[ubuntu/quantal-security] freetype 2.4.10-0ubuntu1.1 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Mon Jan 14 17:49:14 UTC 2013


freetype (2.4.10-0ubuntu1.1) quantal-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via NULL
    pointer dereference
    - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
      of allocation error in src/bdf/bdflib.c.
    - CVE-2012-5668
  * SECURITY UPDATE: denial of service and possible code execution via heap
    buffer over-read in BDF parsing
    - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
      in src/bdf/bdflib.c.
    - CVE-2012-5669
  * SECURITY UPDATE: denial of service and possible code execution via out-
    of-bounds write
    - debian/patches-freetype/CVE-2012-5670.patch: normalize negative
      parameter in src/bdf/bdflib.c.
    - CVE-2012-5670

Date: 2013-01-11 20:30:18.435964+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/quantal/+source/freetype/2.4.10-0ubuntu1.1
-------------- next part --------------
Sorry, changesfile not available.


More information about the Quantal-changes mailing list