Branches for Oneiric

Name Status Last Modified Last Commit
lp:ubuntu/oneiric/freetype 2 Mature 2011-08-08 08:13:07 UTC 2011-08-08
41. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2011-08-08 08:13:07 UTC

* SECURITY UPDATE: arbitrary code execution via crafted Type 1 font
  - debian/patches-freetype/CVE-2011-0226.patch: check for proper
    signedness in src/psaux/t1decode.c.
  - CVE-2011-0226
* debian/rules: fix FTBFS with gcc 4.6 by adding
  -Wno-unused-but-set-variable to CFLAGS to downgrade it to a warning.

lp:ubuntu/oneiric-security/freetype 2 Mature 2013-01-11 13:47:14 UTC 2013-01-11
44. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2013-01-11 13:47:14 UTC

* SECURITY UPDATE: denial of service and possible code execution via NULL
  pointer dereference
  - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
    of allocation error in src/bdf/bdflib.c.
  - CVE-2012-5668
* SECURITY UPDATE: denial of service and possible code execution via heap
  buffer over-read in BDF parsing
  - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
    in src/bdf/bdflib.c.
  - CVE-2012-5669

lp:ubuntu/oneiric-updates/freetype 2 Mature 2013-01-11 13:47:14 UTC 2013-01-11
44. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2013-01-11 13:47:14 UTC

* SECURITY UPDATE: denial of service and possible code execution via NULL
  pointer dereference
  - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
    of allocation error in src/bdf/bdflib.c.
  - CVE-2012-5668
* SECURITY UPDATE: denial of service and possible code execution via heap
  buffer over-read in BDF parsing
  - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
    in src/bdf/bdflib.c.
  - CVE-2012-5669

13 of 3 results