[ubuntu/precise] t1lib 5.1.2-3.4ubuntu1 (Accepted)

Jamie Strandboge jamie at ubuntu.com
Tue Jan 17 23:30:19 UTC 2012


t1lib (5.1.2-3.4ubuntu1) precise; urgency=low

  * SECURITY UPDATE: fix denial of service via oversized fonts
    - debian/patches/CVE-2011-1552_1553_1554.patch: add additional tests to
      address remaining crashes
    - CVE-2011-1552
    - CVE-2011-1553
    - CVE-2011-1554
  * SECURITY UPDATE: fix heap-based buffer overflow via AFM font parser
    - update debian/patches/series to apply CVE-2010-2642.patch which was
      mistakenly not updated in 5.1.2-3.4
    - CVE-2010-2642
    - CVE-2011-0433

Date: Tue, 17 Jan 2012 14:49:38 -0600
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/precise/+source/t1lib/5.1.2-3.4ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 17 Jan 2012 14:49:38 -0600
Source: t1lib
Binary: libt1-5 libt1-dev t1lib-bin libt1-doc libt1-5-dbg
Architecture: source
Version: 5.1.2-3.4ubuntu1
Distribution: precise
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Description: 
 libt1-5    - Type 1 font rasterizer library - runtime
 libt1-5-dbg - Type 1 font rasterizer library - debugging runtime
 libt1-dev  - Type 1 font rasterizer library - development
 libt1-doc  - Type 1 font rasterizer library - developers documentation
 t1lib-bin  - Type 1 font rasterizer library - user binaries
Changes: 
 t1lib (5.1.2-3.4ubuntu1) precise; urgency=low
 .
   * SECURITY UPDATE: fix denial of service via oversized fonts
     - debian/patches/CVE-2011-1552_1553_1554.patch: add additional tests to
       address remaining crashes
     - CVE-2011-1552
     - CVE-2011-1553
     - CVE-2011-1554
   * SECURITY UPDATE: fix heap-based buffer overflow via AFM font parser
     - update debian/patches/series to apply CVE-2010-2642.patch which was
       mistakenly not updated in 5.1.2-3.4
     - CVE-2010-2642
     - CVE-2011-0433
Checksums-Sha1: 
 562d0a8329dfa9ab2f71f73c4fa960137a3fb2a6 2050 t1lib_5.1.2-3.4ubuntu1.dsc
 dbb79f600aae9a634d7015bf92a7b6a0d4799e95 21020 t1lib_5.1.2-3.4ubuntu1.diff.gz
Checksums-Sha256: 
 28d0f751173303786bb103202fc2dbfb65e9314b810a345bf14b7a5f58852aed 2050 t1lib_5.1.2-3.4ubuntu1.dsc
 80bbc940778968fd4f90f4ac00dea61814e0c157cbd2d73376e0b89fe31ce3a0 21020 t1lib_5.1.2-3.4ubuntu1.diff.gz
Files: 
 8ef7025225978c3ccda6fd204dcc34bd 2050 libs optional t1lib_5.1.2-3.4ubuntu1.dsc
 244ae88beb62ae274bce5170f60cbfa2 21020 libs optional t1lib_5.1.2-3.4ubuntu1.diff.gz
Original-Maintainer: Ruben Molina <rmolina at udea.edu.co>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=ydNZ
-----END PGP SIGNATURE-----


More information about the Precise-changes mailing list