Branches for Quantal

Name Status Last Modified Last Commit
lp:ubuntu/quantal/freetype bug 2 Mature 2012-08-06 18:43:16 UTC 2012-08-06
48. * New upstream version * debian/libfr...

Author: Sebastien Bacher
Revision Date: 2012-08-03 13:57:01 UTC

* New upstream version
* debian/libfreetype6.symbols:
  - new version update
* debian/patches-freetype/savannah-bug-35847.patch,
  debian/patches-freetype/savannah-bug-35833.patch:
  - dropped, the fixes are in the new version
* Resynchronize on Debian, remaining diff:
* debian/patches-freetype/revert_scalable_fonts_metric.patch:
  - revert commit "Fix metrics on size request for scalable fonts.",
    it's breaking gtk underlining markups and creating some other
    issues as well (lp: #972223)

lp:ubuntu/quantal-security/freetype 2 Mature 2013-01-14 18:23:43 UTC 2013-01-14
49. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2013-01-11 13:38:01 UTC

* SECURITY UPDATE: denial of service and possible code execution via NULL
  pointer dereference
  - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
    of allocation error in src/bdf/bdflib.c.
  - CVE-2012-5668
* SECURITY UPDATE: denial of service and possible code execution via heap
  buffer over-read in BDF parsing
  - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
    in src/bdf/bdflib.c.
  - CVE-2012-5669
* SECURITY UPDATE: denial of service and possible code execution via out-
  of-bounds write
  - debian/patches-freetype/CVE-2012-5670.patch: normalize negative
    parameter in src/bdf/bdflib.c.
  - CVE-2012-5670

lp:ubuntu/quantal-updates/freetype 2 Mature 2013-01-14 19:21:20 UTC 2013-01-14
49. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2013-01-11 13:38:01 UTC

* SECURITY UPDATE: denial of service and possible code execution via NULL
  pointer dereference
  - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
    of allocation error in src/bdf/bdflib.c.
  - CVE-2012-5668
* SECURITY UPDATE: denial of service and possible code execution via heap
  buffer over-read in BDF parsing
  - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
    in src/bdf/bdflib.c.
  - CVE-2012-5669
* SECURITY UPDATE: denial of service and possible code execution via out-
  of-bounds write
  - debian/patches-freetype/CVE-2012-5670.patch: normalize negative
    parameter in src/bdf/bdflib.c.
  - CVE-2012-5670

13 of 3 results