Branches for Precise

Name Status Last Modified Last Commit
lp:ubuntu/precise/freetype bug 2 Mature 2012-04-03 09:09:23 UTC 2012-04-03
47. * debian/patches-freetype/revert_scal...

Author: Sebastien Bacher
Revision Date: 2012-04-03 10:42:05 UTC

* debian/patches-freetype/revert_scalable_fonts_metric.patch:
  - revert commit "Fix metrics on size request for scalable fonts.",
    it's breaking gtk underlining markups and creating some other
    issues as well (lp: #972223)

lp:ubuntu/precise-security/freetype bug 2 Mature 2015-09-10 17:28:24 UTC 2015-09-10
50. * SECURITY UPDATE: uninitialized memo...

Author: Marc Deslauriers
Revision Date: 2015-09-10 07:10:41 UTC

* SECURITY UPDATE: uninitialized memory reads (LP: #1449225)
  - debian/patches-freetype/savannah-bug-41309.patch: fix use of
    uninitialized data in src/cid/cidload.c, src/psaux/psobjs.c,
    src/type1/t1load.c, src/type42/t42parse.c.
  - No CVE number
* SECURITY UPDATE: denial of service via infinite loop in parse_encode
  (LP: #1492124)
  - debian/patches-freetype/savannah-bug-41590.patch: protect against
    invalid charcode in src/type1/t1load.c.
  - No CVE number

lp:ubuntu/precise-updates/freetype 2 Mature 2015-09-10 07:10:41 UTC 2015-09-10
50. * SECURITY UPDATE: uninitialized memo...

Author: Marc Deslauriers
Revision Date: 2015-09-10 07:10:41 UTC

* SECURITY UPDATE: uninitialized memory reads (LP: #1449225)
  - debian/patches-freetype/savannah-bug-41309.patch: fix use of
    uninitialized data in src/cid/cidload.c, src/psaux/psobjs.c,
    src/type1/t1load.c, src/type42/t42parse.c.
  - No CVE number
* SECURITY UPDATE: denial of service via infinite loop in parse_encode
  (LP: #1492124)
  - debian/patches-freetype/savannah-bug-41590.patch: protect against
    invalid charcode in src/type1/t1load.c.
  - No CVE number

13 of 3 results