-8A1C2A4EDEB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"9E4D3134-28BC-4C30-A9B0-559338FBBDFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A939B80-0AD0-48AF-81A7-370716F56639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*\", \"matchCriteriaId\": \"98C41674-370B-4CF0-817B-3843D93A10DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12E22AF0-2B66-425A-A1EE-4F0E3B0433E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"954CDDCB-AC22-448D-8ECA-CFA4DBA1BC27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"54FECD66-4216-43FC-9959-B8EA9545449C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB34ECBE-33E8-40E1-936B-7800D2525AE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*\", \"matchCriteriaId\": \"ECE983F6-A597-4581-A254-80396B54F2D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*\", \"matchCriteriaId\": \"586C0CB3-98E5-4CB3-8F23-27F01233D6C4\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples desbordamientos de b\\u00fafer en la regi\\u00f3n ?stack de la memoria en la funci\\u00f3n cff_decoder_parse_charstrings en el int\\u00e9rprete CFF Type2 CharStrings en el archivo cff/cffgload.c en FreeType anterior a versi\\u00f3n 2.4.2, tal y como es usado en iOS de Apple anterior a versi\\u00f3n 4.0.2 en el iPhone y iPod touch y anterior a versi\\u00f3n 3.2.2 en el iPad, permite a los atacantes remotos ejecutar c\\u00f3digo arbitrario o causar una denegaci\\u00f3n de servicio (corrupci\\u00f3n de memoria) por medio de c\\u00f3digos CFF especialmente dise\\u00f1ados en fuentes insertadas en un documento PDF, como es demostrado por JailbreakMe. NOTA: algunos de estos detalles son obtenidos de informaci\\u00f3n de terceros.\"}]", "id": "CVE-2010-1797", "lastModified": "2024-11-21T01:15:13.160", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2010-08-16T18:39:40.403", "references": "[{\"url\": \"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://osvdb.org/66828\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://secunia.com/advisories/40807\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/40816\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/40982\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/48951\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://support.apple.com/kb/HT4291\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4292\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.exploit-db.com/exploits/14538\", \"source\": \"product-security@apple.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.f-secure.com/weblog/archives/00002002.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.securityfocus.com/bid/42151\", \"source\": \"product-security@apple.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-972-1\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/2018\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/2106\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=621144\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/60856\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://osvdb.org/66828\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/40807\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/40816\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/40982\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/48951\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT4291\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4292\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.exploit-db.com/exploits/14538\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.f-secure.com/weblog/archives/00002002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/42151\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-972-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/2018\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/2106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=621144\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/60856\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2010-1797\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2010-08-16T18:39:40.403\",\"lastModified\":\"2024-11-21T01:15:13.160\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer en la regi\u00f3n ?stack de la memoria en la funci\u00f3n cff_decoder_parse_charstrings en el int\u00e9rprete CFF Type2 CharStrings en el archivo cff/cffgload.c en FreeType anterior a versi\u00f3n 2.4.2, tal y como es usado en iOS de Apple anterior a versi\u00f3n 4.0.2 en el iPhone y iPod touch y anterior a versi\u00f3n 3.2.2 en el iPad, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de c\u00f3digos CFF especialmente dise\u00f1ados en fuentes insertadas en un documento PDF, como es demostrado por JailbreakMe. NOTA: algunos de estos detalles son obtenidos de informaci\u00f3n de terceros.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"B669868B-F358-4D5B-9D64-4A462F261553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28FB0CB-D636-4F85-B5F7-70EC30053925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"A14B31DE-AA3D-4FA2-A4F4-0A6A51AFA7FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC16D1C-065A-4D1A-BA6E-528A71DF65CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"4261E5C1-DC93-437E-B84F-A30380AFDC40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"079BB54C-25FD-4B26-B171-368911960F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27319629-171F-42AA-A95F-2D71F78097D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"DF292FED-19A4-4031-9B1F-151C0146F3B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"5183082C-556F-479F-9FC1-42B59BBB840B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"AAC3FBF0-F128-412D-9FD5-13BB2EB92DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297F9438-0F04-4128-94A8-A504B600929E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"2FFCFEA4-C5E2-4C46-B8C3-ADCDBA4B85EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"7E7AA027-8CF9-49BD-A000-82880E41D622\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8618621-F871-4531-9F6C-7D60F2BF8B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"4FA51920-223B-4DF4-802C-188F5A8B0563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"4385635D-46F2-4642-9C78-1346DC120492\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824DED2D-FA1D-46FC-8252-6E25546DAE29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"2C63C36E-1997-4F44-80AD-E665CE46A278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"20DAE911-C037-4F10-82A3-EF42D5FB71D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1641DDFA-3BF1-467F-8EC3-98114FF9F07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF40CDA4-4716-4815-9ED0-093FE266734C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"02BFDD6F-B9C3-42BB-A84A-828193FAA137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"0A66D6DC-9A48-4BD6-9E01-0D9FF388457C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"CFD4325B-A86A-4C1B-930F-56C17FB6281D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"C59B8C50-BF5D-4E9A-8E5B-99B34E974B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D06D54D-97FD-49FD-B251-CC86FBA68CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"2904DEFA-7769-43DB-B3D0-B552AE8F06A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"D4CE4199-BBF5-4F42-8BBC-BD946079C912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25A5D868-0016-44AB-80E6-E5DF91F15455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"0AD5106E-CD7C-4952-A9B1-5F72D99276E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"34346F55-4972-427B-8F96-780FA91DB95D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"B7235341-983F-4578-98DC-39BC278A7556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"BA5C2D75-4019-45EB-8AF9-A850B5349507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"AD136376-331D-494F-9D12-7E631546E8CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863383DA-0BC6-4A96-835A-A96128EC0202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"A066B59B-D5C8-4AA8-9CC7-5D34F4AB88AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"F07B3FE7-96B3-493A-A230-5642BA11FBDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"9FB0870F-82CF-4C97-BDC6-F0C4BBE7462D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51D3BE2B-5A01-4AD4-A436-0056B50A535D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"E357722F-4976-4E47-BFB5-709480BAE267\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"F43A6FEC-ECA9-44A4-AD00-FDC6F3990DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A20F171-79FE-43B9-8309-B18341639FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"7CA92907-90C9-4BD6-8EE8-8FA6298C3D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"52283848-67CC-4E4B-A849-1225F2BCBD9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"126EF22D-29BC-4366-97BC-B261311E6251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"220590DA-2B6A-4FC9-B456-3053EED9D96E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"3FE3CDE8-6497-445E-A845-8A1C2A4EDEB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"9E4D3134-28BC-4C30-A9B0-559338FBBDFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A939B80-0AD0-48AF-81A7-370716F56639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*\",\"matchCriteriaId\":\"98C41674-370B-4CF0-817B-3843D93A10DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12E22AF0-2B66-425A-A1EE-4F0E3B0433E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"954CDDCB-AC22-448D-8ECA-CFA4DBA1BC27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"54FECD66-4216-43FC-9959-B8EA9545449C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB34ECBE-33E8-40E1-936B-7800D2525AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"ECE983F6-A597-4581-A254-80396B54F2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"586C0CB3-98E5-4CB3-8F23-27F01233D6C4\"}]}]}],\"references\":[{\"url\":\"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/66828\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://secunia.com/advisories/40807\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/40816\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/40982\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48951\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://support.apple.com/kb/HT4291\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4292\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.exploit-db.com/exploits/14538\",\"source\":\"product-security@apple.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.f-secure.com/weblog/archives/00002002.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.securityfocus.com/bid/42151\",\"source\":\"product-security@apple.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-972-1\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/2018\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2106\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=621144\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/60856\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/66828\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/40807\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/40816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/40982\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT4291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4292\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.exploit-db.com/exploits/14538\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.f-secure.com/weblog/archives/00002002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/42151\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-972-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/2018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=621144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/60856\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2010_0607
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 3, 4, and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. The freetype packages for Red Hat Enterprise Linux 3 and 4\nprovide both the FreeType 1 and FreeType 2 font engines. The freetype\npackages for Red Hat Enterprise Linux 5 provide only the FreeType 2 font\nengine.\n\nTwo stack overflow flaws were found in the way the FreeType font engine\nprocessed certain Compact Font Format (CFF) character strings (opcodes). If\na user loaded a specially-crafted font file with an application linked\nagainst FreeType, it could cause the application to crash or, possibly,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2010-1797)\n\nRed Hat would like to thank Braden Thomas of the Apple Product Security\nteam for reporting these issues.\n\nNote: CVE-2010-1797 only affects the FreeType 2 font engine.\n\nUsers are advised to upgrade to these updated packages, which contain a\nbackported patch to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0607", "url": "https://access.redhat.com/errata/RHSA-2010:0607" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "621144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0607.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2024-11-22T03:37:00+00:00", "generator": { "date": "2024-11-22T03:37:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0607", "initial_release_date": "2010-08-05T17:27:00+00:00", "revision_history": [ { "date": "2010-08-05T17:27:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-08-05T13:59:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:37:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.ia64", "product": { "name": "freetype-0:2.1.4-16.el3.ia64", "product_id": "freetype-0:2.1.4-16.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.ia64", "product": { "name": "freetype-devel-0:2.1.4-16.el3.ia64", "product_id": "freetype-devel-0:2.1.4-16.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-demos-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-utils-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-devel-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-devel-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-demos-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.i386", "product": { "name": "freetype-0:2.1.4-16.el3.i386", "product_id": "freetype-0:2.1.4-16.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.i386", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.i386", "product": { "name": "freetype-devel-0:2.1.4-16.el3.i386", "product_id": "freetype-devel-0:2.1.4-16.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-0:2.1.9-15.el4.8.i386", "product_id": "freetype-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386", "product_id": "freetype-demos-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386", "product_id": "freetype-utils-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386", "product_id": "freetype-devel-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386", "product_id": "freetype-devel-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386", "product_id": "freetype-demos-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-0:2.2.1-26.el5_5.i386", "product_id": "freetype-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.src", "product": { "name": "freetype-0:2.1.4-16.el3.src", "product_id": "freetype-0:2.1.4-16.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.src", "product": { "name": "freetype-0:2.1.9-15.el4.8.src", "product_id": "freetype-0:2.1.9-15.el4.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.src", "product": { "name": "freetype-0:2.2.1-26.el5_5.src", "product_id": "freetype-0:2.2.1-26.el5_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.x86_64", "product": { "name": "freetype-0:2.1.4-16.el3.x86_64", "product_id": "freetype-0:2.1.4-16.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.x86_64", "product": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64", "product_id": "freetype-devel-0:2.1.4-16.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.ppc64", "product": { "name": "freetype-0:2.1.4-16.el3.ppc64", "product_id": "freetype-0:2.1.4-16.el3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.ppc64", "product": { "name": "freetype-0:2.1.9-15.el4.8.ppc64", "product_id": "freetype-0:2.1.9-15.el4.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "product_id": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.ppc64", "product": { "name": "freetype-0:2.2.1-26.el5_5.ppc64", "product_id": "freetype-0:2.2.1-26.el5_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.ppc", "product": { "name": "freetype-0:2.1.4-16.el3.ppc", "product_id": "freetype-0:2.1.4-16.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.ppc", "product": { "name": "freetype-devel-0:2.1.4-16.el3.ppc", "product_id": "freetype-devel-0:2.1.4-16.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-demos-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-utils-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-devel-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-devel-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-demos-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.s390x", "product": { "name": "freetype-0:2.1.4-16.el3.s390x", "product_id": "freetype-0:2.1.4-16.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.s390x", "product": { "name": "freetype-devel-0:2.1.4-16.el3.s390x", "product_id": "freetype-devel-0:2.1.4-16.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-demos-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-utils-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-devel-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-devel-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-demos-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.s390", "product": { "name": "freetype-0:2.1.4-16.el3.s390", "product_id": "freetype-0:2.1.4-16.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.s390", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.s390", "product": { "name": "freetype-devel-0:2.1.4-16.el3.s390", "product_id": "freetype-devel-0:2.1.4-16.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-0:2.1.9-15.el4.8.s390", "product_id": "freetype-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390", "product_id": "freetype-demos-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390", "product_id": "freetype-utils-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390", "product_id": "freetype-devel-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.s390", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390", "product_id": "freetype-devel-0:2.2.1-26.el5_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.s390", "product": { "name": "freetype-0:2.2.1-26.el5_5.s390", "product_id": "freetype-0:2.2.1-26.el5_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src" }, "product_reference": "freetype-0:2.2.1-26.el5_5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.src" }, "product_reference": "freetype-0:2.2.1-26.el5_5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.src" }, "product_reference": "freetype-0:2.2.1-26.el5_5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Braden Thomas" ], "organization": "Apple Product Security team" } ], "cve": "CVE-2010-1797", "discovery_date": "2010-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "621144" } ], "notes": [ { "category": "description", "text": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "FreeType: Multiple stack overflows by processing CFF opcodes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:freetype-0:2.1.4-16.el3.i386", "3AS:freetype-0:2.1.4-16.el3.ia64", "3AS:freetype-0:2.1.4-16.el3.ppc", "3AS:freetype-0:2.1.4-16.el3.ppc64", "3AS:freetype-0:2.1.4-16.el3.s390", "3AS:freetype-0:2.1.4-16.el3.s390x", "3AS:freetype-0:2.1.4-16.el3.src", "3AS:freetype-0:2.1.4-16.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3AS:freetype-devel-0:2.1.4-16.el3.i386", "3AS:freetype-devel-0:2.1.4-16.el3.ia64", "3AS:freetype-devel-0:2.1.4-16.el3.ppc", "3AS:freetype-devel-0:2.1.4-16.el3.s390", "3AS:freetype-devel-0:2.1.4-16.el3.s390x", "3AS:freetype-devel-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-0:2.1.4-16.el3.i386", "3Desktop:freetype-0:2.1.4-16.el3.ia64", "3Desktop:freetype-0:2.1.4-16.el3.ppc", "3Desktop:freetype-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-0:2.1.4-16.el3.s390", "3Desktop:freetype-0:2.1.4-16.el3.s390x", "3Desktop:freetype-0:2.1.4-16.el3.src", "3Desktop:freetype-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-16.el3.i386", "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64", "3ES:freetype-0:2.1.4-16.el3.i386", "3ES:freetype-0:2.1.4-16.el3.ia64", "3ES:freetype-0:2.1.4-16.el3.ppc", "3ES:freetype-0:2.1.4-16.el3.ppc64", "3ES:freetype-0:2.1.4-16.el3.s390", "3ES:freetype-0:2.1.4-16.el3.s390x", "3ES:freetype-0:2.1.4-16.el3.src", "3ES:freetype-0:2.1.4-16.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3ES:freetype-devel-0:2.1.4-16.el3.i386", "3ES:freetype-devel-0:2.1.4-16.el3.ia64", "3ES:freetype-devel-0:2.1.4-16.el3.ppc", "3ES:freetype-devel-0:2.1.4-16.el3.s390", "3ES:freetype-devel-0:2.1.4-16.el3.s390x", "3ES:freetype-devel-0:2.1.4-16.el3.x86_64", "3WS:freetype-0:2.1.4-16.el3.i386", "3WS:freetype-0:2.1.4-16.el3.ia64", "3WS:freetype-0:2.1.4-16.el3.ppc", "3WS:freetype-0:2.1.4-16.el3.ppc64", "3WS:freetype-0:2.1.4-16.el3.s390", "3WS:freetype-0:2.1.4-16.el3.s390x", "3WS:freetype-0:2.1.4-16.el3.src", "3WS:freetype-0:2.1.4-16.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3WS:freetype-devel-0:2.1.4-16.el3.i386", "3WS:freetype-devel-0:2.1.4-16.el3.ia64", "3WS:freetype-devel-0:2.1.4-16.el3.ppc", "3WS:freetype-devel-0:2.1.4-16.el3.s390", "3WS:freetype-devel-0:2.1.4-16.el3.s390x", "3WS:freetype-devel-0:2.1.4-16.el3.x86_64", "4AS:freetype-0:2.1.9-15.el4.8.i386", "4AS:freetype-0:2.1.9-15.el4.8.ia64", "4AS:freetype-0:2.1.9-15.el4.8.ppc", "4AS:freetype-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-0:2.1.9-15.el4.8.s390", "4AS:freetype-0:2.1.9-15.el4.8.s390x", "4AS:freetype-0:2.1.9-15.el4.8.src", "4AS:freetype-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-demos-0:2.1.9-15.el4.8.i386", "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-devel-0:2.1.9-15.el4.8.i386", "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-utils-0:2.1.9-15.el4.8.i386", "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-0:2.1.9-15.el4.8.src", "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-0:2.1.9-15.el4.8.i386", "4ES:freetype-0:2.1.9-15.el4.8.ia64", "4ES:freetype-0:2.1.9-15.el4.8.ppc", "4ES:freetype-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-0:2.1.9-15.el4.8.s390", "4ES:freetype-0:2.1.9-15.el4.8.s390x", "4ES:freetype-0:2.1.9-15.el4.8.src", "4ES:freetype-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-demos-0:2.1.9-15.el4.8.i386", "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64", "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x", "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-devel-0:2.1.9-15.el4.8.i386", "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64", "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x", "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-utils-0:2.1.9-15.el4.8.i386", "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64", "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x", "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-0:2.1.9-15.el4.8.i386", "4WS:freetype-0:2.1.9-15.el4.8.ia64", "4WS:freetype-0:2.1.9-15.el4.8.ppc", "4WS:freetype-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-0:2.1.9-15.el4.8.s390", "4WS:freetype-0:2.1.9-15.el4.8.s390x", "4WS:freetype-0:2.1.9-15.el4.8.src", "4WS:freetype-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-demos-0:2.1.9-15.el4.8.i386", "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-devel-0:2.1.9-15.el4.8.i386", "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-utils-0:2.1.9-15.el4.8.i386", "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-0:2.2.1-26.el5_5.i386", "5Client:freetype-0:2.2.1-26.el5_5.ia64", "5Client:freetype-0:2.2.1-26.el5_5.ppc", "5Client:freetype-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-0:2.2.1-26.el5_5.s390", "5Client:freetype-0:2.2.1-26.el5_5.s390x", "5Client:freetype-0:2.2.1-26.el5_5.src", "5Client:freetype-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-0:2.2.1-26.el5_5.i386", "5Server:freetype-0:2.2.1-26.el5_5.ia64", "5Server:freetype-0:2.2.1-26.el5_5.ppc", "5Server:freetype-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-0:2.2.1-26.el5_5.s390", "5Server:freetype-0:2.2.1-26.el5_5.s390x", "5Server:freetype-0:2.2.1-26.el5_5.src", "5Server:freetype-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-demos-0:2.2.1-26.el5_5.i386", "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-devel-0:2.2.1-26.el5_5.i386", "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1797" }, { "category": "external", "summary": "RHBZ#621144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1797", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797" } ], "release_date": "2010-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-08-05T17:27:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:freetype-0:2.1.4-16.el3.i386", "3AS:freetype-0:2.1.4-16.el3.ia64", "3AS:freetype-0:2.1.4-16.el3.ppc", "3AS:freetype-0:2.1.4-16.el3.ppc64", "3AS:freetype-0:2.1.4-16.el3.s390", "3AS:freetype-0:2.1.4-16.el3.s390x", "3AS:freetype-0:2.1.4-16.el3.src", "3AS:freetype-0:2.1.4-16.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3AS:freetype-devel-0:2.1.4-16.el3.i386", "3AS:freetype-devel-0:2.1.4-16.el3.ia64", "3AS:freetype-devel-0:2.1.4-16.el3.ppc", "3AS:freetype-devel-0:2.1.4-16.el3.s390", "3AS:freetype-devel-0:2.1.4-16.el3.s390x", "3AS:freetype-devel-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-0:2.1.4-16.el3.i386", "3Desktop:freetype-0:2.1.4-16.el3.ia64", "3Desktop:freetype-0:2.1.4-16.el3.ppc", "3Desktop:freetype-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-0:2.1.4-16.el3.s390", "3Desktop:freetype-0:2.1.4-16.el3.s390x", "3Desktop:freetype-0:2.1.4-16.el3.src", "3Desktop:freetype-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-16.el3.i386", "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64", "3ES:freetype-0:2.1.4-16.el3.i386", "3ES:freetype-0:2.1.4-16.el3.ia64", "3ES:freetype-0:2.1.4-16.el3.ppc", "3ES:freetype-0:2.1.4-16.el3.ppc64", "3ES:freetype-0:2.1.4-16.el3.s390", "3ES:freetype-0:2.1.4-16.el3.s390x", "3ES:freetype-0:2.1.4-16.el3.src", "3ES:freetype-0:2.1.4-16.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3ES:freetype-devel-0:2.1.4-16.el3.i386", "3ES:freetype-devel-0:2.1.4-16.el3.ia64", "3ES:freetype-devel-0:2.1.4-16.el3.ppc", "3ES:freetype-devel-0:2.1.4-16.el3.s390", "3ES:freetype-devel-0:2.1.4-16.el3.s390x", "3ES:freetype-devel-0:2.1.4-16.el3.x86_64", "3WS:freetype-0:2.1.4-16.el3.i386", "3WS:freetype-0:2.1.4-16.el3.ia64", "3WS:freetype-0:2.1.4-16.el3.ppc", "3WS:freetype-0:2.1.4-16.el3.ppc64", "3WS:freetype-0:2.1.4-16.el3.s390", "3WS:freetype-0:2.1.4-16.el3.s390x", "3WS:freetype-0:2.1.4-16.el3.src", "3WS:freetype-0:2.1.4-16.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3WS:freetype-devel-0:2.1.4-16.el3.i386", "3WS:freetype-devel-0:2.1.4-16.el3.ia64", "3WS:freetype-devel-0:2.1.4-16.el3.ppc", "3WS:freetype-devel-0:2.1.4-16.el3.s390", "3WS:freetype-devel-0:2.1.4-16.el3.s390x", "3WS:freetype-devel-0:2.1.4-16.el3.x86_64", "4AS:freetype-0:2.1.9-15.el4.8.i386", "4AS:freetype-0:2.1.9-15.el4.8.ia64", "4AS:freetype-0:2.1.9-15.el4.8.ppc", "4AS:freetype-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-0:2.1.9-15.el4.8.s390", "4AS:freetype-0:2.1.9-15.el4.8.s390x", "4AS:freetype-0:2.1.9-15.el4.8.src", "4AS:freetype-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-demos-0:2.1.9-15.el4.8.i386", "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-devel-0:2.1.9-15.el4.8.i386", "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-utils-0:2.1.9-15.el4.8.i386", "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-0:2.1.9-15.el4.8.src", "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-0:2.1.9-15.el4.8.i386", "4ES:freetype-0:2.1.9-15.el4.8.ia64", "4ES:freetype-0:2.1.9-15.el4.8.ppc", "4ES:freetype-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-0:2.1.9-15.el4.8.s390", "4ES:freetype-0:2.1.9-15.el4.8.s390x", "4ES:freetype-0:2.1.9-15.el4.8.src", "4ES:freetype-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-demos-0:2.1.9-15.el4.8.i386", "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64", "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x", "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-devel-0:2.1.9-15.el4.8.i386", "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64", "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x", "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-utils-0:2.1.9-15.el4.8.i386", "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64", "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x", "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-0:2.1.9-15.el4.8.i386", "4WS:freetype-0:2.1.9-15.el4.8.ia64", "4WS:freetype-0:2.1.9-15.el4.8.ppc", "4WS:freetype-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-0:2.1.9-15.el4.8.s390", "4WS:freetype-0:2.1.9-15.el4.8.s390x", "4WS:freetype-0:2.1.9-15.el4.8.src", "4WS:freetype-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-demos-0:2.1.9-15.el4.8.i386", "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-devel-0:2.1.9-15.el4.8.i386", "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-utils-0:2.1.9-15.el4.8.i386", "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-0:2.2.1-26.el5_5.i386", "5Client:freetype-0:2.2.1-26.el5_5.ia64", "5Client:freetype-0:2.2.1-26.el5_5.ppc", "5Client:freetype-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-0:2.2.1-26.el5_5.s390", "5Client:freetype-0:2.2.1-26.el5_5.s390x", "5Client:freetype-0:2.2.1-26.el5_5.src", "5Client:freetype-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-0:2.2.1-26.el5_5.i386", "5Server:freetype-0:2.2.1-26.el5_5.ia64", "5Server:freetype-0:2.2.1-26.el5_5.ppc", "5Server:freetype-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-0:2.2.1-26.el5_5.s390", "5Server:freetype-0:2.2.1-26.el5_5.s390x", "5Server:freetype-0:2.2.1-26.el5_5.src", "5Server:freetype-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-demos-0:2.2.1-26.el5_5.i386", "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-devel-0:2.2.1-26.el5_5.i386", "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0607" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:freetype-0:2.1.4-16.el3.i386", "3AS:freetype-0:2.1.4-16.el3.ia64", "3AS:freetype-0:2.1.4-16.el3.ppc", "3AS:freetype-0:2.1.4-16.el3.ppc64", "3AS:freetype-0:2.1.4-16.el3.s390", "3AS:freetype-0:2.1.4-16.el3.s390x", "3AS:freetype-0:2.1.4-16.el3.src", "3AS:freetype-0:2.1.4-16.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3AS:freetype-devel-0:2.1.4-16.el3.i386", "3AS:freetype-devel-0:2.1.4-16.el3.ia64", "3AS:freetype-devel-0:2.1.4-16.el3.ppc", "3AS:freetype-devel-0:2.1.4-16.el3.s390", "3AS:freetype-devel-0:2.1.4-16.el3.s390x", "3AS:freetype-devel-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-0:2.1.4-16.el3.i386", "3Desktop:freetype-0:2.1.4-16.el3.ia64", "3Desktop:freetype-0:2.1.4-16.el3.ppc", "3Desktop:freetype-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-0:2.1.4-16.el3.s390", "3Desktop:freetype-0:2.1.4-16.el3.s390x", "3Desktop:freetype-0:2.1.4-16.el3.src", "3Desktop:freetype-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-16.el3.i386", "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64", "3ES:freetype-0:2.1.4-16.el3.i386", "3ES:freetype-0:2.1.4-16.el3.ia64", "3ES:freetype-0:2.1.4-16.el3.ppc", "3ES:freetype-0:2.1.4-16.el3.ppc64", "3ES:freetype-0:2.1.4-16.el3.s390", "3ES:freetype-0:2.1.4-16.el3.s390x", "3ES:freetype-0:2.1.4-16.el3.src", "3ES:freetype-0:2.1.4-16.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3ES:freetype-devel-0:2.1.4-16.el3.i386", "3ES:freetype-devel-0:2.1.4-16.el3.ia64", "3ES:freetype-devel-0:2.1.4-16.el3.ppc", "3ES:freetype-devel-0:2.1.4-16.el3.s390", "3ES:freetype-devel-0:2.1.4-16.el3.s390x", "3ES:freetype-devel-0:2.1.4-16.el3.x86_64", "3WS:freetype-0:2.1.4-16.el3.i386", "3WS:freetype-0:2.1.4-16.el3.ia64", "3WS:freetype-0:2.1.4-16.el3.ppc", "3WS:freetype-0:2.1.4-16.el3.ppc64", "3WS:freetype-0:2.1.4-16.el3.s390", "3WS:freetype-0:2.1.4-16.el3.s390x", "3WS:freetype-0:2.1.4-16.el3.src", "3WS:freetype-0:2.1.4-16.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3WS:freetype-devel-0:2.1.4-16.el3.i386", "3WS:freetype-devel-0:2.1.4-16.el3.ia64", "3WS:freetype-devel-0:2.1.4-16.el3.ppc", "3WS:freetype-devel-0:2.1.4-16.el3.s390", "3WS:freetype-devel-0:2.1.4-16.el3.s390x", "3WS:freetype-devel-0:2.1.4-16.el3.x86_64", "4AS:freetype-0:2.1.9-15.el4.8.i386", "4AS:freetype-0:2.1.9-15.el4.8.ia64", "4AS:freetype-0:2.1.9-15.el4.8.ppc", "4AS:freetype-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-0:2.1.9-15.el4.8.s390", "4AS:freetype-0:2.1.9-15.el4.8.s390x", "4AS:freetype-0:2.1.9-15.el4.8.src", "4AS:freetype-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-demos-0:2.1.9-15.el4.8.i386", "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-devel-0:2.1.9-15.el4.8.i386", "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-utils-0:2.1.9-15.el4.8.i386", "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-0:2.1.9-15.el4.8.src", "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-0:2.1.9-15.el4.8.i386", "4ES:freetype-0:2.1.9-15.el4.8.ia64", "4ES:freetype-0:2.1.9-15.el4.8.ppc", "4ES:freetype-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-0:2.1.9-15.el4.8.s390", "4ES:freetype-0:2.1.9-15.el4.8.s390x", "4ES:freetype-0:2.1.9-15.el4.8.src", "4ES:freetype-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-demos-0:2.1.9-15.el4.8.i386", "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64", "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x", "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-devel-0:2.1.9-15.el4.8.i386", "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64", "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x", "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-utils-0:2.1.9-15.el4.8.i386", "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64", "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x", "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-0:2.1.9-15.el4.8.i386", "4WS:freetype-0:2.1.9-15.el4.8.ia64", "4WS:freetype-0:2.1.9-15.el4.8.ppc", "4WS:freetype-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-0:2.1.9-15.el4.8.s390", "4WS:freetype-0:2.1.9-15.el4.8.s390x", "4WS:freetype-0:2.1.9-15.el4.8.src", "4WS:freetype-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-demos-0:2.1.9-15.el4.8.i386", "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-devel-0:2.1.9-15.el4.8.i386", "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-utils-0:2.1.9-15.el4.8.i386", "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-0:2.2.1-26.el5_5.i386", "5Client:freetype-0:2.2.1-26.el5_5.ia64", "5Client:freetype-0:2.2.1-26.el5_5.ppc", "5Client:freetype-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-0:2.2.1-26.el5_5.s390", "5Client:freetype-0:2.2.1-26.el5_5.s390x", "5Client:freetype-0:2.2.1-26.el5_5.src", "5Client:freetype-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-0:2.2.1-26.el5_5.i386", "5Server:freetype-0:2.2.1-26.el5_5.ia64", "5Server:freetype-0:2.2.1-26.el5_5.ppc", "5Server:freetype-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-0:2.2.1-26.el5_5.s390", "5Server:freetype-0:2.2.1-26.el5_5.s390x", "5Server:freetype-0:2.2.1-26.el5_5.src", "5Server:freetype-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-demos-0:2.2.1-26.el5_5.i386", "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-devel-0:2.2.1-26.el5_5.i386", "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "FreeType: Multiple stack overflows by processing CFF opcodes" } ] }
RHSA-2010:0607
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 3, 4, and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. The freetype packages for Red Hat Enterprise Linux 3 and 4\nprovide both the FreeType 1 and FreeType 2 font engines. The freetype\npackages for Red Hat Enterprise Linux 5 provide only the FreeType 2 font\nengine.\n\nTwo stack overflow flaws were found in the way the FreeType font engine\nprocessed certain Compact Font Format (CFF) character strings (opcodes). If\na user loaded a specially-crafted font file with an application linked\nagainst FreeType, it could cause the application to crash or, possibly,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2010-1797)\n\nRed Hat would like to thank Braden Thomas of the Apple Product Security\nteam for reporting these issues.\n\nNote: CVE-2010-1797 only affects the FreeType 2 font engine.\n\nUsers are advised to upgrade to these updated packages, which contain a\nbackported patch to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0607", "url": "https://access.redhat.com/errata/RHSA-2010:0607" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "621144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0607.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2024-11-22T03:37:00+00:00", "generator": { "date": "2024-11-22T03:37:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0607", "initial_release_date": "2010-08-05T17:27:00+00:00", "revision_history": [ { "date": "2010-08-05T17:27:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-08-05T13:59:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:37:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.ia64", "product": { "name": "freetype-0:2.1.4-16.el3.ia64", "product_id": "freetype-0:2.1.4-16.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.ia64", "product": { "name": "freetype-devel-0:2.1.4-16.el3.ia64", "product_id": "freetype-devel-0:2.1.4-16.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-demos-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-utils-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-devel-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-devel-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-demos-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.i386", "product": { "name": "freetype-0:2.1.4-16.el3.i386", "product_id": "freetype-0:2.1.4-16.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.i386", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.i386", "product": { "name": "freetype-devel-0:2.1.4-16.el3.i386", "product_id": "freetype-devel-0:2.1.4-16.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-0:2.1.9-15.el4.8.i386", "product_id": "freetype-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386", "product_id": "freetype-demos-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386", "product_id": "freetype-utils-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386", "product_id": "freetype-devel-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386", "product_id": "freetype-devel-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386", "product_id": "freetype-demos-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-0:2.2.1-26.el5_5.i386", "product_id": "freetype-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.src", "product": { "name": "freetype-0:2.1.4-16.el3.src", "product_id": "freetype-0:2.1.4-16.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.src", "product": { "name": "freetype-0:2.1.9-15.el4.8.src", "product_id": "freetype-0:2.1.9-15.el4.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.src", "product": { "name": "freetype-0:2.2.1-26.el5_5.src", "product_id": "freetype-0:2.2.1-26.el5_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.x86_64", "product": { "name": "freetype-0:2.1.4-16.el3.x86_64", "product_id": "freetype-0:2.1.4-16.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.x86_64", "product": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64", "product_id": "freetype-devel-0:2.1.4-16.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.ppc64", "product": { "name": "freetype-0:2.1.4-16.el3.ppc64", "product_id": "freetype-0:2.1.4-16.el3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.ppc64", "product": { "name": "freetype-0:2.1.9-15.el4.8.ppc64", "product_id": "freetype-0:2.1.9-15.el4.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "product_id": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.ppc64", "product": { "name": "freetype-0:2.2.1-26.el5_5.ppc64", "product_id": "freetype-0:2.2.1-26.el5_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.ppc", "product": { "name": "freetype-0:2.1.4-16.el3.ppc", "product_id": "freetype-0:2.1.4-16.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.ppc", "product": { "name": "freetype-devel-0:2.1.4-16.el3.ppc", "product_id": "freetype-devel-0:2.1.4-16.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-demos-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-utils-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-devel-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-devel-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-demos-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.s390x", "product": { "name": "freetype-0:2.1.4-16.el3.s390x", "product_id": "freetype-0:2.1.4-16.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.s390x", "product": { "name": "freetype-devel-0:2.1.4-16.el3.s390x", "product_id": "freetype-devel-0:2.1.4-16.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-demos-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-utils-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-devel-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-devel-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-demos-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.s390", "product": { "name": "freetype-0:2.1.4-16.el3.s390", "product_id": "freetype-0:2.1.4-16.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.s390", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.s390", "product": { "name": "freetype-devel-0:2.1.4-16.el3.s390", "product_id": "freetype-devel-0:2.1.4-16.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-0:2.1.9-15.el4.8.s390", "product_id": "freetype-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390", "product_id": "freetype-demos-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390", "product_id": "freetype-utils-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390", "product_id": "freetype-devel-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.s390", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390", "product_id": "freetype-devel-0:2.2.1-26.el5_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.s390", "product": { "name": "freetype-0:2.2.1-26.el5_5.s390", "product_id": "freetype-0:2.2.1-26.el5_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src" }, "product_reference": "freetype-0:2.2.1-26.el5_5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.src" }, "product_reference": "freetype-0:2.2.1-26.el5_5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.src" }, "product_reference": "freetype-0:2.2.1-26.el5_5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Braden Thomas" ], "organization": "Apple Product Security team" } ], "cve": "CVE-2010-1797", "discovery_date": "2010-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "621144" } ], "notes": [ { "category": "description", "text": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "FreeType: Multiple stack overflows by processing CFF opcodes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:freetype-0:2.1.4-16.el3.i386", "3AS:freetype-0:2.1.4-16.el3.ia64", "3AS:freetype-0:2.1.4-16.el3.ppc", "3AS:freetype-0:2.1.4-16.el3.ppc64", "3AS:freetype-0:2.1.4-16.el3.s390", "3AS:freetype-0:2.1.4-16.el3.s390x", "3AS:freetype-0:2.1.4-16.el3.src", "3AS:freetype-0:2.1.4-16.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3AS:freetype-devel-0:2.1.4-16.el3.i386", "3AS:freetype-devel-0:2.1.4-16.el3.ia64", "3AS:freetype-devel-0:2.1.4-16.el3.ppc", "3AS:freetype-devel-0:2.1.4-16.el3.s390", "3AS:freetype-devel-0:2.1.4-16.el3.s390x", "3AS:freetype-devel-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-0:2.1.4-16.el3.i386", "3Desktop:freetype-0:2.1.4-16.el3.ia64", "3Desktop:freetype-0:2.1.4-16.el3.ppc", "3Desktop:freetype-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-0:2.1.4-16.el3.s390", "3Desktop:freetype-0:2.1.4-16.el3.s390x", "3Desktop:freetype-0:2.1.4-16.el3.src", "3Desktop:freetype-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-16.el3.i386", "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64", "3ES:freetype-0:2.1.4-16.el3.i386", "3ES:freetype-0:2.1.4-16.el3.ia64", "3ES:freetype-0:2.1.4-16.el3.ppc", "3ES:freetype-0:2.1.4-16.el3.ppc64", "3ES:freetype-0:2.1.4-16.el3.s390", "3ES:freetype-0:2.1.4-16.el3.s390x", "3ES:freetype-0:2.1.4-16.el3.src", "3ES:freetype-0:2.1.4-16.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3ES:freetype-devel-0:2.1.4-16.el3.i386", "3ES:freetype-devel-0:2.1.4-16.el3.ia64", "3ES:freetype-devel-0:2.1.4-16.el3.ppc", "3ES:freetype-devel-0:2.1.4-16.el3.s390", "3ES:freetype-devel-0:2.1.4-16.el3.s390x", "3ES:freetype-devel-0:2.1.4-16.el3.x86_64", "3WS:freetype-0:2.1.4-16.el3.i386", "3WS:freetype-0:2.1.4-16.el3.ia64", "3WS:freetype-0:2.1.4-16.el3.ppc", "3WS:freetype-0:2.1.4-16.el3.ppc64", "3WS:freetype-0:2.1.4-16.el3.s390", "3WS:freetype-0:2.1.4-16.el3.s390x", "3WS:freetype-0:2.1.4-16.el3.src", "3WS:freetype-0:2.1.4-16.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3WS:freetype-devel-0:2.1.4-16.el3.i386", "3WS:freetype-devel-0:2.1.4-16.el3.ia64", "3WS:freetype-devel-0:2.1.4-16.el3.ppc", "3WS:freetype-devel-0:2.1.4-16.el3.s390", "3WS:freetype-devel-0:2.1.4-16.el3.s390x", "3WS:freetype-devel-0:2.1.4-16.el3.x86_64", "4AS:freetype-0:2.1.9-15.el4.8.i386", "4AS:freetype-0:2.1.9-15.el4.8.ia64", "4AS:freetype-0:2.1.9-15.el4.8.ppc", "4AS:freetype-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-0:2.1.9-15.el4.8.s390", "4AS:freetype-0:2.1.9-15.el4.8.s390x", "4AS:freetype-0:2.1.9-15.el4.8.src", "4AS:freetype-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-demos-0:2.1.9-15.el4.8.i386", "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-devel-0:2.1.9-15.el4.8.i386", "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-utils-0:2.1.9-15.el4.8.i386", "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-0:2.1.9-15.el4.8.src", "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-0:2.1.9-15.el4.8.i386", "4ES:freetype-0:2.1.9-15.el4.8.ia64", "4ES:freetype-0:2.1.9-15.el4.8.ppc", "4ES:freetype-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-0:2.1.9-15.el4.8.s390", "4ES:freetype-0:2.1.9-15.el4.8.s390x", "4ES:freetype-0:2.1.9-15.el4.8.src", "4ES:freetype-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-demos-0:2.1.9-15.el4.8.i386", "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64", "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x", "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-devel-0:2.1.9-15.el4.8.i386", "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64", "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x", "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-utils-0:2.1.9-15.el4.8.i386", "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64", "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x", "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-0:2.1.9-15.el4.8.i386", "4WS:freetype-0:2.1.9-15.el4.8.ia64", "4WS:freetype-0:2.1.9-15.el4.8.ppc", "4WS:freetype-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-0:2.1.9-15.el4.8.s390", "4WS:freetype-0:2.1.9-15.el4.8.s390x", "4WS:freetype-0:2.1.9-15.el4.8.src", "4WS:freetype-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-demos-0:2.1.9-15.el4.8.i386", "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-devel-0:2.1.9-15.el4.8.i386", "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-utils-0:2.1.9-15.el4.8.i386", "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-0:2.2.1-26.el5_5.i386", "5Client:freetype-0:2.2.1-26.el5_5.ia64", "5Client:freetype-0:2.2.1-26.el5_5.ppc", "5Client:freetype-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-0:2.2.1-26.el5_5.s390", "5Client:freetype-0:2.2.1-26.el5_5.s390x", "5Client:freetype-0:2.2.1-26.el5_5.src", "5Client:freetype-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-0:2.2.1-26.el5_5.i386", "5Server:freetype-0:2.2.1-26.el5_5.ia64", "5Server:freetype-0:2.2.1-26.el5_5.ppc", "5Server:freetype-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-0:2.2.1-26.el5_5.s390", "5Server:freetype-0:2.2.1-26.el5_5.s390x", "5Server:freetype-0:2.2.1-26.el5_5.src", "5Server:freetype-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-demos-0:2.2.1-26.el5_5.i386", "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-devel-0:2.2.1-26.el5_5.i386", "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1797" }, { "category": "external", "summary": "RHBZ#621144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1797", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797" } ], "release_date": "2010-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-08-05T17:27:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:freetype-0:2.1.4-16.el3.i386", "3AS:freetype-0:2.1.4-16.el3.ia64", "3AS:freetype-0:2.1.4-16.el3.ppc", "3AS:freetype-0:2.1.4-16.el3.ppc64", "3AS:freetype-0:2.1.4-16.el3.s390", "3AS:freetype-0:2.1.4-16.el3.s390x", "3AS:freetype-0:2.1.4-16.el3.src", "3AS:freetype-0:2.1.4-16.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3AS:freetype-devel-0:2.1.4-16.el3.i386", "3AS:freetype-devel-0:2.1.4-16.el3.ia64", "3AS:freetype-devel-0:2.1.4-16.el3.ppc", "3AS:freetype-devel-0:2.1.4-16.el3.s390", "3AS:freetype-devel-0:2.1.4-16.el3.s390x", "3AS:freetype-devel-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-0:2.1.4-16.el3.i386", "3Desktop:freetype-0:2.1.4-16.el3.ia64", "3Desktop:freetype-0:2.1.4-16.el3.ppc", "3Desktop:freetype-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-0:2.1.4-16.el3.s390", "3Desktop:freetype-0:2.1.4-16.el3.s390x", "3Desktop:freetype-0:2.1.4-16.el3.src", "3Desktop:freetype-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-16.el3.i386", "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64", "3ES:freetype-0:2.1.4-16.el3.i386", "3ES:freetype-0:2.1.4-16.el3.ia64", "3ES:freetype-0:2.1.4-16.el3.ppc", "3ES:freetype-0:2.1.4-16.el3.ppc64", "3ES:freetype-0:2.1.4-16.el3.s390", "3ES:freetype-0:2.1.4-16.el3.s390x", "3ES:freetype-0:2.1.4-16.el3.src", "3ES:freetype-0:2.1.4-16.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3ES:freetype-devel-0:2.1.4-16.el3.i386", "3ES:freetype-devel-0:2.1.4-16.el3.ia64", "3ES:freetype-devel-0:2.1.4-16.el3.ppc", "3ES:freetype-devel-0:2.1.4-16.el3.s390", "3ES:freetype-devel-0:2.1.4-16.el3.s390x", "3ES:freetype-devel-0:2.1.4-16.el3.x86_64", "3WS:freetype-0:2.1.4-16.el3.i386", "3WS:freetype-0:2.1.4-16.el3.ia64", "3WS:freetype-0:2.1.4-16.el3.ppc", "3WS:freetype-0:2.1.4-16.el3.ppc64", "3WS:freetype-0:2.1.4-16.el3.s390", "3WS:freetype-0:2.1.4-16.el3.s390x", "3WS:freetype-0:2.1.4-16.el3.src", "3WS:freetype-0:2.1.4-16.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3WS:freetype-devel-0:2.1.4-16.el3.i386", "3WS:freetype-devel-0:2.1.4-16.el3.ia64", "3WS:freetype-devel-0:2.1.4-16.el3.ppc", "3WS:freetype-devel-0:2.1.4-16.el3.s390", "3WS:freetype-devel-0:2.1.4-16.el3.s390x", "3WS:freetype-devel-0:2.1.4-16.el3.x86_64", "4AS:freetype-0:2.1.9-15.el4.8.i386", "4AS:freetype-0:2.1.9-15.el4.8.ia64", "4AS:freetype-0:2.1.9-15.el4.8.ppc", "4AS:freetype-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-0:2.1.9-15.el4.8.s390", "4AS:freetype-0:2.1.9-15.el4.8.s390x", "4AS:freetype-0:2.1.9-15.el4.8.src", "4AS:freetype-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-demos-0:2.1.9-15.el4.8.i386", "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-devel-0:2.1.9-15.el4.8.i386", "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-utils-0:2.1.9-15.el4.8.i386", "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-0:2.1.9-15.el4.8.src", "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-0:2.1.9-15.el4.8.i386", "4ES:freetype-0:2.1.9-15.el4.8.ia64", "4ES:freetype-0:2.1.9-15.el4.8.ppc", "4ES:freetype-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-0:2.1.9-15.el4.8.s390", "4ES:freetype-0:2.1.9-15.el4.8.s390x", "4ES:freetype-0:2.1.9-15.el4.8.src", "4ES:freetype-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-demos-0:2.1.9-15.el4.8.i386", "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64", "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x", "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-devel-0:2.1.9-15.el4.8.i386", "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64", "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x", "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-utils-0:2.1.9-15.el4.8.i386", "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64", "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x", "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-0:2.1.9-15.el4.8.i386", "4WS:freetype-0:2.1.9-15.el4.8.ia64", "4WS:freetype-0:2.1.9-15.el4.8.ppc", "4WS:freetype-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-0:2.1.9-15.el4.8.s390", "4WS:freetype-0:2.1.9-15.el4.8.s390x", "4WS:freetype-0:2.1.9-15.el4.8.src", "4WS:freetype-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-demos-0:2.1.9-15.el4.8.i386", "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-devel-0:2.1.9-15.el4.8.i386", "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-utils-0:2.1.9-15.el4.8.i386", "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-0:2.2.1-26.el5_5.i386", "5Client:freetype-0:2.2.1-26.el5_5.ia64", "5Client:freetype-0:2.2.1-26.el5_5.ppc", "5Client:freetype-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-0:2.2.1-26.el5_5.s390", "5Client:freetype-0:2.2.1-26.el5_5.s390x", "5Client:freetype-0:2.2.1-26.el5_5.src", "5Client:freetype-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-0:2.2.1-26.el5_5.i386", "5Server:freetype-0:2.2.1-26.el5_5.ia64", "5Server:freetype-0:2.2.1-26.el5_5.ppc", "5Server:freetype-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-0:2.2.1-26.el5_5.s390", "5Server:freetype-0:2.2.1-26.el5_5.s390x", "5Server:freetype-0:2.2.1-26.el5_5.src", "5Server:freetype-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-demos-0:2.2.1-26.el5_5.i386", "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-devel-0:2.2.1-26.el5_5.i386", "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0607" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:freetype-0:2.1.4-16.el3.i386", "3AS:freetype-0:2.1.4-16.el3.ia64", "3AS:freetype-0:2.1.4-16.el3.ppc", "3AS:freetype-0:2.1.4-16.el3.ppc64", "3AS:freetype-0:2.1.4-16.el3.s390", "3AS:freetype-0:2.1.4-16.el3.s390x", "3AS:freetype-0:2.1.4-16.el3.src", "3AS:freetype-0:2.1.4-16.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3AS:freetype-devel-0:2.1.4-16.el3.i386", "3AS:freetype-devel-0:2.1.4-16.el3.ia64", "3AS:freetype-devel-0:2.1.4-16.el3.ppc", "3AS:freetype-devel-0:2.1.4-16.el3.s390", "3AS:freetype-devel-0:2.1.4-16.el3.s390x", "3AS:freetype-devel-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-0:2.1.4-16.el3.i386", "3Desktop:freetype-0:2.1.4-16.el3.ia64", "3Desktop:freetype-0:2.1.4-16.el3.ppc", "3Desktop:freetype-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-0:2.1.4-16.el3.s390", "3Desktop:freetype-0:2.1.4-16.el3.s390x", "3Desktop:freetype-0:2.1.4-16.el3.src", "3Desktop:freetype-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-16.el3.i386", "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64", "3ES:freetype-0:2.1.4-16.el3.i386", "3ES:freetype-0:2.1.4-16.el3.ia64", "3ES:freetype-0:2.1.4-16.el3.ppc", "3ES:freetype-0:2.1.4-16.el3.ppc64", "3ES:freetype-0:2.1.4-16.el3.s390", "3ES:freetype-0:2.1.4-16.el3.s390x", "3ES:freetype-0:2.1.4-16.el3.src", "3ES:freetype-0:2.1.4-16.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3ES:freetype-devel-0:2.1.4-16.el3.i386", "3ES:freetype-devel-0:2.1.4-16.el3.ia64", "3ES:freetype-devel-0:2.1.4-16.el3.ppc", "3ES:freetype-devel-0:2.1.4-16.el3.s390", "3ES:freetype-devel-0:2.1.4-16.el3.s390x", "3ES:freetype-devel-0:2.1.4-16.el3.x86_64", "3WS:freetype-0:2.1.4-16.el3.i386", "3WS:freetype-0:2.1.4-16.el3.ia64", "3WS:freetype-0:2.1.4-16.el3.ppc", "3WS:freetype-0:2.1.4-16.el3.ppc64", "3WS:freetype-0:2.1.4-16.el3.s390", "3WS:freetype-0:2.1.4-16.el3.s390x", "3WS:freetype-0:2.1.4-16.el3.src", "3WS:freetype-0:2.1.4-16.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3WS:freetype-devel-0:2.1.4-16.el3.i386", "3WS:freetype-devel-0:2.1.4-16.el3.ia64", "3WS:freetype-devel-0:2.1.4-16.el3.ppc", "3WS:freetype-devel-0:2.1.4-16.el3.s390", "3WS:freetype-devel-0:2.1.4-16.el3.s390x", "3WS:freetype-devel-0:2.1.4-16.el3.x86_64", "4AS:freetype-0:2.1.9-15.el4.8.i386", "4AS:freetype-0:2.1.9-15.el4.8.ia64", "4AS:freetype-0:2.1.9-15.el4.8.ppc", "4AS:freetype-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-0:2.1.9-15.el4.8.s390", "4AS:freetype-0:2.1.9-15.el4.8.s390x", "4AS:freetype-0:2.1.9-15.el4.8.src", "4AS:freetype-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-demos-0:2.1.9-15.el4.8.i386", "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-devel-0:2.1.9-15.el4.8.i386", "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-utils-0:2.1.9-15.el4.8.i386", "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-0:2.1.9-15.el4.8.src", "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-0:2.1.9-15.el4.8.i386", "4ES:freetype-0:2.1.9-15.el4.8.ia64", "4ES:freetype-0:2.1.9-15.el4.8.ppc", "4ES:freetype-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-0:2.1.9-15.el4.8.s390", "4ES:freetype-0:2.1.9-15.el4.8.s390x", "4ES:freetype-0:2.1.9-15.el4.8.src", "4ES:freetype-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-demos-0:2.1.9-15.el4.8.i386", "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64", "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x", "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-devel-0:2.1.9-15.el4.8.i386", "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64", "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x", "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-utils-0:2.1.9-15.el4.8.i386", "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64", "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x", "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-0:2.1.9-15.el4.8.i386", "4WS:freetype-0:2.1.9-15.el4.8.ia64", "4WS:freetype-0:2.1.9-15.el4.8.ppc", "4WS:freetype-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-0:2.1.9-15.el4.8.s390", "4WS:freetype-0:2.1.9-15.el4.8.s390x", "4WS:freetype-0:2.1.9-15.el4.8.src", "4WS:freetype-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-demos-0:2.1.9-15.el4.8.i386", "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-devel-0:2.1.9-15.el4.8.i386", "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-utils-0:2.1.9-15.el4.8.i386", "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-0:2.2.1-26.el5_5.i386", "5Client:freetype-0:2.2.1-26.el5_5.ia64", "5Client:freetype-0:2.2.1-26.el5_5.ppc", "5Client:freetype-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-0:2.2.1-26.el5_5.s390", "5Client:freetype-0:2.2.1-26.el5_5.s390x", "5Client:freetype-0:2.2.1-26.el5_5.src", "5Client:freetype-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-0:2.2.1-26.el5_5.i386", "5Server:freetype-0:2.2.1-26.el5_5.ia64", "5Server:freetype-0:2.2.1-26.el5_5.ppc", "5Server:freetype-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-0:2.2.1-26.el5_5.s390", "5Server:freetype-0:2.2.1-26.el5_5.s390x", "5Server:freetype-0:2.2.1-26.el5_5.src", "5Server:freetype-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-demos-0:2.2.1-26.el5_5.i386", "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-devel-0:2.2.1-26.el5_5.i386", "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "FreeType: Multiple stack overflows by processing CFF opcodes" } ] }
rhsa-2010:0607
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated freetype packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 3, 4, and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeType is a free, high-quality, portable font engine that can open and\nmanage font files. It also loads, hints, and renders individual glyphs\nefficiently. The freetype packages for Red Hat Enterprise Linux 3 and 4\nprovide both the FreeType 1 and FreeType 2 font engines. The freetype\npackages for Red Hat Enterprise Linux 5 provide only the FreeType 2 font\nengine.\n\nTwo stack overflow flaws were found in the way the FreeType font engine\nprocessed certain Compact Font Format (CFF) character strings (opcodes). If\na user loaded a specially-crafted font file with an application linked\nagainst FreeType, it could cause the application to crash or, possibly,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2010-1797)\n\nRed Hat would like to thank Braden Thomas of the Apple Product Security\nteam for reporting these issues.\n\nNote: CVE-2010-1797 only affects the FreeType 2 font engine.\n\nUsers are advised to upgrade to these updated packages, which contain a\nbackported patch to correct these issues. The X server must be restarted\n(log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0607", "url": "https://access.redhat.com/errata/RHSA-2010:0607" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "621144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0607.json" } ], "title": "Red Hat Security Advisory: freetype security update", "tracking": { "current_release_date": "2024-11-22T03:37:00+00:00", "generator": { "date": "2024-11-22T03:37:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0607", "initial_release_date": "2010-08-05T17:27:00+00:00", "revision_history": [ { "date": "2010-08-05T17:27:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-08-05T13:59:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:37:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.ia64", "product": { "name": "freetype-0:2.1.4-16.el3.ia64", "product_id": "freetype-0:2.1.4-16.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.ia64", "product": { "name": "freetype-devel-0:2.1.4-16.el3.ia64", "product_id": "freetype-devel-0:2.1.4-16.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-demos-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-utils-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.ia64", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64", "product_id": "freetype-devel-0:2.1.9-15.el4.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=ia64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=ia64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-devel-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=ia64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-demos-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=ia64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.ia64", "product": { "name": "freetype-0:2.2.1-26.el5_5.ia64", "product_id": "freetype-0:2.2.1-26.el5_5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.i386", "product": { "name": "freetype-0:2.1.4-16.el3.i386", "product_id": "freetype-0:2.1.4-16.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.i386", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.i386", "product": { "name": "freetype-devel-0:2.1.4-16.el3.i386", "product_id": "freetype-devel-0:2.1.4-16.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-0:2.1.9-15.el4.8.i386", "product_id": "freetype-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386", "product_id": "freetype-demos-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386", "product_id": "freetype-utils-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.i386", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386", "product_id": "freetype-devel-0:2.1.9-15.el4.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=i386" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=i386" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386", "product_id": "freetype-devel-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=i386" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386", "product_id": "freetype-demos-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=i386" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.i386", "product": { "name": "freetype-0:2.2.1-26.el5_5.i386", "product_id": "freetype-0:2.2.1-26.el5_5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.src", "product": { "name": "freetype-0:2.1.4-16.el3.src", "product_id": "freetype-0:2.1.4-16.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.src", "product": { "name": "freetype-0:2.1.9-15.el4.8.src", "product_id": "freetype-0:2.1.9-15.el4.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=src" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.src", "product": { "name": "freetype-0:2.2.1-26.el5_5.src", "product_id": "freetype-0:2.2.1-26.el5_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.x86_64", "product": { "name": "freetype-0:2.1.4-16.el3.x86_64", "product_id": "freetype-0:2.1.4-16.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.x86_64", "product": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64", "product_id": "freetype-devel-0:2.1.4-16.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "product_id": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=x86_64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.x86_64", "product": { "name": "freetype-0:2.2.1-26.el5_5.x86_64", "product_id": "freetype-0:2.2.1-26.el5_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.ppc64", "product": { "name": "freetype-0:2.1.4-16.el3.ppc64", "product_id": "freetype-0:2.1.4-16.el3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.ppc64", "product": { "name": "freetype-0:2.1.9-15.el4.8.ppc64", "product_id": "freetype-0:2.1.9-15.el4.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "product_id": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=ppc64" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.ppc64", "product": { "name": "freetype-0:2.2.1-26.el5_5.ppc64", "product_id": "freetype-0:2.2.1-26.el5_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.ppc", "product": { "name": "freetype-0:2.1.4-16.el3.ppc", "product_id": "freetype-0:2.1.4-16.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.ppc", "product": { "name": "freetype-devel-0:2.1.4-16.el3.ppc", "product_id": "freetype-devel-0:2.1.4-16.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-demos-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-utils-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.ppc", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc", "product_id": "freetype-devel-0:2.1.9-15.el4.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=ppc" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=ppc" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-devel-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=ppc" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-demos-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=ppc" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.ppc", "product": { "name": "freetype-0:2.2.1-26.el5_5.ppc", "product_id": "freetype-0:2.2.1-26.el5_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.s390x", "product": { "name": "freetype-0:2.1.4-16.el3.s390x", "product_id": "freetype-0:2.1.4-16.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.s390x", "product": { "name": "freetype-devel-0:2.1.4-16.el3.s390x", "product_id": "freetype-devel-0:2.1.4-16.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-demos-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-utils-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.s390x", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x", "product_id": "freetype-devel-0:2.1.9-15.el4.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=s390x" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=s390x" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-devel-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=s390x" } } }, { "category": "product_version", "name": "freetype-demos-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-demos-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.2.1-26.el5_5?arch=s390x" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.s390x", "product": { "name": "freetype-0:2.2.1-26.el5_5.s390x", "product_id": "freetype-0:2.2.1-26.el5_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freetype-0:2.1.4-16.el3.s390", "product": { "name": "freetype-0:2.1.4-16.el3.s390", "product_id": "freetype-0:2.1.4-16.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.4-16.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.4-16.el3.s390", "product": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390", "product_id": "freetype-debuginfo-0:2.1.4-16.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.4-16.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.4-16.el3.s390", "product": { "name": "freetype-devel-0:2.1.4-16.el3.s390", "product_id": "freetype-devel-0:2.1.4-16.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.4-16.el3?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-0:2.1.9-15.el4.8.s390", "product_id": "freetype-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "product_id": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-demos-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390", "product_id": "freetype-demos-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-demos@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-utils-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390", "product_id": "freetype-utils-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-utils@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.1.9-15.el4.8.s390", "product": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390", "product_id": "freetype-devel-0:2.1.9-15.el4.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.1.9-15.el4.8?arch=s390" } } }, { "category": "product_version", "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "product": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "product_id": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-debuginfo@2.2.1-26.el5_5?arch=s390" } } }, { "category": "product_version", "name": "freetype-devel-0:2.2.1-26.el5_5.s390", "product": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390", "product_id": "freetype-devel-0:2.2.1-26.el5_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype-devel@2.2.1-26.el5_5?arch=s390" } } }, { "category": "product_version", "name": "freetype-0:2.2.1-26.el5_5.s390", "product": { "name": "freetype-0:2.2.1-26.el5_5.s390", "product_id": "freetype-0:2.2.1-26.el5_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freetype@2.2.1-26.el5_5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.src" }, "product_reference": "freetype-0:2.1.4-16.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.i386" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.ia64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.ppc" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.s390" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.s390x" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.4-16.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:freetype-devel-0:2.1.4-16.el3.x86_64" }, "product_reference": "freetype-devel-0:2.1.4-16.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.src" }, "product_reference": "freetype-0:2.1.9-15.el4.8.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-demos-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-devel-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.i386" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.s390" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-utils-0:2.1.9-15.el4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64" }, "product_reference": "freetype-utils-0:2.1.9-15.el4.8.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src" }, "product_reference": "freetype-0:2.2.1-26.el5_5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.src" }, "product_reference": "freetype-0:2.2.1-26.el5_5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.src" }, "product_reference": "freetype-0:2.2.1-26.el5_5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-demos-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-demos-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.i386" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.s390" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "freetype-devel-0:2.2.1-26.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" }, "product_reference": "freetype-devel-0:2.2.1-26.el5_5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Braden Thomas" ], "organization": "Apple Product Security team" } ], "cve": "CVE-2010-1797", "discovery_date": "2010-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "621144" } ], "notes": [ { "category": "description", "text": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "FreeType: Multiple stack overflows by processing CFF opcodes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:freetype-0:2.1.4-16.el3.i386", "3AS:freetype-0:2.1.4-16.el3.ia64", "3AS:freetype-0:2.1.4-16.el3.ppc", "3AS:freetype-0:2.1.4-16.el3.ppc64", "3AS:freetype-0:2.1.4-16.el3.s390", "3AS:freetype-0:2.1.4-16.el3.s390x", "3AS:freetype-0:2.1.4-16.el3.src", "3AS:freetype-0:2.1.4-16.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3AS:freetype-devel-0:2.1.4-16.el3.i386", "3AS:freetype-devel-0:2.1.4-16.el3.ia64", "3AS:freetype-devel-0:2.1.4-16.el3.ppc", "3AS:freetype-devel-0:2.1.4-16.el3.s390", "3AS:freetype-devel-0:2.1.4-16.el3.s390x", "3AS:freetype-devel-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-0:2.1.4-16.el3.i386", "3Desktop:freetype-0:2.1.4-16.el3.ia64", "3Desktop:freetype-0:2.1.4-16.el3.ppc", "3Desktop:freetype-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-0:2.1.4-16.el3.s390", "3Desktop:freetype-0:2.1.4-16.el3.s390x", "3Desktop:freetype-0:2.1.4-16.el3.src", "3Desktop:freetype-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-16.el3.i386", "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64", "3ES:freetype-0:2.1.4-16.el3.i386", "3ES:freetype-0:2.1.4-16.el3.ia64", "3ES:freetype-0:2.1.4-16.el3.ppc", "3ES:freetype-0:2.1.4-16.el3.ppc64", "3ES:freetype-0:2.1.4-16.el3.s390", "3ES:freetype-0:2.1.4-16.el3.s390x", "3ES:freetype-0:2.1.4-16.el3.src", "3ES:freetype-0:2.1.4-16.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3ES:freetype-devel-0:2.1.4-16.el3.i386", "3ES:freetype-devel-0:2.1.4-16.el3.ia64", "3ES:freetype-devel-0:2.1.4-16.el3.ppc", "3ES:freetype-devel-0:2.1.4-16.el3.s390", "3ES:freetype-devel-0:2.1.4-16.el3.s390x", "3ES:freetype-devel-0:2.1.4-16.el3.x86_64", "3WS:freetype-0:2.1.4-16.el3.i386", "3WS:freetype-0:2.1.4-16.el3.ia64", "3WS:freetype-0:2.1.4-16.el3.ppc", "3WS:freetype-0:2.1.4-16.el3.ppc64", "3WS:freetype-0:2.1.4-16.el3.s390", "3WS:freetype-0:2.1.4-16.el3.s390x", "3WS:freetype-0:2.1.4-16.el3.src", "3WS:freetype-0:2.1.4-16.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3WS:freetype-devel-0:2.1.4-16.el3.i386", "3WS:freetype-devel-0:2.1.4-16.el3.ia64", "3WS:freetype-devel-0:2.1.4-16.el3.ppc", "3WS:freetype-devel-0:2.1.4-16.el3.s390", "3WS:freetype-devel-0:2.1.4-16.el3.s390x", "3WS:freetype-devel-0:2.1.4-16.el3.x86_64", "4AS:freetype-0:2.1.9-15.el4.8.i386", "4AS:freetype-0:2.1.9-15.el4.8.ia64", "4AS:freetype-0:2.1.9-15.el4.8.ppc", "4AS:freetype-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-0:2.1.9-15.el4.8.s390", "4AS:freetype-0:2.1.9-15.el4.8.s390x", "4AS:freetype-0:2.1.9-15.el4.8.src", "4AS:freetype-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-demos-0:2.1.9-15.el4.8.i386", "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-devel-0:2.1.9-15.el4.8.i386", "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-utils-0:2.1.9-15.el4.8.i386", "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-0:2.1.9-15.el4.8.src", "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-0:2.1.9-15.el4.8.i386", "4ES:freetype-0:2.1.9-15.el4.8.ia64", "4ES:freetype-0:2.1.9-15.el4.8.ppc", "4ES:freetype-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-0:2.1.9-15.el4.8.s390", "4ES:freetype-0:2.1.9-15.el4.8.s390x", "4ES:freetype-0:2.1.9-15.el4.8.src", "4ES:freetype-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-demos-0:2.1.9-15.el4.8.i386", "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64", "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x", "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-devel-0:2.1.9-15.el4.8.i386", "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64", "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x", "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-utils-0:2.1.9-15.el4.8.i386", "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64", "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x", "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-0:2.1.9-15.el4.8.i386", "4WS:freetype-0:2.1.9-15.el4.8.ia64", "4WS:freetype-0:2.1.9-15.el4.8.ppc", "4WS:freetype-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-0:2.1.9-15.el4.8.s390", "4WS:freetype-0:2.1.9-15.el4.8.s390x", "4WS:freetype-0:2.1.9-15.el4.8.src", "4WS:freetype-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-demos-0:2.1.9-15.el4.8.i386", "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-devel-0:2.1.9-15.el4.8.i386", "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-utils-0:2.1.9-15.el4.8.i386", "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-0:2.2.1-26.el5_5.i386", "5Client:freetype-0:2.2.1-26.el5_5.ia64", "5Client:freetype-0:2.2.1-26.el5_5.ppc", "5Client:freetype-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-0:2.2.1-26.el5_5.s390", "5Client:freetype-0:2.2.1-26.el5_5.s390x", "5Client:freetype-0:2.2.1-26.el5_5.src", "5Client:freetype-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-0:2.2.1-26.el5_5.i386", "5Server:freetype-0:2.2.1-26.el5_5.ia64", "5Server:freetype-0:2.2.1-26.el5_5.ppc", "5Server:freetype-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-0:2.2.1-26.el5_5.s390", "5Server:freetype-0:2.2.1-26.el5_5.s390x", "5Server:freetype-0:2.2.1-26.el5_5.src", "5Server:freetype-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-demos-0:2.2.1-26.el5_5.i386", "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-devel-0:2.2.1-26.el5_5.i386", "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1797" }, { "category": "external", "summary": "RHBZ#621144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1797", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797" } ], "release_date": "2010-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-08-05T17:27:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:freetype-0:2.1.4-16.el3.i386", "3AS:freetype-0:2.1.4-16.el3.ia64", "3AS:freetype-0:2.1.4-16.el3.ppc", "3AS:freetype-0:2.1.4-16.el3.ppc64", "3AS:freetype-0:2.1.4-16.el3.s390", "3AS:freetype-0:2.1.4-16.el3.s390x", "3AS:freetype-0:2.1.4-16.el3.src", "3AS:freetype-0:2.1.4-16.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3AS:freetype-devel-0:2.1.4-16.el3.i386", "3AS:freetype-devel-0:2.1.4-16.el3.ia64", "3AS:freetype-devel-0:2.1.4-16.el3.ppc", "3AS:freetype-devel-0:2.1.4-16.el3.s390", "3AS:freetype-devel-0:2.1.4-16.el3.s390x", "3AS:freetype-devel-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-0:2.1.4-16.el3.i386", "3Desktop:freetype-0:2.1.4-16.el3.ia64", "3Desktop:freetype-0:2.1.4-16.el3.ppc", "3Desktop:freetype-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-0:2.1.4-16.el3.s390", "3Desktop:freetype-0:2.1.4-16.el3.s390x", "3Desktop:freetype-0:2.1.4-16.el3.src", "3Desktop:freetype-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-16.el3.i386", "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64", "3ES:freetype-0:2.1.4-16.el3.i386", "3ES:freetype-0:2.1.4-16.el3.ia64", "3ES:freetype-0:2.1.4-16.el3.ppc", "3ES:freetype-0:2.1.4-16.el3.ppc64", "3ES:freetype-0:2.1.4-16.el3.s390", "3ES:freetype-0:2.1.4-16.el3.s390x", "3ES:freetype-0:2.1.4-16.el3.src", "3ES:freetype-0:2.1.4-16.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3ES:freetype-devel-0:2.1.4-16.el3.i386", "3ES:freetype-devel-0:2.1.4-16.el3.ia64", "3ES:freetype-devel-0:2.1.4-16.el3.ppc", "3ES:freetype-devel-0:2.1.4-16.el3.s390", "3ES:freetype-devel-0:2.1.4-16.el3.s390x", "3ES:freetype-devel-0:2.1.4-16.el3.x86_64", "3WS:freetype-0:2.1.4-16.el3.i386", "3WS:freetype-0:2.1.4-16.el3.ia64", "3WS:freetype-0:2.1.4-16.el3.ppc", "3WS:freetype-0:2.1.4-16.el3.ppc64", "3WS:freetype-0:2.1.4-16.el3.s390", "3WS:freetype-0:2.1.4-16.el3.s390x", "3WS:freetype-0:2.1.4-16.el3.src", "3WS:freetype-0:2.1.4-16.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3WS:freetype-devel-0:2.1.4-16.el3.i386", "3WS:freetype-devel-0:2.1.4-16.el3.ia64", "3WS:freetype-devel-0:2.1.4-16.el3.ppc", "3WS:freetype-devel-0:2.1.4-16.el3.s390", "3WS:freetype-devel-0:2.1.4-16.el3.s390x", "3WS:freetype-devel-0:2.1.4-16.el3.x86_64", "4AS:freetype-0:2.1.9-15.el4.8.i386", "4AS:freetype-0:2.1.9-15.el4.8.ia64", "4AS:freetype-0:2.1.9-15.el4.8.ppc", "4AS:freetype-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-0:2.1.9-15.el4.8.s390", "4AS:freetype-0:2.1.9-15.el4.8.s390x", "4AS:freetype-0:2.1.9-15.el4.8.src", "4AS:freetype-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-demos-0:2.1.9-15.el4.8.i386", "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-devel-0:2.1.9-15.el4.8.i386", "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-utils-0:2.1.9-15.el4.8.i386", "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-0:2.1.9-15.el4.8.src", "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-0:2.1.9-15.el4.8.i386", "4ES:freetype-0:2.1.9-15.el4.8.ia64", "4ES:freetype-0:2.1.9-15.el4.8.ppc", "4ES:freetype-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-0:2.1.9-15.el4.8.s390", "4ES:freetype-0:2.1.9-15.el4.8.s390x", "4ES:freetype-0:2.1.9-15.el4.8.src", "4ES:freetype-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-demos-0:2.1.9-15.el4.8.i386", "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64", "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x", "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-devel-0:2.1.9-15.el4.8.i386", "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64", "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x", "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-utils-0:2.1.9-15.el4.8.i386", "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64", "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x", "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-0:2.1.9-15.el4.8.i386", "4WS:freetype-0:2.1.9-15.el4.8.ia64", "4WS:freetype-0:2.1.9-15.el4.8.ppc", "4WS:freetype-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-0:2.1.9-15.el4.8.s390", "4WS:freetype-0:2.1.9-15.el4.8.s390x", "4WS:freetype-0:2.1.9-15.el4.8.src", "4WS:freetype-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-demos-0:2.1.9-15.el4.8.i386", "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-devel-0:2.1.9-15.el4.8.i386", "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-utils-0:2.1.9-15.el4.8.i386", "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-0:2.2.1-26.el5_5.i386", "5Client:freetype-0:2.2.1-26.el5_5.ia64", "5Client:freetype-0:2.2.1-26.el5_5.ppc", "5Client:freetype-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-0:2.2.1-26.el5_5.s390", "5Client:freetype-0:2.2.1-26.el5_5.s390x", "5Client:freetype-0:2.2.1-26.el5_5.src", "5Client:freetype-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-0:2.2.1-26.el5_5.i386", "5Server:freetype-0:2.2.1-26.el5_5.ia64", "5Server:freetype-0:2.2.1-26.el5_5.ppc", "5Server:freetype-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-0:2.2.1-26.el5_5.s390", "5Server:freetype-0:2.2.1-26.el5_5.s390x", "5Server:freetype-0:2.2.1-26.el5_5.src", "5Server:freetype-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-demos-0:2.2.1-26.el5_5.i386", "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-devel-0:2.2.1-26.el5_5.i386", "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0607" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:freetype-0:2.1.4-16.el3.i386", "3AS:freetype-0:2.1.4-16.el3.ia64", "3AS:freetype-0:2.1.4-16.el3.ppc", "3AS:freetype-0:2.1.4-16.el3.ppc64", "3AS:freetype-0:2.1.4-16.el3.s390", "3AS:freetype-0:2.1.4-16.el3.s390x", "3AS:freetype-0:2.1.4-16.el3.src", "3AS:freetype-0:2.1.4-16.el3.x86_64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3AS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3AS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3AS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3AS:freetype-devel-0:2.1.4-16.el3.i386", "3AS:freetype-devel-0:2.1.4-16.el3.ia64", "3AS:freetype-devel-0:2.1.4-16.el3.ppc", "3AS:freetype-devel-0:2.1.4-16.el3.s390", "3AS:freetype-devel-0:2.1.4-16.el3.s390x", "3AS:freetype-devel-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-0:2.1.4-16.el3.i386", "3Desktop:freetype-0:2.1.4-16.el3.ia64", "3Desktop:freetype-0:2.1.4-16.el3.ppc", "3Desktop:freetype-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-0:2.1.4-16.el3.s390", "3Desktop:freetype-0:2.1.4-16.el3.s390x", "3Desktop:freetype-0:2.1.4-16.el3.src", "3Desktop:freetype-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.i386", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3Desktop:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3Desktop:freetype-devel-0:2.1.4-16.el3.i386", "3Desktop:freetype-devel-0:2.1.4-16.el3.ia64", "3Desktop:freetype-devel-0:2.1.4-16.el3.ppc", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390", "3Desktop:freetype-devel-0:2.1.4-16.el3.s390x", "3Desktop:freetype-devel-0:2.1.4-16.el3.x86_64", "3ES:freetype-0:2.1.4-16.el3.i386", "3ES:freetype-0:2.1.4-16.el3.ia64", "3ES:freetype-0:2.1.4-16.el3.ppc", "3ES:freetype-0:2.1.4-16.el3.ppc64", "3ES:freetype-0:2.1.4-16.el3.s390", "3ES:freetype-0:2.1.4-16.el3.s390x", "3ES:freetype-0:2.1.4-16.el3.src", "3ES:freetype-0:2.1.4-16.el3.x86_64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.i386", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3ES:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390", "3ES:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3ES:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3ES:freetype-devel-0:2.1.4-16.el3.i386", "3ES:freetype-devel-0:2.1.4-16.el3.ia64", "3ES:freetype-devel-0:2.1.4-16.el3.ppc", "3ES:freetype-devel-0:2.1.4-16.el3.s390", "3ES:freetype-devel-0:2.1.4-16.el3.s390x", "3ES:freetype-devel-0:2.1.4-16.el3.x86_64", "3WS:freetype-0:2.1.4-16.el3.i386", "3WS:freetype-0:2.1.4-16.el3.ia64", "3WS:freetype-0:2.1.4-16.el3.ppc", "3WS:freetype-0:2.1.4-16.el3.ppc64", "3WS:freetype-0:2.1.4-16.el3.s390", "3WS:freetype-0:2.1.4-16.el3.s390x", "3WS:freetype-0:2.1.4-16.el3.src", "3WS:freetype-0:2.1.4-16.el3.x86_64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.i386", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ia64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc", "3WS:freetype-debuginfo-0:2.1.4-16.el3.ppc64", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390", "3WS:freetype-debuginfo-0:2.1.4-16.el3.s390x", "3WS:freetype-debuginfo-0:2.1.4-16.el3.x86_64", "3WS:freetype-devel-0:2.1.4-16.el3.i386", "3WS:freetype-devel-0:2.1.4-16.el3.ia64", "3WS:freetype-devel-0:2.1.4-16.el3.ppc", "3WS:freetype-devel-0:2.1.4-16.el3.s390", "3WS:freetype-devel-0:2.1.4-16.el3.s390x", "3WS:freetype-devel-0:2.1.4-16.el3.x86_64", "4AS:freetype-0:2.1.9-15.el4.8.i386", "4AS:freetype-0:2.1.9-15.el4.8.ia64", "4AS:freetype-0:2.1.9-15.el4.8.ppc", "4AS:freetype-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-0:2.1.9-15.el4.8.s390", "4AS:freetype-0:2.1.9-15.el4.8.s390x", "4AS:freetype-0:2.1.9-15.el4.8.src", "4AS:freetype-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4AS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-demos-0:2.1.9-15.el4.8.i386", "4AS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4AS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390", "4AS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4AS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-devel-0:2.1.9-15.el4.8.i386", "4AS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4AS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390", "4AS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4AS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4AS:freetype-utils-0:2.1.9-15.el4.8.i386", "4AS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4AS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390", "4AS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4AS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-0:2.1.9-15.el4.8.src", "4Desktop:freetype-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.i386", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ia64", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.ppc", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.s390x", "4Desktop:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-0:2.1.9-15.el4.8.i386", "4ES:freetype-0:2.1.9-15.el4.8.ia64", "4ES:freetype-0:2.1.9-15.el4.8.ppc", "4ES:freetype-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-0:2.1.9-15.el4.8.s390", "4ES:freetype-0:2.1.9-15.el4.8.s390x", "4ES:freetype-0:2.1.9-15.el4.8.src", "4ES:freetype-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4ES:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-demos-0:2.1.9-15.el4.8.i386", "4ES:freetype-demos-0:2.1.9-15.el4.8.ia64", "4ES:freetype-demos-0:2.1.9-15.el4.8.ppc", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390", "4ES:freetype-demos-0:2.1.9-15.el4.8.s390x", "4ES:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-devel-0:2.1.9-15.el4.8.i386", "4ES:freetype-devel-0:2.1.9-15.el4.8.ia64", "4ES:freetype-devel-0:2.1.9-15.el4.8.ppc", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390", "4ES:freetype-devel-0:2.1.9-15.el4.8.s390x", "4ES:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4ES:freetype-utils-0:2.1.9-15.el4.8.i386", "4ES:freetype-utils-0:2.1.9-15.el4.8.ia64", "4ES:freetype-utils-0:2.1.9-15.el4.8.ppc", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390", "4ES:freetype-utils-0:2.1.9-15.el4.8.s390x", "4ES:freetype-utils-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-0:2.1.9-15.el4.8.i386", "4WS:freetype-0:2.1.9-15.el4.8.ia64", "4WS:freetype-0:2.1.9-15.el4.8.ppc", "4WS:freetype-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-0:2.1.9-15.el4.8.s390", "4WS:freetype-0:2.1.9-15.el4.8.s390x", "4WS:freetype-0:2.1.9-15.el4.8.src", "4WS:freetype-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.i386", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ia64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.ppc64", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.s390x", "4WS:freetype-debuginfo-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-demos-0:2.1.9-15.el4.8.i386", "4WS:freetype-demos-0:2.1.9-15.el4.8.ia64", "4WS:freetype-demos-0:2.1.9-15.el4.8.ppc", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390", "4WS:freetype-demos-0:2.1.9-15.el4.8.s390x", "4WS:freetype-demos-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-devel-0:2.1.9-15.el4.8.i386", "4WS:freetype-devel-0:2.1.9-15.el4.8.ia64", "4WS:freetype-devel-0:2.1.9-15.el4.8.ppc", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390", "4WS:freetype-devel-0:2.1.9-15.el4.8.s390x", "4WS:freetype-devel-0:2.1.9-15.el4.8.x86_64", "4WS:freetype-utils-0:2.1.9-15.el4.8.i386", "4WS:freetype-utils-0:2.1.9-15.el4.8.ia64", "4WS:freetype-utils-0:2.1.9-15.el4.8.ppc", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390", "4WS:freetype-utils-0:2.1.9-15.el4.8.s390x", "4WS:freetype-utils-0:2.1.9-15.el4.8.x86_64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.src", "5Client-Workstation:freetype-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client-Workstation:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-0:2.2.1-26.el5_5.i386", "5Client:freetype-0:2.2.1-26.el5_5.ia64", "5Client:freetype-0:2.2.1-26.el5_5.ppc", "5Client:freetype-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-0:2.2.1-26.el5_5.s390", "5Client:freetype-0:2.2.1-26.el5_5.s390x", "5Client:freetype-0:2.2.1-26.el5_5.src", "5Client:freetype-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Client:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-demos-0:2.2.1-26.el5_5.i386", "5Client:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Client:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Client:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Client:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Client:freetype-devel-0:2.2.1-26.el5_5.i386", "5Client:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Client:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390", "5Client:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Client:freetype-devel-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-0:2.2.1-26.el5_5.i386", "5Server:freetype-0:2.2.1-26.el5_5.ia64", "5Server:freetype-0:2.2.1-26.el5_5.ppc", "5Server:freetype-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-0:2.2.1-26.el5_5.s390", "5Server:freetype-0:2.2.1-26.el5_5.s390x", "5Server:freetype-0:2.2.1-26.el5_5.src", "5Server:freetype-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.i386", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ia64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.s390x", "5Server:freetype-debuginfo-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-demos-0:2.2.1-26.el5_5.i386", "5Server:freetype-demos-0:2.2.1-26.el5_5.ia64", "5Server:freetype-demos-0:2.2.1-26.el5_5.ppc", "5Server:freetype-demos-0:2.2.1-26.el5_5.s390x", "5Server:freetype-demos-0:2.2.1-26.el5_5.x86_64", "5Server:freetype-devel-0:2.2.1-26.el5_5.i386", "5Server:freetype-devel-0:2.2.1-26.el5_5.ia64", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc", "5Server:freetype-devel-0:2.2.1-26.el5_5.ppc64", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390", "5Server:freetype-devel-0:2.2.1-26.el5_5.s390x", "5Server:freetype-devel-0:2.2.1-26.el5_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "FreeType: Multiple stack overflows by processing CFF opcodes" } ] }
CVE-2010-1797
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "B669868B-F358-4D5B-9D64-4A462F261553", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E28FB0CB-D636-4F85-B5F7-70EC30053925", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "A14B31DE-AA3D-4FA2-A4F4-0A6A51AFA7FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9EC16D1C-065A-4D1A-BA6E-528A71DF65CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*", "matchCriteriaId": "4261E5C1-DC93-437E-B84F-A30380AFDC40", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "079BB54C-25FD-4B26-B171-368911960F76", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "27319629-171F-42AA-A95F-2D71F78097D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "DF292FED-19A4-4031-9B1F-151C0146F3B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "5183082C-556F-479F-9FC1-42B59BBB840B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "AAC3FBF0-F128-412D-9FD5-13BB2EB92DD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "297F9438-0F04-4128-94A8-A504B600929E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*", "matchCriteriaId": "2FFCFEA4-C5E2-4C46-B8C3-ADCDBA4B85EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "7E7AA027-8CF9-49BD-A000-82880E41D622", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "F8618621-F871-4531-9F6C-7D60F2BF8B75", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*", "matchCriteriaId": "4FA51920-223B-4DF4-802C-188F5A8B0563", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "4385635D-46F2-4642-9C78-1346DC120492", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "824DED2D-FA1D-46FC-8252-6E25546DAE29", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*", "matchCriteriaId": "2C63C36E-1997-4F44-80AD-E665CE46A278", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "20DAE911-C037-4F10-82A3-EF42D5FB71D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1641DDFA-3BF1-467F-8EC3-98114FF9F07B", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF40CDA4-4716-4815-9ED0-093FE266734C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*", "matchCriteriaId": "02BFDD6F-B9C3-42BB-A84A-828193FAA137", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "0A66D6DC-9A48-4BD6-9E01-0D9FF388457C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "CFD4325B-A86A-4C1B-930F-56C17FB6281D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "C59B8C50-BF5D-4E9A-8E5B-99B34E974B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D06D54D-97FD-49FD-B251-CC86FBA68CA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "2904DEFA-7769-43DB-B3D0-B552AE8F06A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "D4CE4199-BBF5-4F42-8BBC-BD946079C912", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "25A5D868-0016-44AB-80E6-E5DF91F15455", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "0AD5106E-CD7C-4952-A9B1-5F72D99276E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "34346F55-4972-427B-8F96-780FA91DB95D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "B7235341-983F-4578-98DC-39BC278A7556", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "BA5C2D75-4019-45EB-8AF9-A850B5349507", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "AD136376-331D-494F-9D12-7E631546E8CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "863383DA-0BC6-4A96-835A-A96128EC0202", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "matchCriteriaId": "A066B59B-D5C8-4AA8-9CC7-5D34F4AB88AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "F07B3FE7-96B3-493A-A230-5642BA11FBDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "9FB0870F-82CF-4C97-BDC6-F0C4BBE7462D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "51D3BE2B-5A01-4AD4-A436-0056B50A535D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "E357722F-4976-4E47-BFB5-709480BAE267", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "F43A6FEC-ECA9-44A4-AD00-FDC6F3990DC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A20F171-79FE-43B9-8309-B18341639FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "7CA92907-90C9-4BD6-8EE8-8FA6298C3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "52283848-67CC-4E4B-A849-1225F2BCBD9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "126EF22D-29BC-4366-97BC-B261311E6251", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "matchCriteriaId": "220590DA-2B6A-4FC9-B456-3053EED9D96E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "3FE3CDE8-6497-445E-A845-8A1C2A4EDEB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "9E4D3134-28BC-4C30-A9B0-559338FBBDFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A939B80-0AD0-48AF-81A7-370716F56639", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "matchCriteriaId": "98C41674-370B-4CF0-817B-3843D93A10DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "12E22AF0-2B66-425A-A1EE-4F0E3B0433E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "matchCriteriaId": "954CDDCB-AC22-448D-8ECA-CFA4DBA1BC27", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "54FECD66-4216-43FC-9959-B8EA9545449C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB34ECBE-33E8-40E1-936B-7800D2525AE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "ECE983F6-A597-4581-A254-80396B54F2D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "586C0CB3-98E5-4CB3-8F23-27F01233D6C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en la regi\u00f3n ?stack de la memoria en la funci\u00f3n cff_decoder_parse_charstrings en el int\u00e9rprete CFF Type2 CharStrings en el archivo cff/cffgload.c en FreeType anterior a versi\u00f3n 2.4.2, tal y como es usado en iOS de Apple anterior a versi\u00f3n 4.0.2 en el iPhone y iPod touch y anterior a versi\u00f3n 3.2.2 en el iPad, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de c\u00f3digos CFF especialmente dise\u00f1ados en fuentes insertadas en un documento PDF, como es demostrado por JailbreakMe. NOTA: algunos de estos detalles son obtenidos de informaci\u00f3n de terceros." } ], "id": "CVE-2010-1797", "lastModified": "2024-11-21T01:15:13.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-16T18:39:40.403", "references": [ { "source": "product-security@apple.com", "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "source": "product-security@apple.com", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "source": "product-security@apple.com", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "source": "product-security@apple.com", "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "source": "product-security@apple.com", "url": "http://osvdb.org/66828" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40807" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40816" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40982" }, { "source": "product-security@apple.com", "url": "http://secunia.com/advisories/48951" }, { "source": "product-security@apple.com", "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT4291" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT4292" }, { "source": "product-security@apple.com", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/14538" }, { "source": "product-security@apple.com", "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "source": "product-security@apple.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/42151" }, { "source": "product-security@apple.com", "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "source": "product-security@apple.com", "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "source": "product-security@apple.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "source": "product-security@apple.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/66828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT4291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT4292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/14538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/42151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-mph3-mc9x-x334
Vulnerability from github
Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
{ "affected": [], "aliases": [ "CVE-2010-1797" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-08-16T18:39:00Z", "severity": "HIGH" }, "details": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.", "id": "GHSA-mph3-mc9x-x334", "modified": "2022-05-13T01:10:01Z", "published": "2022-05-13T01:10:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797" }, { "type": "WEB", "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" }, { "type": "WEB", "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "type": "WEB", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "type": "WEB", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "type": "WEB", "url": "http://osvdb.org/66828" }, { "type": "WEB", "url": "http://secunia.com/advisories/40807" }, { "type": "WEB", "url": "http://secunia.com/advisories/40816" }, { "type": "WEB", "url": "http://secunia.com/advisories/40982" }, { "type": "WEB", "url": "http://secunia.com/advisories/48951" }, { "type": "WEB", "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4291" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4292" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/14538" }, { "type": "WEB", "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/42151" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2106" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2010-1797
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2010-1797", "description": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.", "id": "GSD-2010-1797", "references": [ "https://www.suse.com/security/cve/CVE-2010-1797.html", "https://www.debian.org/security/2010/dsa-2105", "https://access.redhat.com/errata/RHSA-2010:0607", "https://linux.oracle.com/cve/CVE-2010-1797.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-1797" ], "details": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.", "id": "GSD-2010-1797", "modified": "2023-12-13T01:21:32.348136Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2010-1797", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621144", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc", "refsource": "CONFIRM", "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "name": "14538", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/14538" }, { "name": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "name": "ADV-2010-2018", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "name": "66828", "refsource": "OSVDB", "url": "http://osvdb.org/66828" }, { "name": "http://www.f-secure.com/weblog/archives/00002002.html", "refsource": "MISC", "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "name": "USN-972-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "name": "APPLE-SA-2010-08-11-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "name": "40816", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40816" }, { "name": "http://support.apple.com/kb/HT4292", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4292" }, { "name": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "refsource": "CONFIRM", "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "name": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "refsource": "CONFIRM", "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "name": "42151", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42151" }, { "name": "http://support.apple.com/kb/HT4291", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4291" }, { "name": "40982", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40982" }, { "name": "ADV-2010-2106", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "name": "APPLE-SA-2010-08-11-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "name": "48951", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48951" }, { "name": "appleios-pdf-code-execution(60856)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" }, { "name": "40807", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40807" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2010-1797" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.apple.com/kb/HT4292", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT4292" }, { "name": "66828", "refsource": "OSVDB", "tags": [], "url": "http://osvdb.org/66828" }, { "name": "APPLE-SA-2010-08-11-2", "refsource": "APPLE", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "name": "14538", "refsource": "EXPLOIT-DB", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/14538" }, { "name": "40807", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40807" }, { "name": "APPLE-SA-2010-08-11-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "name": "http://support.apple.com/kb/HT4291", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT4291" }, { "name": "42151", "refsource": "BID", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/42151" }, { "name": "USN-972-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "name": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "refsource": "CONFIRM", "tags": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "name": "ADV-2010-2106", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "name": "ADV-2010-2018", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "name": "http://www.f-secure.com/weblog/archives/00002002.html", "refsource": "MISC", "tags": [], "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50", "refsource": "CONFIRM", "tags": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "name": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "refsource": "CONFIRM", "tags": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=621144", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "name": "40816", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40816" }, { "name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc", "refsource": "CONFIRM", "tags": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "name": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "refsource": "CONFIRM", "tags": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "name": "40982", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40982" }, { "name": "48951", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48951" }, { "name": "appleios-pdf-code-execution(60856)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true } }, "lastModifiedDate": "2021-05-23T00:52Z", "publishedDate": "2010-08-16T18:39Z" } } }
var-201008-0306
Vulnerability from variot
Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information. FreeType 2 Is CFF A vulnerability exists in the handling of fonts. FreeType Is a library for handling various types of font files. FreeType 2 Is CFF A vulnerability exists in the processing of fonts that causes a stack corruption. Attack activity using this vulnerability has been confirmed.Crafted CFF Font FreeType 2 By loading it with an application that uses, arbitrary code may be executed by a remote third party. Apple iOS for iPhone, iPod touch, and iPad is prone to a local privilege-escalation vulnerability that affects the 'IOSurface' component. Successfully exploiting this issue can allow attackers to elevate privileges, leading to a complete compromise of the device. iOS versions 4.0.1 and prior are vulnerable. NOTE (August 12, 2010): This BID was previously titled 'Apple iOS Multiple Vulnerabilities' and included details about a remote code-execution vulnerability. Following further analysis, we determined that the remote code-execution issue was already documented in BID 42241 (FreeType Compact Font Format (CFF) Multiple Stack Based Buffer Overflow Vulnerabilities). It can be used to rasterize and map characters into bitmaps and provide support for other font-related businesses.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/freetype < 2.4.8 >= 2.4.8
Description
Multiple vulnerabilities have been discovered in FreeType. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All FreeType users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.4.8"
References
[ 1 ] CVE-2010-1797 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1797 [ 2 ] CVE-2010-2497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2497 [ 3 ] CVE-2010-2498 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2498 [ 4 ] CVE-2010-2499 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2499 [ 5 ] CVE-2010-2500 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2500 [ 6 ] CVE-2010-2519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2519 [ 7 ] CVE-2010-2520 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2520 [ 8 ] CVE-2010-2527 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2527 [ 9 ] CVE-2010-2541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2541 [ 10 ] CVE-2010-2805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2805 [ 11 ] CVE-2010-2806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2806 [ 12 ] CVE-2010-2807 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2807 [ 13 ] CVE-2010-2808 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2808 [ 14 ] CVE-2010-3053 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3053 [ 15 ] CVE-2010-3054 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3054 [ 16 ] CVE-2010-3311 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3311 [ 17 ] CVE-2010-3814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3814 [ 18 ] CVE-2010-3855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855 [ 19 ] CVE-2011-0226 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0226 [ 20 ] CVE-2011-3256 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3256 [ 21 ] CVE-2011-3439 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3439
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201201-09.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
http://creativecommons.org/licenses/by-sa/2.5 . =========================================================== Ubuntu Security Notice USN-972-1 August 17, 2010 freetype vulnerabilities CVE-2010-1797, CVE-2010-2541, CVE-2010-2805, CVE-2010-2806, CVE-2010-2807, CVE-2010-2808 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 9.04 Ubuntu 9.10 Ubuntu 10.04 LTS
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: libfreetype6 2.1.10-1ubuntu2.8
Ubuntu 8.04 LTS: libfreetype6 2.3.5-1ubuntu4.8.04.4
Ubuntu 9.04: libfreetype6 2.3.9-4ubuntu0.3
Ubuntu 9.10: libfreetype6 2.3.9-5ubuntu0.2
Ubuntu 10.04 LTS: libfreetype6 2.3.11-1ubuntu2.2
After a standard system update you need to restart your session to make all the necessary changes.
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.10-1ubuntu2.8.diff.gz
Size/MD5: 70961 d986f14b69d50fe1884e8dd5f9386731
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.10-1ubuntu2.8.dsc
Size/MD5: 719 a91985ecc92b75aa3f3647506bad4039
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.10.orig.tar.gz
Size/MD5: 1323617 adf145ce51196ad1b3054d5fb032efe6
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_amd64.deb
Size/MD5: 717794 f332d5b1974aa53f200e4e6ecf9df088
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_amd64.deb
Size/MD5: 440974 afa83868cc67cec692f72a9dc93635ff
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_amd64.deb
Size/MD5: 133902 dca56851436275285b4563c96388a070
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_amd64.udeb
Size/MD5: 251958 358627e207009dbe0c5be095e7bed18d
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_i386.deb
Size/MD5: 677592 ee43f5e97f31b8da57582dbdb1e63033
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_i386.deb
Size/MD5: 416328 ef092c08ba2c167af0da25ab743ea663
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_i386.deb
Size/MD5: 117302 b2633ed4487657fe349fd3de76fce405
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_i386.udeb
Size/MD5: 227436 f55ab8a9bb7e76ad743f6c0fa2974e64
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_powerpc.deb
Size/MD5: 708654 ee71c714e62e96a9af4cf7ba909142e6
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_powerpc.deb
Size/MD5: 431036 4f1c6a1e28d3a14b593bef37605119ab
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_powerpc.deb
Size/MD5: 134260 66ba7d95f551eaadb1bba5a56d76529d
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_powerpc.udeb
Size/MD5: 241726 d2c4f13b12c8280b1fad56cdc0965502
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_sparc.deb
Size/MD5: 683964 49df9101deb9a317229351d72b5804ec
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_sparc.deb
Size/MD5: 411982 efaca20d5deec9e51be023710902852b
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_sparc.deb
Size/MD5: 120138 ff723720ed499e40049e3487844b9db3
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_sparc.udeb
Size/MD5: 222676 71f172ba71fc507b04e5337d55b32ed6
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.5-1ubuntu4.8.04.4.diff.gz
Size/MD5: 40949 1cc5014da4db8200edb54df32561fcd0
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.5-1ubuntu4.8.04.4.dsc
Size/MD5: 907 7f698125814f4ca67a01b0a66d9bcfe9
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.5.orig.tar.gz
Size/MD5: 1536077 4a5bdbe1ab92f3fe4c4816f9934a5ec2
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_amd64.deb
Size/MD5: 694322 c740e1665d09a0c691163a543c8d650b
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_amd64.deb
Size/MD5: 362386 5b085e83764fcda129bede2c5c4ca179
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_amd64.deb
Size/MD5: 221392 dbebbbaffc086dccf550468fff1daa92
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_amd64.udeb
Size/MD5: 258454 f3903d4e43891753f3c6439cd862617f
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_i386.deb
Size/MD5: 663330 7601af27049730f0f7afcfa30244ae88
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_i386.deb
Size/MD5: 347172 de53a441e28e385598d20333ff636026
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_i386.deb
Size/MD5: 201266 c9c50bdc87d0a46fc43f3bbca26adec5
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_i386.udeb
Size/MD5: 243462 16bb61f604fe48a301f6faeaa094d266
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_lpia.deb
Size/MD5: 665120 bf0dcd13b8a171f6a740ca225d943e68
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_lpia.deb
Size/MD5: 347512 d2beee3ccf7fe0233825d46cc61ca62d
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_lpia.deb
Size/MD5: 205560 7879f630a5356e3d6e9c0609e8008de9
http://ports.ubuntu.com/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_lpia.udeb
Size/MD5: 244324 4e10fb5e68a78312eb02c69508120c6a
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_powerpc.deb
Size/MD5: 687156 6d36300396fa84d6f889147b0247f385
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_powerpc.deb
Size/MD5: 358086 06b9874cc9ba11fdb6feb10b0831e890
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_powerpc.deb
Size/MD5: 235578 ce514bab4cbc028a0451742c38c633cd
http://ports.ubuntu.com/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_powerpc.udeb
Size/MD5: 254526 d50f40a9421b52f4302c4d260170edb3
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_sparc.deb
Size/MD5: 658094 184f0f51023baa8ce459fababaa190d9
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_sparc.deb
Size/MD5: 332124 5aa036de5269896c893ea8f825329b84
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_sparc.deb
Size/MD5: 199782 9323f9209333cf42114e97d3305d901c
http://ports.ubuntu.com/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_sparc.udeb
Size/MD5: 227810 7657e99ad137ad5ce654b74cfbbfdc10
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-4ubuntu0.3.diff.gz
Size/MD5: 44032 17b27322a6448d40599c55561209c940
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-4ubuntu0.3.dsc
Size/MD5: 1311 5124a4df7016a625a631c1ff4661aae9
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9.orig.tar.gz
Size/MD5: 1624314 7b2ab681f1a436876ed888041204e478
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_amd64.deb
Size/MD5: 729408 788a2af765a8356c4a7c01e893695b0b
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_amd64.udeb
Size/MD5: 272950 a1f9a0ad0d036e5a14b073c139ce5408
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_amd64.deb
Size/MD5: 407052 bfd510dc0c46a0f25dd3329693ee66a8
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_amd64.deb
Size/MD5: 226474 9b8e6c521d8629b9b1db2760209460a3
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_i386.deb
Size/MD5: 697818 9176ee8649b8441333d7c5d9359c53a6
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_i386.udeb
Size/MD5: 257896 c26f46491d69a174fa9cad126a3201cf
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_i386.deb
Size/MD5: 392692 648d0605a187b74291b3233e5e4930e3
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_i386.deb
Size/MD5: 198834 0b41da08de5417a7db21e24e730e03d9
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_lpia.deb
Size/MD5: 698682 12c20dd647db986bd87a250d8706e8e8
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_lpia.udeb
Size/MD5: 257736 dee60e4b8a1824d2aa13364ec0f01602
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_lpia.deb
Size/MD5: 392978 e19bcc3c8c0cec76227c64843b01516a
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_lpia.deb
Size/MD5: 201636 a558e986b6c6e878e115126e7d3a28a5
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_powerpc.deb
Size/MD5: 720040 70c8792cddd9cfe45480f8d760dd0163
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_powerpc.udeb
Size/MD5: 265790 b356a500845d045f431db6ef4db4f811
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_powerpc.deb
Size/MD5: 400532 91aa4eea6b8e9b67a721b552caab8468
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_powerpc.deb
Size/MD5: 227834 fa22e303b8d06dfb99a8c3c1f2980061
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_sparc.deb
Size/MD5: 689244 dff22369b1bb07d4ef7c6d9f474149db
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_sparc.udeb
Size/MD5: 238164 cb1e597bd0065d2ffbad763a52088c1d
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_sparc.deb
Size/MD5: 372422 c6f36ae3119f8f17368d796943ba9908
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_sparc.deb
Size/MD5: 201390 c3f108859375787b11190d3c5a1d966b
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-5ubuntu0.2.diff.gz
Size/MD5: 43530 f78681f1641b93f34d41ff4d6f31eb71
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-5ubuntu0.2.dsc
Size/MD5: 1311 8a9a302e0a62f2dbe2a62aba456e2108
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9.orig.tar.gz
Size/MD5: 1624314 7b2ab681f1a436876ed888041204e478
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_amd64.deb
Size/MD5: 731028 3b5ed0ad073cca0c1eee212b0e12f255
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_amd64.udeb
Size/MD5: 275110 a23822489a0d7d45152f341b86f0df20
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_amd64.deb
Size/MD5: 409362 ba180d650e17df6980ca09b8d1a109e1
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_amd64.deb
Size/MD5: 230774 a0a51691eefc0fb6e94d41c3282c3ab2
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_i386.deb
Size/MD5: 696892 ad2164ed812ccd9cf7829659cff219c7
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_i386.udeb
Size/MD5: 258710 c2d256e87eaee83ab83592247588bee7
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_i386.deb
Size/MD5: 393912 c8d04b785d17066229bab50a3c13e1af
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_i386.deb
Size/MD5: 195702 02aa03f1f62a61383d829b5bf494b7b0
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_lpia.deb
Size/MD5: 699382 ff8200917b43322062d2f3b5f3f6bab8
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_lpia.udeb
Size/MD5: 259348 0395bdbaf357d161d0f1d3b257ae4732
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_lpia.deb
Size/MD5: 394122 8481f2e278a5da28b28ef0fa79207662
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_lpia.deb
Size/MD5: 198546 a3f0a848da83a64d14344b6744b33a90
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_powerpc.deb
Size/MD5: 719762 bd7185c852b151794c27f8c2ead4da94
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_powerpc.udeb
Size/MD5: 264578 58a77cbf2ae4c2a447a81cce72f6b8c5
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_powerpc.deb
Size/MD5: 399118 c943fa66513b862ccb6ac99699c9e33c
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_powerpc.deb
Size/MD5: 203834 842dd94d9b3fad52c0b1b6489775d2ea
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_sparc.deb
Size/MD5: 691054 557de31093ac67c2dedec97e55998295
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_sparc.udeb
Size/MD5: 240534 f3c79ed9e84e7169851de3f432b613c3
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_sparc.deb
Size/MD5: 374982 e84af1b516f050ee9bdb93c213994943
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_sparc.deb
Size/MD5: 195786 599978c8d9cff2525eba228c793833c3
Updated packages for Ubuntu 10.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.11-1ubuntu2.2.diff.gz
Size/MD5: 41646 9b97425327300eda74c492034fed50ad
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.11-1ubuntu2.2.dsc
Size/MD5: 1313 b7b625334a0d9c926bf34cc83dcc904c
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.11.orig.tar.gz
Size/MD5: 1709600 5aa22c0bc6aa3815b40a309ead2b9d1b
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_amd64.deb
Size/MD5: 739530 db9147ce9477b7ab22374f89d24b24ca
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_amd64.udeb
Size/MD5: 277536 35fc46f3c281aee82eeed4e00cfdacdc
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_amd64.deb
Size/MD5: 434932 1bf8e620c3008504b87354470e7be9a5
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_amd64.deb
Size/MD5: 221434 4b4fcbd633bf1b3c2151617adae44835
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_i386.deb
Size/MD5: 704694 f58601afde2b4bc257492762654cbf94
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_i386.udeb
Size/MD5: 260916 a540a7f9ae973bce66bbd3fdb9a4f849
http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_i386.deb
Size/MD5: 419000 d4a78ce7ae146caa59b61f43b27d363c
http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_i386.deb
Size/MD5: 188710 e94b4202fcfe184fdf81409fe610a42a
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_powerpc.deb
Size/MD5: 728090 5f2e98a54cb2a0ac03591c387aacf461
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_powerpc.udeb
Size/MD5: 266750 66bf2b146ab219d1b78e1887d0053f2a
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_powerpc.deb
Size/MD5: 424614 fd964644b45bbbc79729c9609c4b6bb8
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_powerpc.deb
Size/MD5: 196686 b88a8cebff19c95b6c9c161f7d1bb472
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_sparc.deb
Size/MD5: 707164 bf26d7cb1aa3f759ca31510f92888053
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_sparc.udeb
Size/MD5: 250768 100b4d4b270421fb1dcb503c88b547e8
http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_sparc.deb
Size/MD5: 408132 b009cd0f1aafa500f8cc16273e9f2ed9
http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_sparc.deb
Size/MD5: 198302 504ec3da9ee2048391e2c4035d7149fc
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Core Security Technologies - CoreLabs Advisory
http://corelabs.coresecurity.com/
Apple OS X ATSServer CFF CharStrings INDEX Sign Mismatch
- Advisory Information
Title: Apple OS X ATSServer CFF CharStrings INDEX Sign Mismatch Advisory Id: CORE-2010-0825 Advisory URL: [http://www.coresecurity.com/content/Apple-OSX-ATSServer-CharStrings-Sign-Mismatch] Date published: 2010-11-08 Date of last update: 2010-11-08 Vendors contacted: Apple Release mode: User release
- Vulnerability Information
Class: Input validation error [CWE-20] Impact: Code execution Remotely Exploitable: Yes (client-side) Locally Exploitable: No CVE Name: CVE-2010-1797 Bugtraq ID: N/A
- Vulnerability Description
The Apple Type Services is prone to memory corruption due a sign mismatch vulnerability when handling the last offset value of the CharStrings INDEX structure.
This vulnerability is a variation of the vulnerability labeled as CVE-2010-1797 (FreeType JailbreakMe iPhone exploit variation).
- Vulnerable packages
. Apple Mac OS X v10.5.x
- Solutions and Workarounds
According to information provided to us by Apple, a patch for this fix has already been developed. Apple provided us a release date for this patch in two opportunities but then failed to meet their our deadlines without giving us any notice or explanation.
Apple Mac OSX 10.6 is not affected by this vulnerability, upgrading to this version is highly recommed when possible.
- Credits
This vulnerability was discovered and researched by Anibal Sacco [http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=researcher&name=Anibal_Sacco] and Matias Eissler [http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=researcher&name=Matias_Eissler], from Core Security Technologies. Publication was coordinated by Fernando Russ and Pedro Varangot.
- Technical Description
When loading a PDF with an embedded CFF font a sign mismatch error exists in ATSServer when handling the last offset value of the CharStrings INDEX structure.
This could be triggered in different ways:
. When trying to make a thumbnail of the file . When trying to open the file with the Preview app . Serving the file in a web server and tricking the user to click on it. Embedded in an email (if handled by Mail.app)
This allows to corrupt the process memory by controlling the size parameter of a memcpy function call allowing an attacker to get code execution.
At [00042AFA] we can see how the value obtained from the file is sign extended prior to be passed to the function loc_370F0. Inside this function this value will be used as the size parameter of memcpy:
/----- 00042AF2 movsx eax, word ptr [edx+5Eh] 00042AF6 mov [esp+0Ch], eax 00042AFA movsx eax, word ptr [esi+4] 00042AFE mov [esp], edi 00042B01 mov [esp+8], eax 00042B05 mov eax, [ebp-2Ch] 00042B08 mov [esp+4], eax 00042B0C call loc_370F0
- -----/ An attacker could take advantage of this condition by setting a negative offset value (0xfffa) in the file that will be converted to a DWORD without enough validation leading to a memcpy of size 0xfffffffa.
This vulnerability results in arbitrary code execution.
- Report Timeline
. 2010-08-26: Vendor contacted, a draft of this advisory is sent and September 28th is proposed as a coordinated publication date. Core remarks that since this is a variation of a publicly disclossed vulnerability it may have already been discovered by other security researchers like vulnerability research brokers or independent security researchers. 2010-08-28: The Apple Product Security team acknowledges the report, saying that they were able to reproduce the issue in Mac OS X 10.5 but not in Mac OS X 10.6, they also said that the deadline for September 28th will be imposible to meet. 2010-08-30: Core informs Apple that there is no problem changing the publication date for the report, whenever the new publication date remains reasonable. Also, Core asks for a tentive timeframe for the fix, and confirm that Mac OS X 10.6 does not seem to be affected. 2010-08-31: Apple acknowledges the comunication informing the publication timing, and state that they are still trying to determine the most appropiate timeframe. 2010-09-28: Core asks the vendor for an update regarding this issue. Also, Core asks for a specific timeframe for the fix, and sets October 18th as tentative publication date. 2010-09-28: Apple acknowledges the comunication informing that this issue will be fixed in the next security update of Mac OS X 10.5, which is tentatively scheduled for the end of October without a firm date of publication. 2010-08-31: Apple asks Core about credit information for the advisory. 2010-09-28: Core acknowledges the comunication sending the credit information for this report. 2010-10-20: Core asks Apple for a firm date for the release of this securiry issue since the initial propossed timeframe of October 18th is due. 2010-10-22: Apple acknowledges the comunication informing that the publication date is scheduled to the week of October 25th. Also, Apple notifies that the assigned identifier for this vulnerability is CVE-2010-1797. 2010-11-01: Core asks Apple for a new schedule for the publication, since there was no notice of any Apple security update during the week of October 25th. 2010-11-01: Apple acknowledges the communication informing that the publication date was rescheduled to the middle of the week of November 1st. 2010-11-03: Core informs Apple that the publication of this advisory was scheduled to Monday 8th, taking into account the last communication this is a final publication date. Core also informs that the information about how this vulnerability was found and how it can be exploited will be discussed in a small infosec related local event in Buenos Aires city. 2010-11-08: Core publishes advisory CORE-2010-0825.
- References
[1] [http://en.wikipedia.org/wiki/PostScript_fonts#Compact_Font_Format]
- About CoreLabs
CoreLabs, the research center of Core Security Technologies, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: [http://corelabs.coresecurity.com].
- About Core Security Technologies
Core Security Technologies develops strategic solutions that help security-conscious organizations worldwide develop and maintain a proactive process for securing their networks. The company's flagship product, CORE IMPACT, is the most comprehensive product for performing enterprise security assurance testing. CORE IMPACT evaluates network, endpoint and end-user vulnerabilities and identifies what resources are exposed. It enables organizations to determine if current security investments are detecting and preventing attacks. Core Security Technologies augments its leading technology solution with world-class security consulting services, including penetration testing and software security auditing. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at [http://www.coresecurity.com].
- Disclaimer
The contents of this advisory are copyright (c) 2010 Core Security Technologies and (c) 2010 CoreLabs, and are licensed under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 (United States) License: [http://creativecommons.org/licenses/by-nc-sa/3.0/us/]
- PGP/GPG Keys
This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at [http://www.coresecurity.com/files/attachments/core_security_advisories.asc].
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.12 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAkzYayoACgkQyNibggitWa2PMgCfSvLwR5OgWfmFIwpONWL+dMa3 njEAnjIZFF+zG/wWK3IscWx3VyNW5F30 =XULv -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct this issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797 https://bugzilla.redhat.com/show_bug.cgi?id=621144
Updated Packages:
Mandriva Linux 2008.0: e5b2f1ac6039b90de44e4c54a7dc15ad 2008.0/i586/libfreetype6-2.3.5-2.4mdv2008.0.i586.rpm ec559f7f70f91973c7c3337d170c2bf1 2008.0/i586/libfreetype6-devel-2.3.5-2.4mdv2008.0.i586.rpm 0f87bab9e3ba83faf24b13b13e8a16a5 2008.0/i586/libfreetype6-static-devel-2.3.5-2.4mdv2008.0.i586.rpm 0d6118b220d595e52174eb7cc2675980 2008.0/SRPMS/freetype2-2.3.5-2.4mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 5d3a64ac00fb880838ea068bceb28055 2008.0/x86_64/lib64freetype6-2.3.5-2.4mdv2008.0.x86_64.rpm d052dabc9b4f9fa41863eb8ca1fe334b 2008.0/x86_64/lib64freetype6-devel-2.3.5-2.4mdv2008.0.x86_64.rpm 281d278bf445567d29c510d0d27f7489 2008.0/x86_64/lib64freetype6-static-devel-2.3.5-2.4mdv2008.0.x86_64.rpm 0d6118b220d595e52174eb7cc2675980 2008.0/SRPMS/freetype2-2.3.5-2.4mdv2008.0.src.rpm
Mandriva Linux 2009.0: ed81cc7ed3660ce94c3c6d00d556ac18 2009.0/i586/libfreetype6-2.3.7-1.3mdv2009.0.i586.rpm 325432a13a72aaf457847f4a205b9823 2009.0/i586/libfreetype6-devel-2.3.7-1.3mdv2009.0.i586.rpm bcd0dbb954f1a4e09d10e03556ea2497 2009.0/i586/libfreetype6-static-devel-2.3.7-1.3mdv2009.0.i586.rpm 373a3d35198adefaabfdb3d75c4359b1 2009.0/SRPMS/freetype2-2.3.7-1.3mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64: 4af7ec1921662eaa37e6a5b27998cdec 2009.0/x86_64/lib64freetype6-2.3.7-1.3mdv2009.0.x86_64.rpm c53e5285ea05fc68168a800df25a9556 2009.0/x86_64/lib64freetype6-devel-2.3.7-1.3mdv2009.0.x86_64.rpm 3a5b5a4aa2eec538b0479f066fa6e7e7 2009.0/x86_64/lib64freetype6-static-devel-2.3.7-1.3mdv2009.0.x86_64.rpm 373a3d35198adefaabfdb3d75c4359b1 2009.0/SRPMS/freetype2-2.3.7-1.3mdv2009.0.src.rpm
Mandriva Linux 2009.1: ce6a11ba3156f8e1ac8339bf3c94f709 2009.1/i586/libfreetype6-2.3.9-1.4mdv2009.1.i586.rpm dc2573dc94973052652f2481651e927a 2009.1/i586/libfreetype6-devel-2.3.9-1.4mdv2009.1.i586.rpm aee56bcfbed1899495f00e87ddaed7ce 2009.1/i586/libfreetype6-static-devel-2.3.9-1.4mdv2009.1.i586.rpm aaa5a09d40624240e901b31d4f0e98c0 2009.1/SRPMS/freetype2-2.3.9-1.4mdv2009.1.src.rpm
Mandriva Linux 2009.1/X86_64: 9e51fa000bb7e106189845ca6694ae15 2009.1/x86_64/lib64freetype6-2.3.9-1.4mdv2009.1.x86_64.rpm 2ec9a71562a8d40a8accaf967b3c2a75 2009.1/x86_64/lib64freetype6-devel-2.3.9-1.4mdv2009.1.x86_64.rpm 8e87a5ba6fd376aeceef71fe5b809f86 2009.1/x86_64/lib64freetype6-static-devel-2.3.9-1.4mdv2009.1.x86_64.rpm aaa5a09d40624240e901b31d4f0e98c0 2009.1/SRPMS/freetype2-2.3.9-1.4mdv2009.1.src.rpm
Mandriva Linux 2010.0: faf191e76adc0e2f8f4bebfd97f36a49 2010.0/i586/libfreetype6-2.3.11-1.2mdv2010.0.i586.rpm 7202581d10580a63ba28eb4b0dce708c 2010.0/i586/libfreetype6-devel-2.3.11-1.2mdv2010.0.i586.rpm ecaad382e83f7005a1d76a585dfe879c 2010.0/i586/libfreetype6-static-devel-2.3.11-1.2mdv2010.0.i586.rpm 3c34f8f0e0352ef0a11c57d4eadc1ccd 2010.0/SRPMS/freetype2-2.3.11-1.2mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64: 9ffe17211ba4e4a6aa67e73e4c22e020 2010.0/x86_64/lib64freetype6-2.3.11-1.2mdv2010.0.x86_64.rpm eebaba0b5509b21da03a432699198342 2010.0/x86_64/lib64freetype6-devel-2.3.11-1.2mdv2010.0.x86_64.rpm 90e215bda5483ee6b5d5ca74bfedf7c0 2010.0/x86_64/lib64freetype6-static-devel-2.3.11-1.2mdv2010.0.x86_64.rpm 3c34f8f0e0352ef0a11c57d4eadc1ccd 2010.0/SRPMS/freetype2-2.3.11-1.2mdv2010.0.src.rpm
Mandriva Linux 2010.1: 437be09971963217a5daef5dc04d451b 2010.1/i586/libfreetype6-2.3.12-1.2mdv2010.1.i586.rpm 42f5ddeeb25353a9fa20677112e9ae7c 2010.1/i586/libfreetype6-devel-2.3.12-1.2mdv2010.1.i586.rpm c77ce226104a1febd22c920c73a807f7 2010.1/i586/libfreetype6-static-devel-2.3.12-1.2mdv2010.1.i586.rpm 11f6a185216335c804f0988621dd637c 2010.1/SRPMS/freetype2-2.3.12-1.2mdv2010.1.src.rpm
Mandriva Linux 2010.1/X86_64: a4a5170f277a9654f19b208deab8027c 2010.1/x86_64/lib64freetype6-2.3.12-1.2mdv2010.1.x86_64.rpm 4637ff02b2739b2d29c94333f00ce59e 2010.1/x86_64/lib64freetype6-devel-2.3.12-1.2mdv2010.1.x86_64.rpm 20a9488e5100b9a4f925fb777e00248d 2010.1/x86_64/lib64freetype6-static-devel-2.3.12-1.2mdv2010.1.x86_64.rpm 11f6a185216335c804f0988621dd637c 2010.1/SRPMS/freetype2-2.3.12-1.2mdv2010.1.src.rpm
Corporate 4.0: 516a71993da7404ae96b14699cb1aa5f corporate/4.0/i586/libfreetype6-2.1.10-9.11.20060mlcs4.i586.rpm 839108110543d3243a725c3c2153ea46 corporate/4.0/i586/libfreetype6-devel-2.1.10-9.11.20060mlcs4.i586.rpm 8c912e309a35917d533fcf3be251f662 corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.11.20060mlcs4.i586.rpm e6e59f81030a80f5a1704f130e34b3ec corporate/4.0/SRPMS/freetype2-2.1.10-9.11.20060mlcs4.src.rpm
Corporate 4.0/X86_64: cf591c59af6e46e62609ff34892f52d3 corporate/4.0/x86_64/lib64freetype6-2.1.10-9.11.20060mlcs4.x86_64.rpm 55e0f089dee699185f317e863b12c590 corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.11.20060mlcs4.x86_64.rpm 7eec0361fb43382f4aa9558e2698af89 corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.11.20060mlcs4.x86_64.rpm e6e59f81030a80f5a1704f130e34b3ec corporate/4.0/SRPMS/freetype2-2.1.10-9.11.20060mlcs4.src.rpm
Mandriva Enterprise Server 5: cfed1363663ad29113cb1655c3e56429 mes5/i586/libfreetype6-2.3.7-1.3mdvmes5.1.i586.rpm bfc520ee4832553381a304209442dcc1 mes5/i586/libfreetype6-devel-2.3.7-1.3mdvmes5.1.i586.rpm 92f6f546f2dad9a2bf7031261079294a mes5/i586/libfreetype6-static-devel-2.3.7-1.3mdvmes5.1.i586.rpm d32510c26f462ffb120f4c4284f412d4 mes5/SRPMS/freetype2-2.3.7-1.3mdvmes5.1.src.rpm
Mandriva Enterprise Server 5/X86_64: 35c99bfa9c7a0799a4f304d3a2de2f11 mes5/x86_64/lib64freetype6-2.3.7-1.3mdvmes5.1.x86_64.rpm 9dcb3dfb3769618d8b2c93f3f4ba53db mes5/x86_64/lib64freetype6-devel-2.3.7-1.3mdvmes5.1.x86_64.rpm 165edd82ca0492d88d393e8a65ad5869 mes5/x86_64/lib64freetype6-static-devel-2.3.7-1.3mdvmes5.1.x86_64.rpm d32510c26f462ffb120f4c4284f412d4 mes5/SRPMS/freetype2-2.3.7-1.3mdvmes5.1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFMZBO6mqjQ0CJFipgRAvckAKCpFuRGLxgICBqETRTbXhdZpg8RywCgjKjm 46cbqAt0xVJvR5AdhA3z/FY= =T9it -----END PGP SIGNATURE----- .
CVE-2010-3053
bdf/bdflib.c in FreeType allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
For the stable distribution (lenny), these problems have been fixed in version 2.3.7-2+lenny3
For the unstable distribution (sid) and the testing distribution (squeeze), these problems have been fixed in version 2.4.2-1
We recommend that you upgrade your freetype package.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
Debian (stable)
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7-2+lenny3.diff.gz Size/MD5 checksum: 39230 95a3841e7258573ca2d3e0075b8e7f73 http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7.orig.tar.gz Size/MD5 checksum: 1567540 c1a9f44fde316470176fd6d66af3a0e8 http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7-2+lenny3.dsc Size/MD5 checksum: 1219 2a2bf3d4568d92e2a48ebcda38140e73
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_alpha.deb Size/MD5 checksum: 775278 2f2ca060588fc33b6d7baae02201dbd2 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_alpha.deb Size/MD5 checksum: 412188 ad9537e93ed3fb61f9348470940f3ce5 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_alpha.udeb Size/MD5 checksum: 296592 e689b1c4b6bd7779e44d1cd641be9622 http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_alpha.deb Size/MD5 checksum: 253786 287a98ca57139d4dee8041eba2881e3b
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_amd64.deb Size/MD5 checksum: 713260 f1d4002e7b6d185ff9f46bc25d67c4c9 http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_amd64.deb Size/MD5 checksum: 223170 cb00f76d826be115243faa9dfd0b8a91 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_amd64.udeb Size/MD5 checksum: 269796 40762e686138c27ac92b20174e67012e http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_amd64.deb Size/MD5 checksum: 385848 0294d7e3e1d6b37532f98344a9849cde
arm architecture (ARM)
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_arm.deb Size/MD5 checksum: 686154 fbe32c7124ba2ce093b31f46736e002b http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_arm.deb Size/MD5 checksum: 357158 0d793d543a33cfa192098234c925d639 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_arm.udeb Size/MD5 checksum: 242196 1cfc9f7dc6a7cd0843aa234bab35b69e http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_arm.deb Size/MD5 checksum: 205120 39ab4dfbc19c8a63affc493e0b5aaf2d
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_armel.deb Size/MD5 checksum: 684568 325686fbc2fba7687da424ada57b9419 http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_armel.deb Size/MD5 checksum: 209992 69f6a68fb90658ec74dfd7cc7cc0b766 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_armel.udeb Size/MD5 checksum: 236564 a48afca5c6798d16b140b3362dfac0ca http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_armel.deb Size/MD5 checksum: 353814 76960109910d6de2f74ec0e345f00854
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_i386.udeb Size/MD5 checksum: 254452 a34af74eda0feb2b763cfc6f5b8330c1 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_i386.deb Size/MD5 checksum: 371586 ec294ffffeb9ddec389e3e988d880534 http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_i386.deb Size/MD5 checksum: 198558 3283ad058d37eed8bca46df743c6a915 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_i386.deb Size/MD5 checksum: 684624 014d335b35ed41022adb628796a0c122
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_ia64.deb Size/MD5 checksum: 332160 2dbb364f09414e4b0e0f59d9e91d1edc http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_ia64.deb Size/MD5 checksum: 876692 2f6d3421d6c8424523388347c5640666 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_ia64.deb Size/MD5 checksum: 531496 5dd7755f63271f597b64c3f513e8e7f1 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_ia64.udeb Size/MD5 checksum: 415934 ea2ba16157b3504d8b9c8f251b69b16f
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_mips.deb Size/MD5 checksum: 717022 9ee8c246af10f4bf7cdf5cdc54010dd6 http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_mips.deb Size/MD5 checksum: 213212 3641ad81738e8935c5df2b648383c8e0 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_mips.deb Size/MD5 checksum: 369018 18559e273ffcea5614e71ab32b95ef47 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_mips.udeb Size/MD5 checksum: 253924 1be1e224f27a780beb6799d55fa74663
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_mipsel.deb Size/MD5 checksum: 369772 6181d98166fe1f004fb033f2665ce4af http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_mipsel.deb Size/MD5 checksum: 214802 6edbec67ff79e96921d1fe4bf57b0fce http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_mipsel.deb Size/MD5 checksum: 712502 4a99ccc68b1913f88901c5e0686fea4f http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_mipsel.udeb Size/MD5 checksum: 254212 e30825a94175fd78a561b8365392cbad
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_powerpc.udeb Size/MD5 checksum: 262804 d35ced8ba625f39dc7a04e3e61e0d49d http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_powerpc.deb Size/MD5 checksum: 233882 6e294c19dd0109ee80fe6cd401b6a185 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_powerpc.deb Size/MD5 checksum: 378612 c96a180e7132c543396486b14107cdad http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_powerpc.deb Size/MD5 checksum: 708212 9602a7786b2ebffd1d75d443901574c5
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_s390.deb Size/MD5 checksum: 225190 393c9515f7cd89bcd8b0c38d6d6dd7ac http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_s390.deb Size/MD5 checksum: 384160 4e20bc56e5fc65fb08529d8765d28850 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_s390.deb Size/MD5 checksum: 698798 f589b6b8882d998bb7b89fa1dfa40b3a http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_s390.udeb Size/MD5 checksum: 268272 7b6511b9ad657aa165e906a4fcbfee11
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_sparc.deb Size/MD5 checksum: 200078 29c1833cbde5b4da5c2e35aaf856ab58 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_sparc.udeb Size/MD5 checksum: 235424 e64a8fc3b744253b22161e31fbb6e92a http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_sparc.deb Size/MD5 checksum: 352544 a7f480889460b104bbab16fd8d8da2d5 http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_sparc.deb Size/MD5 checksum: 676520 6d0f57a5bd6457a9b9b85271c7001531
These files will probably be moved into the stable distribution on its next update
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201008-0306", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "1.1.5" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "1.1.4" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "2.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "2.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "2.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.1" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "f5", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "foxit", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "wind river", "version": null }, { "model": "freetype", "scope": "lt", "trust": 0.8, "vendor": "freetype", "version": "2.4.2 earlier" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "2.0 to 4.0.1 (iphone 3g after )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "2.1 to 4.0 (ipod touch after )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.2 and 3.2.1 (ipad for )" }, { "model": "ipad", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "iphone", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "opensolaris", "scope": null, "trust": 0.8, "vendor": "oracle", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "10" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "8" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "9" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "3.0" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "3.0 (x64)" }, { "model": "turbolinux client", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "2008" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "11" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "11 (x64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "3.2.2" } ], "sources": [ { "db": "CERT/CC", "id": "VU#275247" }, { "db": "BID", "id": "42151" }, { "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "db": "CNNVD", "id": "CNNVD-201008-143" }, { "db": "NVD", "id": "CVE-2010-1797" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-1797" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "comex", "sources": [ { "db": "BID", "id": "42151" } ], "trust": 0.3 }, "cve": "CVE-2010-1797", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2010-1797", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-44402", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-1797", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#275247", "trust": 0.8, "value": "13.39" }, { "author": "CNNVD", "id": "CNNVD-201008-143", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-44402", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2010-1797", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#275247" }, { "db": "VULHUB", "id": "VHN-44402" }, { "db": "VULMON", "id": "CVE-2010-1797" }, { "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "db": "CNNVD", "id": "CNNVD-201008-143" }, { "db": "NVD", "id": "CVE-2010-1797" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information. FreeType 2 Is CFF A vulnerability exists in the handling of fonts. FreeType Is a library for handling various types of font files. FreeType 2 Is CFF A vulnerability exists in the processing of fonts that causes a stack corruption. Attack activity using this vulnerability has been confirmed.Crafted CFF Font FreeType 2 By loading it with an application that uses, arbitrary code may be executed by a remote third party. Apple iOS for iPhone, iPod touch, and iPad is prone to a local privilege-escalation vulnerability that affects the \u0027IOSurface\u0027 component. \nSuccessfully exploiting this issue can allow attackers to elevate privileges, leading to a complete compromise of the device. \niOS versions 4.0.1 and prior are vulnerable. \nNOTE (August 12, 2010): This BID was previously titled \u0027Apple iOS Multiple Vulnerabilities\u0027 and included details about a remote code-execution vulnerability. Following further analysis, we determined that the remote code-execution issue was already documented in BID 42241 (FreeType Compact Font Format (CFF) Multiple Stack Based Buffer Overflow Vulnerabilities). It can be used to rasterize and map characters into bitmaps and provide support for other font-related businesses. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 media-libs/freetype \u003c 2.4.8 \u003e= 2.4.8\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in FreeType. Please\nreview the CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll FreeType users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=media-libs/freetype-2.4.8\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-1797\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1797\n[ 2 ] CVE-2010-2497\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2497\n[ 3 ] CVE-2010-2498\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2498\n[ 4 ] CVE-2010-2499\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2499\n[ 5 ] CVE-2010-2500\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2500\n[ 6 ] CVE-2010-2519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2519\n[ 7 ] CVE-2010-2520\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2520\n[ 8 ] CVE-2010-2527\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2527\n[ 9 ] CVE-2010-2541\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2541\n[ 10 ] CVE-2010-2805\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2805\n[ 11 ] CVE-2010-2806\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2806\n[ 12 ] CVE-2010-2807\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2807\n[ 13 ] CVE-2010-2808\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2808\n[ 14 ] CVE-2010-3053\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3053\n[ 15 ] CVE-2010-3054\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3054\n[ 16 ] CVE-2010-3311\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3311\n[ 17 ] CVE-2010-3814\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3814\n[ 18 ] CVE-2010-3855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855\n[ 19 ] CVE-2011-0226\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0226\n[ 20 ] CVE-2011-3256\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3256\n[ 21 ] CVE-2011-3439\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3439\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201201-09.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. ===========================================================\nUbuntu Security Notice USN-972-1 August 17, 2010\nfreetype vulnerabilities\nCVE-2010-1797, CVE-2010-2541, CVE-2010-2805, CVE-2010-2806,\nCVE-2010-2807, CVE-2010-2808\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 8.04 LTS\nUbuntu 9.04\nUbuntu 9.10\nUbuntu 10.04 LTS\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n libfreetype6 2.1.10-1ubuntu2.8\n\nUbuntu 8.04 LTS:\n libfreetype6 2.3.5-1ubuntu4.8.04.4\n\nUbuntu 9.04:\n libfreetype6 2.3.9-4ubuntu0.3\n\nUbuntu 9.10:\n libfreetype6 2.3.9-5ubuntu0.2\n\nUbuntu 10.04 LTS:\n libfreetype6 2.3.11-1ubuntu2.2\n\nAfter a standard system update you need to restart your session to make\nall the necessary changes. \n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.10-1ubuntu2.8.diff.gz\n Size/MD5: 70961 d986f14b69d50fe1884e8dd5f9386731\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.10-1ubuntu2.8.dsc\n Size/MD5: 719 a91985ecc92b75aa3f3647506bad4039\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.10.orig.tar.gz\n Size/MD5: 1323617 adf145ce51196ad1b3054d5fb032efe6\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_amd64.deb\n Size/MD5: 717794 f332d5b1974aa53f200e4e6ecf9df088\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_amd64.deb\n Size/MD5: 440974 afa83868cc67cec692f72a9dc93635ff\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_amd64.deb\n Size/MD5: 133902 dca56851436275285b4563c96388a070\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_amd64.udeb\n Size/MD5: 251958 358627e207009dbe0c5be095e7bed18d\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_i386.deb\n Size/MD5: 677592 ee43f5e97f31b8da57582dbdb1e63033\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_i386.deb\n Size/MD5: 416328 ef092c08ba2c167af0da25ab743ea663\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_i386.deb\n Size/MD5: 117302 b2633ed4487657fe349fd3de76fce405\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_i386.udeb\n Size/MD5: 227436 f55ab8a9bb7e76ad743f6c0fa2974e64\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_powerpc.deb\n Size/MD5: 708654 ee71c714e62e96a9af4cf7ba909142e6\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_powerpc.deb\n Size/MD5: 431036 4f1c6a1e28d3a14b593bef37605119ab\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_powerpc.deb\n Size/MD5: 134260 66ba7d95f551eaadb1bba5a56d76529d\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_powerpc.udeb\n Size/MD5: 241726 d2c4f13b12c8280b1fad56cdc0965502\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_sparc.deb\n Size/MD5: 683964 49df9101deb9a317229351d72b5804ec\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_sparc.deb\n Size/MD5: 411982 efaca20d5deec9e51be023710902852b\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_sparc.deb\n Size/MD5: 120138 ff723720ed499e40049e3487844b9db3\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_sparc.udeb\n Size/MD5: 222676 71f172ba71fc507b04e5337d55b32ed6\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.5-1ubuntu4.8.04.4.diff.gz\n Size/MD5: 40949 1cc5014da4db8200edb54df32561fcd0\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.5-1ubuntu4.8.04.4.dsc\n Size/MD5: 907 7f698125814f4ca67a01b0a66d9bcfe9\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.5.orig.tar.gz\n Size/MD5: 1536077 4a5bdbe1ab92f3fe4c4816f9934a5ec2\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_amd64.deb\n Size/MD5: 694322 c740e1665d09a0c691163a543c8d650b\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_amd64.deb\n Size/MD5: 362386 5b085e83764fcda129bede2c5c4ca179\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_amd64.deb\n Size/MD5: 221392 dbebbbaffc086dccf550468fff1daa92\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_amd64.udeb\n Size/MD5: 258454 f3903d4e43891753f3c6439cd862617f\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_i386.deb\n Size/MD5: 663330 7601af27049730f0f7afcfa30244ae88\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_i386.deb\n Size/MD5: 347172 de53a441e28e385598d20333ff636026\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_i386.deb\n Size/MD5: 201266 c9c50bdc87d0a46fc43f3bbca26adec5\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_i386.udeb\n Size/MD5: 243462 16bb61f604fe48a301f6faeaa094d266\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_lpia.deb\n Size/MD5: 665120 bf0dcd13b8a171f6a740ca225d943e68\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_lpia.deb\n Size/MD5: 347512 d2beee3ccf7fe0233825d46cc61ca62d\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_lpia.deb\n Size/MD5: 205560 7879f630a5356e3d6e9c0609e8008de9\n http://ports.ubuntu.com/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_lpia.udeb\n Size/MD5: 244324 4e10fb5e68a78312eb02c69508120c6a\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_powerpc.deb\n Size/MD5: 687156 6d36300396fa84d6f889147b0247f385\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_powerpc.deb\n Size/MD5: 358086 06b9874cc9ba11fdb6feb10b0831e890\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_powerpc.deb\n Size/MD5: 235578 ce514bab4cbc028a0451742c38c633cd\n http://ports.ubuntu.com/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_powerpc.udeb\n Size/MD5: 254526 d50f40a9421b52f4302c4d260170edb3\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_sparc.deb\n Size/MD5: 658094 184f0f51023baa8ce459fababaa190d9\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_sparc.deb\n Size/MD5: 332124 5aa036de5269896c893ea8f825329b84\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_sparc.deb\n Size/MD5: 199782 9323f9209333cf42114e97d3305d901c\n http://ports.ubuntu.com/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_sparc.udeb\n Size/MD5: 227810 7657e99ad137ad5ce654b74cfbbfdc10\n\nUpdated packages for Ubuntu 9.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-4ubuntu0.3.diff.gz\n Size/MD5: 44032 17b27322a6448d40599c55561209c940\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-4ubuntu0.3.dsc\n Size/MD5: 1311 5124a4df7016a625a631c1ff4661aae9\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9.orig.tar.gz\n Size/MD5: 1624314 7b2ab681f1a436876ed888041204e478\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_amd64.deb\n Size/MD5: 729408 788a2af765a8356c4a7c01e893695b0b\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_amd64.udeb\n Size/MD5: 272950 a1f9a0ad0d036e5a14b073c139ce5408\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_amd64.deb\n Size/MD5: 407052 bfd510dc0c46a0f25dd3329693ee66a8\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_amd64.deb\n Size/MD5: 226474 9b8e6c521d8629b9b1db2760209460a3\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_i386.deb\n Size/MD5: 697818 9176ee8649b8441333d7c5d9359c53a6\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_i386.udeb\n Size/MD5: 257896 c26f46491d69a174fa9cad126a3201cf\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_i386.deb\n Size/MD5: 392692 648d0605a187b74291b3233e5e4930e3\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_i386.deb\n Size/MD5: 198834 0b41da08de5417a7db21e24e730e03d9\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_lpia.deb\n Size/MD5: 698682 12c20dd647db986bd87a250d8706e8e8\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_lpia.udeb\n Size/MD5: 257736 dee60e4b8a1824d2aa13364ec0f01602\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_lpia.deb\n Size/MD5: 392978 e19bcc3c8c0cec76227c64843b01516a\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_lpia.deb\n Size/MD5: 201636 a558e986b6c6e878e115126e7d3a28a5\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_powerpc.deb\n Size/MD5: 720040 70c8792cddd9cfe45480f8d760dd0163\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_powerpc.udeb\n Size/MD5: 265790 b356a500845d045f431db6ef4db4f811\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_powerpc.deb\n Size/MD5: 400532 91aa4eea6b8e9b67a721b552caab8468\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_powerpc.deb\n Size/MD5: 227834 fa22e303b8d06dfb99a8c3c1f2980061\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_sparc.deb\n Size/MD5: 689244 dff22369b1bb07d4ef7c6d9f474149db\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_sparc.udeb\n Size/MD5: 238164 cb1e597bd0065d2ffbad763a52088c1d\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_sparc.deb\n Size/MD5: 372422 c6f36ae3119f8f17368d796943ba9908\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_sparc.deb\n Size/MD5: 201390 c3f108859375787b11190d3c5a1d966b\n\nUpdated packages for Ubuntu 9.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-5ubuntu0.2.diff.gz\n Size/MD5: 43530 f78681f1641b93f34d41ff4d6f31eb71\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-5ubuntu0.2.dsc\n Size/MD5: 1311 8a9a302e0a62f2dbe2a62aba456e2108\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9.orig.tar.gz\n Size/MD5: 1624314 7b2ab681f1a436876ed888041204e478\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_amd64.deb\n Size/MD5: 731028 3b5ed0ad073cca0c1eee212b0e12f255\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_amd64.udeb\n Size/MD5: 275110 a23822489a0d7d45152f341b86f0df20\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_amd64.deb\n Size/MD5: 409362 ba180d650e17df6980ca09b8d1a109e1\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_amd64.deb\n Size/MD5: 230774 a0a51691eefc0fb6e94d41c3282c3ab2\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_i386.deb\n Size/MD5: 696892 ad2164ed812ccd9cf7829659cff219c7\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_i386.udeb\n Size/MD5: 258710 c2d256e87eaee83ab83592247588bee7\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_i386.deb\n Size/MD5: 393912 c8d04b785d17066229bab50a3c13e1af\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_i386.deb\n Size/MD5: 195702 02aa03f1f62a61383d829b5bf494b7b0\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_lpia.deb\n Size/MD5: 699382 ff8200917b43322062d2f3b5f3f6bab8\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_lpia.udeb\n Size/MD5: 259348 0395bdbaf357d161d0f1d3b257ae4732\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_lpia.deb\n Size/MD5: 394122 8481f2e278a5da28b28ef0fa79207662\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_lpia.deb\n Size/MD5: 198546 a3f0a848da83a64d14344b6744b33a90\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_powerpc.deb\n Size/MD5: 719762 bd7185c852b151794c27f8c2ead4da94\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_powerpc.udeb\n Size/MD5: 264578 58a77cbf2ae4c2a447a81cce72f6b8c5\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_powerpc.deb\n Size/MD5: 399118 c943fa66513b862ccb6ac99699c9e33c\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_powerpc.deb\n Size/MD5: 203834 842dd94d9b3fad52c0b1b6489775d2ea\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_sparc.deb\n Size/MD5: 691054 557de31093ac67c2dedec97e55998295\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_sparc.udeb\n Size/MD5: 240534 f3c79ed9e84e7169851de3f432b613c3\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_sparc.deb\n Size/MD5: 374982 e84af1b516f050ee9bdb93c213994943\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_sparc.deb\n Size/MD5: 195786 599978c8d9cff2525eba228c793833c3\n\nUpdated packages for Ubuntu 10.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.11-1ubuntu2.2.diff.gz\n Size/MD5: 41646 9b97425327300eda74c492034fed50ad\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.11-1ubuntu2.2.dsc\n Size/MD5: 1313 b7b625334a0d9c926bf34cc83dcc904c\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.11.orig.tar.gz\n Size/MD5: 1709600 5aa22c0bc6aa3815b40a309ead2b9d1b\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_amd64.deb\n Size/MD5: 739530 db9147ce9477b7ab22374f89d24b24ca\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_amd64.udeb\n Size/MD5: 277536 35fc46f3c281aee82eeed4e00cfdacdc\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_amd64.deb\n Size/MD5: 434932 1bf8e620c3008504b87354470e7be9a5\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_amd64.deb\n Size/MD5: 221434 4b4fcbd633bf1b3c2151617adae44835\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_i386.deb\n Size/MD5: 704694 f58601afde2b4bc257492762654cbf94\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_i386.udeb\n Size/MD5: 260916 a540a7f9ae973bce66bbd3fdb9a4f849\n http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_i386.deb\n Size/MD5: 419000 d4a78ce7ae146caa59b61f43b27d363c\n http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_i386.deb\n Size/MD5: 188710 e94b4202fcfe184fdf81409fe610a42a\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_powerpc.deb\n Size/MD5: 728090 5f2e98a54cb2a0ac03591c387aacf461\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_powerpc.udeb\n Size/MD5: 266750 66bf2b146ab219d1b78e1887d0053f2a\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_powerpc.deb\n Size/MD5: 424614 fd964644b45bbbc79729c9609c4b6bb8\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_powerpc.deb\n Size/MD5: 196686 b88a8cebff19c95b6c9c161f7d1bb472\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_sparc.deb\n Size/MD5: 707164 bf26d7cb1aa3f759ca31510f92888053\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_sparc.udeb\n Size/MD5: 250768 100b4d4b270421fb1dcb503c88b547e8\n http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_sparc.deb\n Size/MD5: 408132 b009cd0f1aafa500f8cc16273e9f2ed9\n http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_sparc.deb\n Size/MD5: 198302 504ec3da9ee2048391e2c4035d7149fc\n\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n Core Security Technologies - CoreLabs Advisory\n http://corelabs.coresecurity.com/\n\nApple OS X ATSServer CFF CharStrings INDEX Sign Mismatch\n\n\n\n1. *Advisory Information*\n\nTitle: Apple OS X ATSServer CFF CharStrings INDEX Sign Mismatch\nAdvisory Id: CORE-2010-0825\nAdvisory URL:\n[http://www.coresecurity.com/content/Apple-OSX-ATSServer-CharStrings-Sign-Mismatch]\nDate published: 2010-11-08\nDate of last update: 2010-11-08\nVendors contacted: Apple\nRelease mode: User release\n\n\n\n2. *Vulnerability Information*\n\nClass: Input validation error [CWE-20]\nImpact: Code execution\nRemotely Exploitable: Yes (client-side)\nLocally Exploitable: No\nCVE Name: CVE-2010-1797\nBugtraq ID: N/A\n\n\n\n3. *Vulnerability Description*\n\nThe Apple Type Services is prone to memory corruption due a sign\nmismatch vulnerability when handling the last offset value of the\nCharStrings INDEX structure. \n\nThis vulnerability is a variation of the vulnerability labeled as\nCVE-2010-1797 (FreeType JailbreakMe iPhone exploit variation). \n\n\n4. *Vulnerable packages*\n\n . Apple Mac OS X v10.5.x\n\n\n5. *Solutions and Workarounds*\n\nAccording to information provided to us by Apple, a patch for this fix\nhas already been developed. Apple provided us a release date for this\npatch in two opportunities but then failed to meet their our deadlines\nwithout giving us any notice or explanation. \n\nApple Mac OSX 10.6 is not affected by this vulnerability, upgrading to\nthis version is highly recommed when possible. \n\n\n6. *Credits*\n\nThis vulnerability was discovered and researched by Anibal Sacco\n[http://corelabs.coresecurity.com/index.php?module=Wiki\u0026action=view\u0026type=researcher\u0026name=Anibal_Sacco]\nand Matias Eissler\n[http://corelabs.coresecurity.com/index.php?module=Wiki\u0026action=view\u0026type=researcher\u0026name=Matias_Eissler],\nfrom Core Security Technologies. Publication was coordinated by Fernando\nRuss and Pedro Varangot. \n\n\n7. *Technical Description*\n\nWhen loading a PDF with an embedded CFF font a sign mismatch error\nexists in ATSServer when handling the last offset value of the\nCharStrings INDEX structure. \n\nThis could be triggered in different ways:\n\n . When trying to make a thumbnail of the file\n . When trying to open the file with the Preview app\n . Serving the file in a web server and tricking the user to click on it. Embedded in an email (if handled by Mail.app)\n\nThis allows to corrupt the process memory by controlling the size\nparameter of a memcpy function call allowing an attacker to get code\nexecution. \n\nAt [00042AFA] we can see how the value obtained from the file is sign\nextended prior to be passed to the function loc_370F0. Inside this\nfunction this value will be used as the size parameter of memcpy:\n\n/-----\n 00042AF2 movsx eax, word ptr [edx+5Eh]\n 00042AF6 mov [esp+0Ch], eax\n 00042AFA movsx eax, word ptr [esi+4]\n 00042AFE mov [esp], edi\n 00042B01 mov [esp+8], eax\n 00042B05 mov eax, [ebp-2Ch]\n 00042B08 mov [esp+4], eax\n 00042B0C call loc_370F0\n\n- -----/\n An attacker could take advantage of this condition by setting a\nnegative offset value (0xfffa) in the file that will be converted to a\nDWORD without enough validation leading to a memcpy of size 0xfffffffa. \n\nThis vulnerability results in arbitrary code execution. \n\n\n\n8. *Report Timeline*\n\n. 2010-08-26:\nVendor contacted, a draft of this advisory is sent and September 28th is\nproposed as a coordinated publication date. Core remarks that since this\nis a variation of a publicly disclossed vulnerability it may have\nalready been discovered by other security researchers like vulnerability\nresearch brokers or independent security researchers. 2010-08-28:\nThe Apple Product Security team acknowledges the report, saying that\nthey were able to reproduce the issue in Mac OS X 10.5 but not in Mac OS\nX 10.6, they also said that the deadline for September 28th will be\nimposible to meet. 2010-08-30:\nCore informs Apple that there is no problem changing the publication\ndate for the report, whenever the new publication date remains\nreasonable. Also, Core asks for a tentive timeframe for the fix, and\nconfirm that Mac OS X 10.6 does not seem to be affected. 2010-08-31:\nApple acknowledges the comunication informing the publication timing,\nand state that they are still trying to determine the most appropiate\ntimeframe. 2010-09-28:\nCore asks the vendor for an update regarding this issue. Also, Core asks\nfor a specific timeframe for the fix, and sets October 18th as tentative\npublication date. 2010-09-28:\nApple acknowledges the comunication informing that this issue will be\nfixed in the next security update of Mac OS X 10.5, which is tentatively\nscheduled for the end of October without a firm date of publication. 2010-08-31:\nApple asks Core about credit information for the advisory. 2010-09-28:\nCore acknowledges the comunication sending the credit information for\nthis report. 2010-10-20:\nCore asks Apple for a firm date for the release of this securiry issue\nsince the initial propossed timeframe of October 18th is due. 2010-10-22:\nApple acknowledges the comunication informing that the publication date\nis scheduled to the week of October 25th. Also, Apple notifies that the\nassigned identifier for this vulnerability is CVE-2010-1797. 2010-11-01:\nCore asks Apple for a new schedule for the publication, since there was\nno notice of any Apple security update during the week of October 25th. 2010-11-01:\nApple acknowledges the communication informing that the publication date\nwas rescheduled to the middle of the week of November 1st. 2010-11-03:\nCore informs Apple that the publication of this advisory was scheduled\nto Monday 8th, taking into account the last communication this is a\nfinal publication date. Core also informs that the information about how\nthis vulnerability was found and how it can be exploited will be\ndiscussed in a small infosec related local event in Buenos Aires city. 2010-11-08:\nCore publishes advisory CORE-2010-0825. \n\n\n\n9. *References*\n\n[1] [http://en.wikipedia.org/wiki/PostScript_fonts#Compact_Font_Format]\n\n\n10. *About CoreLabs*\n\nCoreLabs, the research center of Core Security Technologies, is charged\nwith anticipating the future needs and requirements for information\nsecurity technologies. We conduct our research in several important\nareas of computer security including system vulnerabilities, cyber\nattack planning and simulation, source code auditing, and cryptography. \nOur results include problem formalization, identification of\nvulnerabilities, novel solutions and prototypes for new technologies. \nCoreLabs regularly publishes security advisories, technical papers,\nproject information and shared software tools for public use at:\n[http://corelabs.coresecurity.com]. \n\n\n11. *About Core Security Technologies*\n\nCore Security Technologies develops strategic solutions that help\nsecurity-conscious organizations worldwide develop and maintain a\nproactive process for securing their networks. The company\u0027s flagship\nproduct, CORE IMPACT, is the most comprehensive product for performing\nenterprise security assurance testing. CORE IMPACT evaluates network,\nendpoint and end-user vulnerabilities and identifies what resources are\nexposed. It enables organizations to determine if current security\ninvestments are detecting and preventing attacks. Core Security\nTechnologies augments its leading technology solution with world-class\nsecurity consulting services, including penetration testing and software\nsecurity auditing. Based in Boston, MA and Buenos Aires, Argentina, Core\nSecurity Technologies can be reached at 617-399-6980 or on the Web at\n[http://www.coresecurity.com]. \n\n\n12. *Disclaimer*\n\nThe contents of this advisory are copyright (c) 2010 Core Security\nTechnologies and (c) 2010 CoreLabs, and are licensed under a Creative\nCommons Attribution Non-Commercial Share-Alike 3.0 (United States)\nLicense: [http://creativecommons.org/licenses/by-nc-sa/3.0/us/]\n\n\n13. *PGP/GPG Keys*\n\nThis advisory has been signed with the GPG key of Core Security\nTechnologies advisories team, which is available for download at\n[http://www.coresecurity.com/files/attachments/core_security_advisories.asc]. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.0.12 (MingW32)\nComment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/\n\niEYEARECAAYFAkzYayoACgkQyNibggitWa2PMgCfSvLwR5OgWfmFIwpONWL+dMa3\nnjEAnjIZFF+zG/wWK3IscWx3VyNW5F30\n=XULv\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n \n Packages for 2008.0 and 2009.0 are provided as of the Extended\n Maintenance Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149\u0026products_id=490\n \n The updated packages have been patched to correct this issue. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797\n https://bugzilla.redhat.com/show_bug.cgi?id=621144\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2008.0:\n e5b2f1ac6039b90de44e4c54a7dc15ad 2008.0/i586/libfreetype6-2.3.5-2.4mdv2008.0.i586.rpm\n ec559f7f70f91973c7c3337d170c2bf1 2008.0/i586/libfreetype6-devel-2.3.5-2.4mdv2008.0.i586.rpm\n 0f87bab9e3ba83faf24b13b13e8a16a5 2008.0/i586/libfreetype6-static-devel-2.3.5-2.4mdv2008.0.i586.rpm \n 0d6118b220d595e52174eb7cc2675980 2008.0/SRPMS/freetype2-2.3.5-2.4mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 5d3a64ac00fb880838ea068bceb28055 2008.0/x86_64/lib64freetype6-2.3.5-2.4mdv2008.0.x86_64.rpm\n d052dabc9b4f9fa41863eb8ca1fe334b 2008.0/x86_64/lib64freetype6-devel-2.3.5-2.4mdv2008.0.x86_64.rpm\n 281d278bf445567d29c510d0d27f7489 2008.0/x86_64/lib64freetype6-static-devel-2.3.5-2.4mdv2008.0.x86_64.rpm \n 0d6118b220d595e52174eb7cc2675980 2008.0/SRPMS/freetype2-2.3.5-2.4mdv2008.0.src.rpm\n\n Mandriva Linux 2009.0:\n ed81cc7ed3660ce94c3c6d00d556ac18 2009.0/i586/libfreetype6-2.3.7-1.3mdv2009.0.i586.rpm\n 325432a13a72aaf457847f4a205b9823 2009.0/i586/libfreetype6-devel-2.3.7-1.3mdv2009.0.i586.rpm\n bcd0dbb954f1a4e09d10e03556ea2497 2009.0/i586/libfreetype6-static-devel-2.3.7-1.3mdv2009.0.i586.rpm \n 373a3d35198adefaabfdb3d75c4359b1 2009.0/SRPMS/freetype2-2.3.7-1.3mdv2009.0.src.rpm\n\n Mandriva Linux 2009.0/X86_64:\n 4af7ec1921662eaa37e6a5b27998cdec 2009.0/x86_64/lib64freetype6-2.3.7-1.3mdv2009.0.x86_64.rpm\n c53e5285ea05fc68168a800df25a9556 2009.0/x86_64/lib64freetype6-devel-2.3.7-1.3mdv2009.0.x86_64.rpm\n 3a5b5a4aa2eec538b0479f066fa6e7e7 2009.0/x86_64/lib64freetype6-static-devel-2.3.7-1.3mdv2009.0.x86_64.rpm \n 373a3d35198adefaabfdb3d75c4359b1 2009.0/SRPMS/freetype2-2.3.7-1.3mdv2009.0.src.rpm\n\n Mandriva Linux 2009.1:\n ce6a11ba3156f8e1ac8339bf3c94f709 2009.1/i586/libfreetype6-2.3.9-1.4mdv2009.1.i586.rpm\n dc2573dc94973052652f2481651e927a 2009.1/i586/libfreetype6-devel-2.3.9-1.4mdv2009.1.i586.rpm\n aee56bcfbed1899495f00e87ddaed7ce 2009.1/i586/libfreetype6-static-devel-2.3.9-1.4mdv2009.1.i586.rpm \n aaa5a09d40624240e901b31d4f0e98c0 2009.1/SRPMS/freetype2-2.3.9-1.4mdv2009.1.src.rpm\n\n Mandriva Linux 2009.1/X86_64:\n 9e51fa000bb7e106189845ca6694ae15 2009.1/x86_64/lib64freetype6-2.3.9-1.4mdv2009.1.x86_64.rpm\n 2ec9a71562a8d40a8accaf967b3c2a75 2009.1/x86_64/lib64freetype6-devel-2.3.9-1.4mdv2009.1.x86_64.rpm\n 8e87a5ba6fd376aeceef71fe5b809f86 2009.1/x86_64/lib64freetype6-static-devel-2.3.9-1.4mdv2009.1.x86_64.rpm \n aaa5a09d40624240e901b31d4f0e98c0 2009.1/SRPMS/freetype2-2.3.9-1.4mdv2009.1.src.rpm\n\n Mandriva Linux 2010.0:\n faf191e76adc0e2f8f4bebfd97f36a49 2010.0/i586/libfreetype6-2.3.11-1.2mdv2010.0.i586.rpm\n 7202581d10580a63ba28eb4b0dce708c 2010.0/i586/libfreetype6-devel-2.3.11-1.2mdv2010.0.i586.rpm\n ecaad382e83f7005a1d76a585dfe879c 2010.0/i586/libfreetype6-static-devel-2.3.11-1.2mdv2010.0.i586.rpm \n 3c34f8f0e0352ef0a11c57d4eadc1ccd 2010.0/SRPMS/freetype2-2.3.11-1.2mdv2010.0.src.rpm\n\n Mandriva Linux 2010.0/X86_64:\n 9ffe17211ba4e4a6aa67e73e4c22e020 2010.0/x86_64/lib64freetype6-2.3.11-1.2mdv2010.0.x86_64.rpm\n eebaba0b5509b21da03a432699198342 2010.0/x86_64/lib64freetype6-devel-2.3.11-1.2mdv2010.0.x86_64.rpm\n 90e215bda5483ee6b5d5ca74bfedf7c0 2010.0/x86_64/lib64freetype6-static-devel-2.3.11-1.2mdv2010.0.x86_64.rpm \n 3c34f8f0e0352ef0a11c57d4eadc1ccd 2010.0/SRPMS/freetype2-2.3.11-1.2mdv2010.0.src.rpm\n\n Mandriva Linux 2010.1:\n 437be09971963217a5daef5dc04d451b 2010.1/i586/libfreetype6-2.3.12-1.2mdv2010.1.i586.rpm\n 42f5ddeeb25353a9fa20677112e9ae7c 2010.1/i586/libfreetype6-devel-2.3.12-1.2mdv2010.1.i586.rpm\n c77ce226104a1febd22c920c73a807f7 2010.1/i586/libfreetype6-static-devel-2.3.12-1.2mdv2010.1.i586.rpm \n 11f6a185216335c804f0988621dd637c 2010.1/SRPMS/freetype2-2.3.12-1.2mdv2010.1.src.rpm\n\n Mandriva Linux 2010.1/X86_64:\n a4a5170f277a9654f19b208deab8027c 2010.1/x86_64/lib64freetype6-2.3.12-1.2mdv2010.1.x86_64.rpm\n 4637ff02b2739b2d29c94333f00ce59e 2010.1/x86_64/lib64freetype6-devel-2.3.12-1.2mdv2010.1.x86_64.rpm\n 20a9488e5100b9a4f925fb777e00248d 2010.1/x86_64/lib64freetype6-static-devel-2.3.12-1.2mdv2010.1.x86_64.rpm \n 11f6a185216335c804f0988621dd637c 2010.1/SRPMS/freetype2-2.3.12-1.2mdv2010.1.src.rpm\n\n Corporate 4.0:\n 516a71993da7404ae96b14699cb1aa5f corporate/4.0/i586/libfreetype6-2.1.10-9.11.20060mlcs4.i586.rpm\n 839108110543d3243a725c3c2153ea46 corporate/4.0/i586/libfreetype6-devel-2.1.10-9.11.20060mlcs4.i586.rpm\n 8c912e309a35917d533fcf3be251f662 corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.11.20060mlcs4.i586.rpm \n e6e59f81030a80f5a1704f130e34b3ec corporate/4.0/SRPMS/freetype2-2.1.10-9.11.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n cf591c59af6e46e62609ff34892f52d3 corporate/4.0/x86_64/lib64freetype6-2.1.10-9.11.20060mlcs4.x86_64.rpm\n 55e0f089dee699185f317e863b12c590 corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.11.20060mlcs4.x86_64.rpm\n 7eec0361fb43382f4aa9558e2698af89 corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.11.20060mlcs4.x86_64.rpm \n e6e59f81030a80f5a1704f130e34b3ec corporate/4.0/SRPMS/freetype2-2.1.10-9.11.20060mlcs4.src.rpm\n\n Mandriva Enterprise Server 5:\n cfed1363663ad29113cb1655c3e56429 mes5/i586/libfreetype6-2.3.7-1.3mdvmes5.1.i586.rpm\n bfc520ee4832553381a304209442dcc1 mes5/i586/libfreetype6-devel-2.3.7-1.3mdvmes5.1.i586.rpm\n 92f6f546f2dad9a2bf7031261079294a mes5/i586/libfreetype6-static-devel-2.3.7-1.3mdvmes5.1.i586.rpm \n d32510c26f462ffb120f4c4284f412d4 mes5/SRPMS/freetype2-2.3.7-1.3mdvmes5.1.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n 35c99bfa9c7a0799a4f304d3a2de2f11 mes5/x86_64/lib64freetype6-2.3.7-1.3mdvmes5.1.x86_64.rpm\n 9dcb3dfb3769618d8b2c93f3f4ba53db mes5/x86_64/lib64freetype6-devel-2.3.7-1.3mdvmes5.1.x86_64.rpm\n 165edd82ca0492d88d393e8a65ad5869 mes5/x86_64/lib64freetype6-static-devel-2.3.7-1.3mdvmes5.1.x86_64.rpm \n d32510c26f462ffb120f4c4284f412d4 mes5/SRPMS/freetype2-2.3.7-1.3mdvmes5.1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFMZBO6mqjQ0CJFipgRAvckAKCpFuRGLxgICBqETRTbXhdZpg8RywCgjKjm\n46cbqAt0xVJvR5AdhA3z/FY=\n=T9it\n-----END PGP SIGNATURE-----\n. \n\nCVE-2010-3053\n\n bdf/bdflib.c in FreeType allows remote attackers to cause a denial of\n service (application crash) via a crafted BDF font file, related to\n an attempted modification of a value in a static string. \n\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 2.3.7-2+lenny3\n\nFor the unstable distribution (sid) and the testing distribution\n(squeeze), these problems have been fixed in version 2.4.2-1\n\n\nWe recommend that you upgrade your freetype package. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7-2+lenny3.diff.gz\n Size/MD5 checksum: 39230 95a3841e7258573ca2d3e0075b8e7f73\n http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7.orig.tar.gz\n Size/MD5 checksum: 1567540 c1a9f44fde316470176fd6d66af3a0e8\n http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7-2+lenny3.dsc\n Size/MD5 checksum: 1219 2a2bf3d4568d92e2a48ebcda38140e73\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_alpha.deb\n Size/MD5 checksum: 775278 2f2ca060588fc33b6d7baae02201dbd2\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_alpha.deb\n Size/MD5 checksum: 412188 ad9537e93ed3fb61f9348470940f3ce5\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_alpha.udeb\n Size/MD5 checksum: 296592 e689b1c4b6bd7779e44d1cd641be9622\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_alpha.deb\n Size/MD5 checksum: 253786 287a98ca57139d4dee8041eba2881e3b\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_amd64.deb\n Size/MD5 checksum: 713260 f1d4002e7b6d185ff9f46bc25d67c4c9\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_amd64.deb\n Size/MD5 checksum: 223170 cb00f76d826be115243faa9dfd0b8a91\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_amd64.udeb\n Size/MD5 checksum: 269796 40762e686138c27ac92b20174e67012e\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_amd64.deb\n Size/MD5 checksum: 385848 0294d7e3e1d6b37532f98344a9849cde\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_arm.deb\n Size/MD5 checksum: 686154 fbe32c7124ba2ce093b31f46736e002b\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_arm.deb\n Size/MD5 checksum: 357158 0d793d543a33cfa192098234c925d639\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_arm.udeb\n Size/MD5 checksum: 242196 1cfc9f7dc6a7cd0843aa234bab35b69e\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_arm.deb\n Size/MD5 checksum: 205120 39ab4dfbc19c8a63affc493e0b5aaf2d\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_armel.deb\n Size/MD5 checksum: 684568 325686fbc2fba7687da424ada57b9419\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_armel.deb\n Size/MD5 checksum: 209992 69f6a68fb90658ec74dfd7cc7cc0b766\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_armel.udeb\n Size/MD5 checksum: 236564 a48afca5c6798d16b140b3362dfac0ca\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_armel.deb\n Size/MD5 checksum: 353814 76960109910d6de2f74ec0e345f00854\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_i386.udeb\n Size/MD5 checksum: 254452 a34af74eda0feb2b763cfc6f5b8330c1\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_i386.deb\n Size/MD5 checksum: 371586 ec294ffffeb9ddec389e3e988d880534\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_i386.deb\n Size/MD5 checksum: 198558 3283ad058d37eed8bca46df743c6a915\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_i386.deb\n Size/MD5 checksum: 684624 014d335b35ed41022adb628796a0c122\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_ia64.deb\n Size/MD5 checksum: 332160 2dbb364f09414e4b0e0f59d9e91d1edc\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_ia64.deb\n Size/MD5 checksum: 876692 2f6d3421d6c8424523388347c5640666\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_ia64.deb\n Size/MD5 checksum: 531496 5dd7755f63271f597b64c3f513e8e7f1\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_ia64.udeb\n Size/MD5 checksum: 415934 ea2ba16157b3504d8b9c8f251b69b16f\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_mips.deb\n Size/MD5 checksum: 717022 9ee8c246af10f4bf7cdf5cdc54010dd6\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_mips.deb\n Size/MD5 checksum: 213212 3641ad81738e8935c5df2b648383c8e0\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_mips.deb\n Size/MD5 checksum: 369018 18559e273ffcea5614e71ab32b95ef47\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_mips.udeb\n Size/MD5 checksum: 253924 1be1e224f27a780beb6799d55fa74663\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_mipsel.deb\n Size/MD5 checksum: 369772 6181d98166fe1f004fb033f2665ce4af\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_mipsel.deb\n Size/MD5 checksum: 214802 6edbec67ff79e96921d1fe4bf57b0fce\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_mipsel.deb\n Size/MD5 checksum: 712502 4a99ccc68b1913f88901c5e0686fea4f\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_mipsel.udeb\n Size/MD5 checksum: 254212 e30825a94175fd78a561b8365392cbad\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_powerpc.udeb\n Size/MD5 checksum: 262804 d35ced8ba625f39dc7a04e3e61e0d49d\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_powerpc.deb\n Size/MD5 checksum: 233882 6e294c19dd0109ee80fe6cd401b6a185\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_powerpc.deb\n Size/MD5 checksum: 378612 c96a180e7132c543396486b14107cdad\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_powerpc.deb\n Size/MD5 checksum: 708212 9602a7786b2ebffd1d75d443901574c5\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_s390.deb\n Size/MD5 checksum: 225190 393c9515f7cd89bcd8b0c38d6d6dd7ac\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_s390.deb\n Size/MD5 checksum: 384160 4e20bc56e5fc65fb08529d8765d28850\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_s390.deb\n Size/MD5 checksum: 698798 f589b6b8882d998bb7b89fa1dfa40b3a\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_s390.udeb\n Size/MD5 checksum: 268272 7b6511b9ad657aa165e906a4fcbfee11\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_sparc.deb\n Size/MD5 checksum: 200078 29c1833cbde5b4da5c2e35aaf856ab58\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_sparc.udeb\n Size/MD5 checksum: 235424 e64a8fc3b744253b22161e31fbb6e92a\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_sparc.deb\n Size/MD5 checksum: 352544 a7f480889460b104bbab16fd8d8da2d5\n http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_sparc.deb\n Size/MD5 checksum: 676520 6d0f57a5bd6457a9b9b85271c7001531\n\n\n These files will probably be moved into the stable distribution on\n its next update", "sources": [ { "db": "NVD", "id": "CVE-2010-1797" }, { "db": "CERT/CC", "id": "VU#275247" }, { "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "db": "BID", "id": "42151" }, { "db": "VULHUB", "id": "VHN-44402" }, { "db": "VULMON", "id": "CVE-2010-1797" }, { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "92842" }, { "db": "PACKETSTORM", "id": "95653" }, { "db": "PACKETSTORM", "id": "92722" }, { "db": "PACKETSTORM", "id": "93637" } ], "trust": 3.24 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=14727", "trust": 0.2, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-44402", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-44402" }, { "db": "VULMON", "id": "CVE-2010-1797" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "40816", "trust": 3.4 }, { "db": "NVD", "id": "CVE-2010-1797", "trust": 3.4 }, { "db": "SECUNIA", "id": "40807", "trust": 2.6 }, { "db": "VUPEN", "id": "ADV-2010-2018", "trust": 2.6 }, { "db": "OSVDB", "id": "66828", "trust": 2.6 }, { "db": "BID", "id": "42151", "trust": 2.1 }, { "db": "SECUNIA", "id": "40982", "trust": 1.8 }, { "db": "SECUNIA", "id": "48951", "trust": 1.8 }, { "db": "EXPLOIT-DB", "id": "14538", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2010-2106", "trust": 1.8 }, { "db": "CERT/CC", "id": "VU#275247", "trust": 1.7 }, { "db": "BID", "id": "42241", "trust": 1.6 }, { "db": "SECTRACK", "id": "1024283", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2010-001892", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201008-143", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "14727", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "109005", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "92722", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "95653", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "92842", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "93637", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-69655", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-69526", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-44402", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2010-1797", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#275247" }, { "db": "VULHUB", "id": "VHN-44402" }, { "db": "VULMON", "id": "CVE-2010-1797" }, { "db": "BID", "id": "42151" }, { "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "92842" }, { "db": "PACKETSTORM", "id": "95653" }, { "db": "PACKETSTORM", "id": "92722" }, { "db": "PACKETSTORM", "id": "93637" }, { "db": "CNNVD", "id": "CNNVD-201008-143" }, { "db": "NVD", "id": "CVE-2010-1797" } ] }, "id": "VAR-201008-0306", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-44402" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T19:27:33.093000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4292", "trust": 0.8, "url": "http://support.apple.com/kb/ht4292" }, { "title": "HT4291", "trust": 0.8, "url": "http://support.apple.com/kb/ht4291" }, { "title": "HT4291", "trust": 0.8, "url": "http://support.apple.com/kb/ht4291?viewlocale=ja_jp" }, { "title": "HT4292", "trust": 0.8, "url": "http://support.apple.com/kb/ht4292?viewlocale=ja_jp" }, { "title": "freetype-2.2.1-26.0.1.AXS3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1238" }, { "title": "2109", "trust": 0.8, "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2109" }, { "title": "RHSA-2010:0607", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2010-0607.html" }, { "title": "cve_2010_1797_buffer_overflow", "trust": 0.8, "url": "http://blogs.sun.com/security/entry/cve_2010_1797_buffer_overflow" }, { "title": "CHANGES BETWEEN 2.4.0 and 2.4.1", "trust": 0.8, "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.1/news/view" }, { "title": "CHANGES BETWEEN 2.4.1 and 2.4.2", "trust": 0.8, "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/news/view" }, { "title": "Top Page", "trust": 0.8, "url": "http://freetype.sourceforge.net/index2.html" }, { "title": "Stable Releases", "trust": 0.8, "url": "http://freetype.sourceforge.net/download.html#stable" }, { "title": "TLSA-2010-34", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2010/tlsa-2010-34j.txt" }, { "title": "CVE-2010-1797", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=40151" }, { "title": "Red Hat: Important: freetype security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20100607 - security advisory" }, { "title": "Ubuntu Security Notice: freetype vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-972-1" }, { "title": "Debian Security Advisories: DSA-2105-1 freetype -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=7fe350e40a93e278310abb1441ee2ffb" }, { "title": "ipod_sun\nWARNING!\nAttribution\nThanks", "trust": 0.1, "url": "https://github.com/cub3d/ipod_sun " }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2010/11/10/mac_osx_security_vuln/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-1797" }, { "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "db": "CNNVD", "id": "CNNVD-201008-143" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-44402" }, { "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "db": "NVD", "id": "CVE-2010-1797" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://secunia.com/advisories/40816" }, { "trust": 2.6, "url": "http://support.apple.com/kb/ht4291" }, { "trust": 2.6, "url": "http://support.apple.com/kb/ht4292" }, { "trust": 2.6, "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "trust": 2.6, "url": "http://osvdb.org/66828" }, { "trust": 2.6, "url": "http://secunia.com/advisories/40807" }, { "trust": 2.6, "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "trust": 1.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2010//aug/msg00000.html" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2010//aug/msg00001.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/42151" }, { "trust": 1.8, "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "trust": 1.8, "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "trust": 1.8, "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "trust": 1.8, "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/news/view" }, { "trust": 1.8, "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "trust": 1.8, "url": "http://www.exploit-db.com/exploits/14538" }, { "trust": 1.8, "url": "http://secunia.com/advisories/40982" }, { "trust": 1.8, "url": "http://secunia.com/advisories/48951" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-972-1" }, { "trust": 1.8, "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "trust": 1.8, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/42241" }, { "trust": 0.9, "url": "http://www.kb.cert.org/vuls/id/275247" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1797" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2010/aug/1024283.html" }, { "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2010-0607.html" }, { "trust": 0.8, "url": "http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#iphone" }, { "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00005.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu275247" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1797" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1797" }, { "trust": 0.3, "url": "http://www.apple.com/iphone/softwareupdate/" }, { "trust": 0.3, "url": "http://www.apple.com/iphone/" }, { "trust": 0.3, "url": "http://www.apple.com/ipodtouch/" }, { "trust": 0.3, "url": "http://twitter.com/comex/status/20918593762" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2805" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2806" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2541" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2808" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2807" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3053" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/cub3d/ipod_sun" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/14727/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2807" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2520" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0226" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2498" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3311" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2541" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3439" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2527" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0226" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3256" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3311" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3054" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2520" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3439" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2500" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2497" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2519" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2499" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2498" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2527" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2806" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201201-09.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3054" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1797" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2497" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2500" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3256" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3053" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2499" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2805" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3814" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2808" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.10-1ubuntu2.8.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-4ubuntu0.3.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-4ubuntu0.3.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.10-1ubuntu2.8.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.1.10.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.11.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.11-1ubuntu2.2.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.5.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-5ubuntu0.2.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.11-1ubuntu2.2.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.5-1ubuntu4.8.04.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.5-1ubuntu4.8.04.4.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-5ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.1.10-1ubuntu2.8_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.5-1ubuntu4.8.04.4.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-5ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/freetype2-demos_2.3.5-1ubuntu4.8.04.4_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.9-4ubuntu0.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.5-1ubuntu4.8.04.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.1.10-1ubuntu2.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.1.10-1ubuntu2.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/freetype2-demos_2.3.11-1ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.11-1ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-udeb_2.3.9-5ubuntu0.2_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6_2.3.9-4ubuntu0.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/freetype_2.3.9-5ubuntu0.2.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.11-1ubuntu2.2_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6_2.3.9-5ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-udeb_2.3.9-4ubuntu0.3_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.11-1ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/f/freetype/libfreetype6-udeb_2.3.5-1ubuntu4.8.04.4_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.3.9-4ubuntu0.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/f/freetype/libfreetype6-dev_2.1.10-1ubuntu2.8_amd64.deb" }, { "trust": 0.1, "url": "http://corelabs.coresecurity.com]." }, { "trust": 0.1, "url": "http://www.coresecurity.com/files/attachments/core_security_advisories.asc]." }, { "trust": 0.1, "url": "http://enigmail.mozdev.org/" }, { "trust": 0.1, "url": "http://corelabs.coresecurity.com/" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://corelabs.coresecurity.com/index.php?module=wiki\u0026action=view\u0026type=researcher\u0026name=anibal_sacco]" }, { "trust": 0.1, "url": "http://www.coresecurity.com]." }, { "trust": 0.1, "url": "http://corelabs.coresecurity.com/index.php?module=wiki\u0026action=view\u0026type=researcher\u0026name=matias_eissler]," }, { "trust": 0.1, "url": "http://www.coresecurity.com/content/apple-osx-atsserver-charstrings-sign-mismatch]" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-nc-sa/3.0/us/]" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://en.wikipedia.org/wiki/postscript_fonts#compact_font_format]" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://store.mandriva.com/product_info.php?cpath=149\u0026products_id=490" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_sparc.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_armel.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_s390.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_i386.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_alpha.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_armel.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_amd64.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7-2+lenny3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_arm.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7-2+lenny3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_ia64.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_mipsel.udeb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7.orig.tar.gz" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny3_mips.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny3_alpha.deb" } ], "sources": [ { "db": "CERT/CC", "id": "VU#275247" }, { "db": "VULHUB", "id": "VHN-44402" }, { "db": "VULMON", "id": "CVE-2010-1797" }, { "db": "BID", "id": "42151" }, { "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "92842" }, { "db": "PACKETSTORM", "id": "95653" }, { "db": "PACKETSTORM", "id": "92722" }, { "db": "PACKETSTORM", "id": "93637" }, { "db": "CNNVD", "id": "CNNVD-201008-143" }, { "db": "NVD", "id": "CVE-2010-1797" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#275247" }, { "db": "VULHUB", "id": "VHN-44402" }, { "db": "VULMON", "id": "CVE-2010-1797" }, { "db": "BID", "id": "42151" }, { "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "92842" }, { "db": "PACKETSTORM", "id": "95653" }, { "db": "PACKETSTORM", "id": "92722" }, { "db": "PACKETSTORM", "id": "93637" }, { "db": "CNNVD", "id": "CNNVD-201008-143" }, { "db": "NVD", "id": "CVE-2010-1797" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-08-05T00:00:00", "db": "CERT/CC", "id": "VU#275247" }, { "date": "2010-08-16T00:00:00", "db": "VULHUB", "id": "VHN-44402" }, { "date": "2010-08-16T00:00:00", "db": "VULMON", "id": "CVE-2010-1797" }, { "date": "2010-08-02T00:00:00", "db": "BID", "id": "42151" }, { "date": "2010-08-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "date": "2012-01-24T04:19:22", "db": "PACKETSTORM", "id": "109005" }, { "date": "2010-08-17T22:38:46", "db": "PACKETSTORM", "id": "92842" }, { "date": "2010-11-09T01:58:48", "db": "PACKETSTORM", "id": "95653" }, { "date": "2010-08-13T01:49:40", "db": "PACKETSTORM", "id": "92722" }, { "date": "2010-09-09T02:40:54", "db": "PACKETSTORM", "id": "93637" }, { "date": "2010-08-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201008-143" }, { "date": "2010-08-16T18:39:40.403000", "db": "NVD", "id": "CVE-2010-1797" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-09-14T00:00:00", "db": "CERT/CC", "id": "VU#275247" }, { "date": "2019-09-26T00:00:00", "db": "VULHUB", "id": "VHN-44402" }, { "date": "2021-05-23T00:00:00", "db": "VULMON", "id": "CVE-2010-1797" }, { "date": "2015-04-13T22:11:00", "db": "BID", "id": "42151" }, { "date": "2010-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001892" }, { "date": "2019-09-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201008-143" }, { "date": "2021-05-23T00:52:44.820000", "db": "NVD", "id": "CVE-2010-1797" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "109005" }, { "db": "PACKETSTORM", "id": "92842" }, { "db": "PACKETSTORM", "id": "95653" }, { "db": "CNNVD", "id": "CNNVD-201008-143" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FreeType 2 CFF font stack corruption vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#275247" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201008-143" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.