[ubuntu/lucid-security] freetype 2.3.11-1ubuntu2.7 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Mon Jan 14 17:49:24 UTC 2013
freetype (2.3.11-1ubuntu2.7) lucid-security; urgency=low
* SECURITY UPDATE: denial of service and possible code execution via NULL
pointer dereference
- debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
of allocation error in src/bdf/bdflib.c.
- CVE-2012-5668
* SECURITY UPDATE: denial of service and possible code execution via heap
buffer over-read in BDF parsing
- debian/patches-freetype/CVE-2012-5669.patch: use correct array size
in src/bdf/bdflib.c.
- CVE-2012-5669
Date: 2013-01-11 20:30:26.693300+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/lucid/+source/freetype/2.3.11-1ubuntu2.7
-------------- next part --------------
Sorry, changesfile not available.
More information about the Lucid-changes
mailing list