[ubuntu/jaunty-security] freetype, freetype (delayed) 2.3.9-4ubuntu0.2 (Accepted)
Ubuntu Installer
archive at ubuntu.com
Tue Jul 20 10:03:41 BST 2010
- Previous message: [ubuntu/jaunty-security] vte_0.20.0-0ubuntu2.1_hppa_translations.tar.gz, vte, vte_0.20.0-0ubuntu2.1_powerpc_translations.tar.gz, vte_0.20.0-0ubuntu2.1_lpia_translations.tar.gz, vte_0.20.0-0ubuntu2.1_sparc_translations.tar.gz (delayed), vte_0.20.0-0ubuntu2.1_amd64_translations.tar.gz, vte_0.20.0-0ubuntu2.1_i386_translations.tar.gz, vte_0.20.0-0ubuntu2.1_armel_translations.tar.gz, vte_0.20.0-0ubuntu2.1_ia64_translations.tar.gz 1:0.20.0-0ubuntu2.1 (Accepted)
- Next message: [ubuntu/jaunty-security] mlmmj_1.2.15-1.1+lenny1build0.9.04.1_ia64_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_powerpc_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_i386_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_amd64_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_hppa_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_armel_translations.tar.gz, mlmmj, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_sparc_translations.tar.gz (delayed), mlmmj_1.2.15-1.1+lenny1build0.9.04.1_lpia_translations.tar.gz 1.2.15-1.1+lenny1build0.9.04.1 (Accepted)
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
freetype (2.3.9-4ubuntu0.2) jaunty-security; urgency=low
* SECURITY UPDATE: denial of service and possible arbitrary code
execution via invalid free
- debian/patches/CVE-2010-2498.patch: validate number of points in
src/pshinter/pshalgo.c.
- CVE-2010-2498
* SECURITY UPDATE: arbitrary code execution via buffer overflow
- debian/patches/CVE-2010-2499.patch: check positions and return code
in src/base/ftobjs.c.
- CVE-2010-2499
* SECURITY UPDATE: arbitrary code execution via integer overflow
- debian/patches/CVE-2010-2500.patch: switch to unsigned in
src/smooth/ftgrays.c, check signed width and height in
src/smooth/ftsmooth.c.
- CVE-2010-2500
* SECURITY UPDATE: arbitrary code execution via heap buffer overflow
- debian/patches/CVE-2010-2519.patch: correctly calculate length in
src/base/ftobjs.c.
- CVE-2010-2519
* SECURITY UPDATE: arbitrary code execution via invalid realloc
- debian/patches/CVE-2010-2520.patch: perform bounds checking in
src/truetype/ttinterp.c.
- CVE-2010-2520
* SECURITY UPDATE: arbitrary code execution via buffer overflows
- debian/patches/CVE-2010-2527.patch: change buffer sizes in
src/{ftdiff,ftgrid,ftmulti,ftstring,ftview}.c.
- CVE-2010-2527
Date: Thu, 15 Jul 2010 10:25:42 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/jaunty/+source/freetype/2.3.9-4ubuntu0.2
-------------- next part --------------
Format: 1.8
Date: Thu, 15 Jul 2010 10:25:42 -0400
Source: freetype
Binary: libfreetype6 libfreetype6-dev freetype2-demos libfreetype6-udeb
Architecture: source
Version: 2.3.9-4ubuntu0.2
Distribution: jaunty-security
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
freetype2-demos - FreeType 2 demonstration programs
libfreetype6 - FreeType 2 font engine, shared library files
libfreetype6-dev - FreeType 2 font engine, development files
libfreetype6-udeb - FreeType 2 font engine for the debian-installer (udeb)
Changes:
freetype (2.3.9-4ubuntu0.2) jaunty-security; urgency=low
.
* SECURITY UPDATE: denial of service and possible arbitrary code
execution via invalid free
- debian/patches/CVE-2010-2498.patch: validate number of points in
src/pshinter/pshalgo.c.
- CVE-2010-2498
* SECURITY UPDATE: arbitrary code execution via buffer overflow
- debian/patches/CVE-2010-2499.patch: check positions and return code
in src/base/ftobjs.c.
- CVE-2010-2499
* SECURITY UPDATE: arbitrary code execution via integer overflow
- debian/patches/CVE-2010-2500.patch: switch to unsigned in
src/smooth/ftgrays.c, check signed width and height in
src/smooth/ftsmooth.c.
- CVE-2010-2500
* SECURITY UPDATE: arbitrary code execution via heap buffer overflow
- debian/patches/CVE-2010-2519.patch: correctly calculate length in
src/base/ftobjs.c.
- CVE-2010-2519
* SECURITY UPDATE: arbitrary code execution via invalid realloc
- debian/patches/CVE-2010-2520.patch: perform bounds checking in
src/truetype/ttinterp.c.
- CVE-2010-2520
* SECURITY UPDATE: arbitrary code execution via buffer overflows
- debian/patches/CVE-2010-2527.patch: change buffer sizes in
src/{ftdiff,ftgrid,ftmulti,ftstring,ftview}.c.
- CVE-2010-2527
Checksums-Sha1:
6f99df58db7ab9a917759acbed8057db9497e1e4 1311 freetype_2.3.9-4ubuntu0.2.dsc
efc1f9da7b729d9f7c1dcce679425f1497a8ad40 39290 freetype_2.3.9-4ubuntu0.2.diff.gz
Checksums-Sha256:
f78f85eeb97b94b275264f0d5686c79041ca8136a38b8ec78f28c47ba3bae0e8 1311 freetype_2.3.9-4ubuntu0.2.dsc
ea5e5112332a7780f890d31435e2c2222b5ab7fc9c5c291de08ef5322aeda92b 39290 freetype_2.3.9-4ubuntu0.2.diff.gz
Files:
ea7ece62a87ca6a90244d4a419ac6259 1311 libs optional freetype_2.3.9-4ubuntu0.2.dsc
799e4e568b9806952f927c4b3a896f87 39290 libs optional freetype_2.3.9-4ubuntu0.2.diff.gz
Original-Maintainer: Steve Langasek <vorlon at debian.org>
- Previous message: [ubuntu/jaunty-security] vte_0.20.0-0ubuntu2.1_hppa_translations.tar.gz, vte, vte_0.20.0-0ubuntu2.1_powerpc_translations.tar.gz, vte_0.20.0-0ubuntu2.1_lpia_translations.tar.gz, vte_0.20.0-0ubuntu2.1_sparc_translations.tar.gz (delayed), vte_0.20.0-0ubuntu2.1_amd64_translations.tar.gz, vte_0.20.0-0ubuntu2.1_i386_translations.tar.gz, vte_0.20.0-0ubuntu2.1_armel_translations.tar.gz, vte_0.20.0-0ubuntu2.1_ia64_translations.tar.gz 1:0.20.0-0ubuntu2.1 (Accepted)
- Next message: [ubuntu/jaunty-security] mlmmj_1.2.15-1.1+lenny1build0.9.04.1_ia64_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_powerpc_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_i386_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_amd64_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_hppa_translations.tar.gz, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_armel_translations.tar.gz, mlmmj, mlmmj_1.2.15-1.1+lenny1build0.9.04.1_sparc_translations.tar.gz (delayed), mlmmj_1.2.15-1.1+lenny1build0.9.04.1_lpia_translations.tar.gz 1.2.15-1.1+lenny1build0.9.04.1 (Accepted)
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the Jaunty-changes
mailing list