[ubuntu/karmic-security] freetype, freetype (delayed) 2.3.9-5ubuntu0.2 (Accepted)
Ubuntu Installer
archive at ubuntu.com
Tue Aug 17 18:03:37 BST 2010
freetype (2.3.9-5ubuntu0.2) karmic-security; urgency=low
* SECURITY UPDATE: possible arbitrary code execution via buffer overflow
in CFF Type2 CharStrings interpreter (LP: #617019)
- debian/patches-freetype/CVE-2010-1797.patch: check number of operands
in src/cff/cffgload.c.
- CVE-2010-1797
* SECURITY UPDATE: possible arbitrary code execution via buffer overflow
in the ftmulti demo program (LP: #617019)
- debian/patches-ft2demos/CVE-2010-2541.patch: use strncat and adjust
sizes in src/ftmulti.c.
- CVE-2010-2541
* SECURITY UPDATE: possible arbitrary code execution via improper bounds
checking (LP: #617019)
- debian/patches-freetype/CVE-2010-2805.patch: fix calculation in
src/base/ftstream.c.
- CVE-2010-2805
* SECURITY UPDATE: possible arbitrary code execution via improper bounds
checking (LP: #617019)
- debian/patches-freetype/CVE-2010-2806.patch: check string sizes in
src/type42/t42parse.c.
- CVE-2010-2806
* SECURITY UPDATE: possible arbitrary code execution via improper type
comparisons (LP: #617019)
- debian/patches-freetype/CVE-2010-2807.patch: perform better bounds
checking in src/smooth/ftsmooth.c, src/truetype/ttinterp.*.
- CVE-2010-2807
* SECURITY UPDATE: possible arbitrary code execution via memory
corruption in Adobe Type 1 Mac Font File (LWFN) fonts (LP: #617019)
- debian/patches-freetype/CVE-2010-2808.patch: check rlen in
src/base/ftobjs.c.
- CVE-2010-2808
* SECURITY UPDATE: denial of service via bdf font (LP: #617019)
- debian/patches-freetype/bug30135.patch: don't modify value in static
string in src/bdf/bdflib.c.
* SECURITY UPDATE: denial of service via nested "seac" calls
- debian/patches-freetype/nested-seac.patch: handle nested calls
correctly in include/freetype/internal/psaux.h, src/cff/cffgload.c,
src/cff/cffgload.h, src/psaux/t1decode.c.
Date: Fri, 13 Aug 2010 10:05:35 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/karmic/+source/freetype/2.3.9-5ubuntu0.2
-------------- next part --------------
Format: 1.8
Date: Fri, 13 Aug 2010 10:05:35 -0400
Source: freetype
Binary: libfreetype6 libfreetype6-dev freetype2-demos libfreetype6-udeb
Architecture: source
Version: 2.3.9-5ubuntu0.2
Distribution: karmic-security
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
freetype2-demos - FreeType 2 demonstration programs
libfreetype6 - FreeType 2 font engine, shared library files
libfreetype6-dev - FreeType 2 font engine, development files
libfreetype6-udeb - FreeType 2 font engine for the debian-installer (udeb)
Changes:
freetype (2.3.9-5ubuntu0.2) karmic-security; urgency=low
.
* SECURITY UPDATE: possible arbitrary code execution via buffer overflow
in CFF Type2 CharStrings interpreter (LP: #617019)
- debian/patches-freetype/CVE-2010-1797.patch: check number of operands
in src/cff/cffgload.c.
- CVE-2010-1797
* SECURITY UPDATE: possible arbitrary code execution via buffer overflow
in the ftmulti demo program (LP: #617019)
- debian/patches-ft2demos/CVE-2010-2541.patch: use strncat and adjust
sizes in src/ftmulti.c.
- CVE-2010-2541
* SECURITY UPDATE: possible arbitrary code execution via improper bounds
checking (LP: #617019)
- debian/patches-freetype/CVE-2010-2805.patch: fix calculation in
src/base/ftstream.c.
- CVE-2010-2805
* SECURITY UPDATE: possible arbitrary code execution via improper bounds
checking (LP: #617019)
- debian/patches-freetype/CVE-2010-2806.patch: check string sizes in
src/type42/t42parse.c.
- CVE-2010-2806
* SECURITY UPDATE: possible arbitrary code execution via improper type
comparisons (LP: #617019)
- debian/patches-freetype/CVE-2010-2807.patch: perform better bounds
checking in src/smooth/ftsmooth.c, src/truetype/ttinterp.*.
- CVE-2010-2807
* SECURITY UPDATE: possible arbitrary code execution via memory
corruption in Adobe Type 1 Mac Font File (LWFN) fonts (LP: #617019)
- debian/patches-freetype/CVE-2010-2808.patch: check rlen in
src/base/ftobjs.c.
- CVE-2010-2808
* SECURITY UPDATE: denial of service via bdf font (LP: #617019)
- debian/patches-freetype/bug30135.patch: don't modify value in static
string in src/bdf/bdflib.c.
* SECURITY UPDATE: denial of service via nested "seac" calls
- debian/patches-freetype/nested-seac.patch: handle nested calls
correctly in include/freetype/internal/psaux.h, src/cff/cffgload.c,
src/cff/cffgload.h, src/psaux/t1decode.c.
Checksums-Sha1:
25db3e55c0bcbbaedbda4266c2ea3aecd28a61da 1311 freetype_2.3.9-5ubuntu0.2.dsc
5a625a1d28381f9f9cbaab8fb15d47f018f65d42 43530 freetype_2.3.9-5ubuntu0.2.diff.gz
Checksums-Sha256:
66f6cce1148adff66b052189b7c4cc17950e3f9e03561ce67d9c0e5790b2b5fc 1311 freetype_2.3.9-5ubuntu0.2.dsc
26a4ed01ef7f0c430eb55f5e1192d8cda0b0bc4a43b982b2abba3e6a3b348624 43530 freetype_2.3.9-5ubuntu0.2.diff.gz
Files:
8a9a302e0a62f2dbe2a62aba456e2108 1311 libs optional freetype_2.3.9-5ubuntu0.2.dsc
f78681f1641b93f34d41ff4d6f31eb71 43530 libs optional freetype_2.3.9-5ubuntu0.2.diff.gz
Launchpad-Bugs-Fixed: 617019 617019 617019 617019 617019 617019 617019
Original-Maintainer: Steve Langasek <vorlon at debian.org>
More information about the Karmic-changes
mailing list