Ubuntu

Change log for “freetype” package in Ubuntu

175 of 107 results
Published in trusty-release on 2014-03-13
Deleted in trusty-proposed (Reason: moved to release)
freetype (2.5.2-1ubuntu2) trusty; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution in
    CFF rasterizer
    - debian/patches/CVE-2014-2240.patch: validate hintMask in
      src/cff/cf2hints.c.
    - CVE-2014-2240
  * SECURITY UPDATE: denial of service in CFF rasterizer
    - debian/patches/CVE-2014-2241.patch: don't trigger asserts in
      src/cff/cf2ft.c.
    - CVE-2014-2241
 -- Marc Deslauriers <email address hidden>   Thu, 13 Mar 2014 12:47:17 -0400

Available diffs

Published in saucy-updates on 2014-03-17
Published in saucy-security on 2014-03-17
freetype (2.4.12-0ubuntu1.1) saucy-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution in
    CFF rasterizer
    - debian/patches-freetype/CVE-2014-2240.patch: validate hintMask in
      src/cff/cf2hints.c.
    - CVE-2014-2240
  * SECURITY UPDATE: denial of service in CFF rasterizer
    - debian/patches-freetype/CVE-2014-2241.patch: don't trigger asserts in
      src/cff/cf2ft.c.
    - CVE-2014-2241
 -- Marc Deslauriers <email address hidden>   Thu, 13 Mar 2014 12:52:16 -0400
Superseded in trusty-release on 2014-03-13
Deleted in trusty-proposed on 2014-03-15 (Reason: moved to release)
freetype (2.5.2-1ubuntu1) trusty; urgency=medium

  * Merge from Debian unstable, remaining changes:
    - debian/patches-freetype/revert_scalable_fonts_metric.patch:
      revert commit "Fix metrics on size request for scalable fonts.",
      which breaks gtk underlining markups
  * Dropped changes, included in Debian:
    - Fix png configuration for cross builds.
    - Run aclocal and autoconf.

Available diffs

Superseded in trusty-release on 2013-12-29
Deleted in trusty-proposed on 2013-12-30 (Reason: moved to release)
freetype (2.5.1-2ubuntu1) trusty; urgency=medium

  * Merge from Debian unstable, remaining changes:
    - debian/patches-freetype/revert_scalable_fonts_metric.patch:
      revert commit "Fix metrics on size request for scalable fonts.",
      which breaks gtk underlining markups
    - Fix png configuration for cross builds.
    - Run aclocal and autoconf.

Available diffs

Superseded in trusty-release on 2013-12-18
Deleted in trusty-proposed on 2013-12-19 (Reason: moved to release)
freetype (2.5.1-1ubuntu2) trusty; urgency=medium

  * Fix png configuration for cross builds.
  * Run aclocal and autoconf.
 -- Matthias Klose <email address hidden>   Fri, 06 Dec 2013 13:01:17 +0100

Available diffs

Superseded in trusty-release on 2013-12-06
Deleted in trusty-proposed on 2013-12-07 (Reason: moved to release)
freetype (2.5.1-1ubuntu1) trusty; urgency=low

  * Merge from Debian unstable (LP: #1256114), remaining changes:
    - debian/patches-freetype/revert_scalable_fonts_metric.patch:
      revert commit "Fix metrics on size request for scalable fonts.",
      which breaks gtk underlining markups
  * Dropped changes, included in Debian:
    - debian/control: build-depends on libpng-dev
    - debian/libfreetype6.symbols: new version update
  * Drop debian/patches-ft2demos/compiler-warning-fixes.patch, which is
    actually a bug in the compiler_hardening_fixes.patch and has been fixed
    there in the Ubuntu version.

Superseded in trusty-release on 2013-11-29
Deleted in trusty-proposed on 2013-11-30 (Reason: moved to release)
freetype (2.5.0.1-0ubuntu2) trusty; urgency=low

  * debian/control: build-depends on libpng12-dev
 -- Sebastien Bacher <email address hidden>   Mon, 11 Nov 2013 12:03:49 +0100
Superseded in trusty-proposed on 2013-11-11
freetype (2.5.0.1-0ubuntu1) trusty; urgency=low

  * New upstream version (lp: #1203012)
  * debian/patches-freetype/git_unitialized_variable.patch,
    debian/patches-ft2demos/init_variables.patch:
    - dropped, the fixes are in the new version
  * debian/libfreetype6.symbols: new version update
 -- Sebastien Bacher <email address hidden>   Mon, 11 Nov 2013 11:52:19 +0100

Available diffs

Superseded in trusty-release on 2013-11-11
Published in saucy-release on 2013-06-25
Deleted in saucy-proposed (Reason: moved to release)
freetype (2.4.12-0ubuntu1) saucy; urgency=low

  * New upstream version (lp: #1179523)
  * debian/patches-freetype/git_unitialized_variable.patch,
    debian/patches-ft2demos/init_variables.patch:
    - fix an unitialized variable warnings which were breaking the build
  * debian/libfreetype6.symbols: updated
 -- Sebastien Bacher <email address hidden>   Mon, 13 May 2013 13:12:42 +0200
Superseded in saucy-release on 2013-06-25
Published in raring-release on 2013-02-08
Deleted in raring-proposed (Reason: moved to release)
freetype (2.4.11-0ubuntu1) raring; urgency=low

  * New upstream version
  * debian/patches-freetype/CVE-2012-5668.patch,
    debian/patches-freetype/CVE-2012-5669.patch,
    debian/patches-freetype/CVE-2012-5670.patch:
    - dropped, those fixes are in the new version
  * debian/patches-ft2demos/compiler_hardening_fixes.patch:
    - changed unsigned char* to char* to fix "pointer targets in assignment
      differ in signedness" build error
  * debian/libfreetype6.symbols: updated for the new version
 -- Sebastien Bacher <email address hidden>   Fri, 08 Feb 2013 12:50:09 +0100
Superseded in raring-release on 2013-02-08
Deleted in raring-proposed on 2013-02-09 (Reason: moved to release)
freetype (2.4.10-0ubuntu2) raring; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via NULL
    pointer dereference
    - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
      of allocation error in src/bdf/bdflib.c.
    - CVE-2012-5668
  * SECURITY UPDATE: denial of service and possible code execution via heap
    buffer over-read in BDF parsing
    - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
      in src/bdf/bdflib.c.
    - CVE-2012-5669
  * SECURITY UPDATE: denial of service and possible code execution via out-
    of-bounds write
    - debian/patches-freetype/CVE-2012-5670.patch: normalize negative
      parameter in src/bdf/bdflib.c.
    - CVE-2012-5670
 -- Marc Deslauriers <email address hidden>   Mon, 14 Jan 2013 13:24:57 -0500
Published in hardy-updates on 2013-01-14
Published in hardy-security on 2013-01-14
freetype (2.3.5-1ubuntu4.8.04.10) hardy-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via NULL
    pointer dereference
    - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
      of allocation error in src/bdf/bdflib.c.
    - CVE-2012-5668
  * SECURITY UPDATE: denial of service and possible code execution via heap
    buffer over-read in BDF parsing
    - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
      in src/bdf/bdflib.c.
    - CVE-2012-5669
 -- Marc Deslauriers <email address hidden>   Fri, 11 Jan 2013 15:18:51 -0500
Published in lucid-updates on 2013-01-14
Published in lucid-security on 2013-01-14
freetype (2.3.11-1ubuntu2.7) lucid-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via NULL
    pointer dereference
    - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
      of allocation error in src/bdf/bdflib.c.
    - CVE-2012-5668
  * SECURITY UPDATE: denial of service and possible code execution via heap
    buffer over-read in BDF parsing
    - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
      in src/bdf/bdflib.c.
    - CVE-2012-5669
 -- Marc Deslauriers <email address hidden>   Fri, 11 Jan 2013 15:16:40 -0500
Published in oneiric-updates on 2013-01-14
Published in oneiric-security on 2013-01-14
freetype (2.4.4-2ubuntu1.3) oneiric-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via NULL
    pointer dereference
    - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
      of allocation error in src/bdf/bdflib.c.
    - CVE-2012-5668
  * SECURITY UPDATE: denial of service and possible code execution via heap
    buffer over-read in BDF parsing
    - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
      in src/bdf/bdflib.c.
    - CVE-2012-5669
 -- Marc Deslauriers <email address hidden>   Fri, 11 Jan 2013 13:47:14 -0500
Published in quantal-updates on 2013-01-14
Published in quantal-security on 2013-01-14
freetype (2.4.10-0ubuntu1.1) quantal-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via NULL
    pointer dereference
    - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
      of allocation error in src/bdf/bdflib.c.
    - CVE-2012-5668
  * SECURITY UPDATE: denial of service and possible code execution via heap
    buffer over-read in BDF parsing
    - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
      in src/bdf/bdflib.c.
    - CVE-2012-5669
  * SECURITY UPDATE: denial of service and possible code execution via out-
    of-bounds write
    - debian/patches-freetype/CVE-2012-5670.patch: normalize negative
      parameter in src/bdf/bdflib.c.
    - CVE-2012-5670
 -- Marc Deslauriers <email address hidden>   Fri, 11 Jan 2013 13:38:01 -0500
Published in precise-updates on 2013-01-14
Published in precise-security on 2013-01-14
freetype (2.4.8-1ubuntu2.1) precise-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via NULL
    pointer dereference
    - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
      of allocation error in src/bdf/bdflib.c.
    - CVE-2012-5668
  * SECURITY UPDATE: denial of service and possible code execution via heap
    buffer over-read in BDF parsing
    - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
      in src/bdf/bdflib.c.
    - CVE-2012-5669
 -- Marc Deslauriers <email address hidden>   Fri, 11 Jan 2013 13:45:45 -0500
Superseded in raring-release on 2013-01-14
Published in quantal-release on 2012-08-03
freetype (2.4.10-0ubuntu1) quantal; urgency=low

  * New upstream version
  * debian/libfreetype6.symbols:
    - new version update
  * debian/patches-freetype/savannah-bug-35847.patch,
    debian/patches-freetype/savannah-bug-35833.patch:
    - dropped, the fixes are in the new version
  * Resynchronize on Debian, remaining diff:
  * debian/patches-freetype/revert_scalable_fonts_metric.patch:
    - revert commit "Fix metrics on size request for scalable fonts.",
      it's breaking gtk underlining markups and creating some other
      issues as well (lp: #972223)

Superseded in quantal-release on 2012-08-03
Published in precise-release on 2012-04-03
freetype (2.4.8-1ubuntu2) precise; urgency=low

  * debian/patches-freetype/revert_scalable_fonts_metric.patch:
    - revert commit "Fix metrics on size request for scalable fonts.",
      it's breaking gtk underlining markups and creating some other
      issues as well (lp: #972223)
 -- Sebastien Bacher <email address hidden>   Tue, 03 Apr 2012 10:42:05 +0200

Available diffs

Superseded in precise-release on 2012-04-03
freetype (2.4.8-1ubuntu1) precise; urgency=low

  * SECURITY UPDATE: Denial of service via crafted BDF font (LP: #963283)
    - debian/patches-freetype/CVE-2012-1126.patch: Perform better input
      sanitization when parsing properties. Based on upstream patch.
    - CVE-2012-1126
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1127.patch: Perform better input
      sanitization when parsing glyphs. Based on upstream patch.
    - CVE-2012-1127
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1128.patch: Improve loop logic to avoid
      NULL pointer dereference. Based on upstream patch.
    - CVE-2012-1128
  * SECURITY UPDATE: Denial of service via crafted Type42 font
    - debian/patches-freetype/CVE-2012-1129.patch: Perform better input
      sanitization when parsing SFNT strings. Based on upstream patch.
    - CVE-2012-1129
  * SECURITY UPDATE: Denial of service via crafted PCF font
    - debian/patches-freetype/CVE-2012-1130.patch: Allocate enough memory to
      properly NULL-terminate parsed properties strings. Based on upstream
      patch.
    - CVE-2012-1130
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1131.patch: Use appropriate data type to
      prevent integer truncation on 64 bit systems when rendering fonts. Based
      on upstream patch.
    - CVE-2012-1131
  * SECURITY UPDATE: Denial of service via crafted Type1 font
    - debian/patches-freetype/CVE-2012-1132.patch: Ensure strings are of
      appropriate length when loading Type1 fonts. Based on upstream patch.
    - CVE-2012-1132
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1133.patch: Limit range of negative
      glyph encoding values to prevent invalid array indexes. Based on
      upstream patch.
    - CVE-2012-1133
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted Type1 font
    - debian/patches-freetype/CVE-2012-1134.patch: Enforce a minimum Type1
      private dictionary size to prevent writing past array bounds. Based on
      upstream patch.
    - CVE-2012-1134
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1135.patch: Perform proper bounds
      checks when interpreting TrueType bytecode. Based on upstream patch.
    - CVE-2012-1135
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1136.patch: Ensure encoding field is
      defined when parsing glyphs. Based on upstream patch.
    - CVE-2012-1136
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1137.patch: Allocate sufficient number
      of array elements to prevent reading past array bounds. Based on
      upstream patch.
    - CVE-2012-1137
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1138.patch: Correct typo resulting in
      invalid read from wrong memory location. Based on upstream patch.
    - CVE-2012-1138
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1139.patch: Check array index values to
      prevent reading invalid memory. Based on upstream patch.
    - CVE-2012-1139
  * SECURITY UPDATE: Denial of service via crafted PostScript font
    - debian/patches-freetype/CVE-2012-1140.patch: Fix off-by-one error in
      boundary checks. Based on upstream patch.
    - CVE-2012-1140
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1141.patch: Initialize field elements
      to prevent invalid read. Based on upstream patch.
    - CVE-2012-1141
  * SECURITY UPDATE: Denial of service via crafted Windows FNT/FON font
    - debian/patches-freetype/CVE-2012-1142.patch: Perform input sanitization
      on first and last character code fields. Based on upstream patch.
    - CVE-2012-1142
  * SECURITY UPDATE: Denial of service via crafted font
    - debian/patches-freetype/CVE-2012-1143.patch: Protect against divide by
      zero when dealing with 32 bit types. Based on upstream patch.
    - CVE-2012-1143
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted TrueType font
    - debian/patches-freetype/CVE-2012-1144.patch: Perform input sanitization
      on the first glyph outline point value. Based on upstream patch.
    - CVE-2012-1144
 -- Tyler Hicks <email address hidden>   Fri, 23 Mar 2012 12:13:46 -0500

Available diffs

Superseded in hardy-updates on 2013-01-14
Superseded in hardy-security on 2013-01-14
freetype (2.3.5-1ubuntu4.8.04.9) hardy-security; urgency=low

  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1126.patch: Perform better input
      sanitization when parsing properties. Based on upstream patch.
    - CVE-2012-1126
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1127.patch: Perform better input
      sanitization when parsing glyphs. Based on upstream patch.
    - CVE-2012-1127
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1128.patch: Improve loop logic to avoid
      NULL pointer dereference. Based on upstream patch.
    - CVE-2012-1128
  * SECURITY UPDATE: Denial of service via crafted Type42 font
    - debian/patches-freetype/CVE-2012-1129.patch: Perform better input
      sanitization when parsing SFNT strings. Based on upstream patch.
    - CVE-2012-1129
  * SECURITY UPDATE: Denial of service via crafted PCF font
    - debian/patches-freetype/CVE-2012-1130.patch: Allocate enough memory to
      properly NULL-terminate parsed properties strings. Based on upstream
      patch.
    - CVE-2012-1130
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1131.patch: Use appropriate data type to
      prevent integer truncation on 64 bit systems when rendering fonts. Based
      on upstream patch.
    - CVE-2012-1131
  * SECURITY UPDATE: Denial of service via crafted Type1 font
    - debian/patches-freetype/CVE-2012-1132.patch: Ensure strings are of
      appropriate length when loading Type1 fonts. Based on upstream patch.
    - CVE-2012-1132
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1133.patch: Limit range of negative
      glyph encoding values to prevent invalid array indexes. Based on
      upstream patch.
    - CVE-2012-1133
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted Type1 font
    - debian/patches-freetype/CVE-2012-1134.patch: Enforce a minimum Type1
      private dictionary size to prevent writing past array bounds. Based on
      upstream patch.
    - CVE-2012-1134
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1135.patch: Perform proper bounds
      checks when interpreting TrueType bytecode. Based on upstream patch.
    - CVE-2012-1135
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1136.patch: Ensure encoding field is
      defined when parsing glyphs. Based on upstream patch.
    - CVE-2012-1136
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1137.patch: Allocate sufficient number
      of array elements to prevent reading past array bounds. Based on
      upstream patch.
    - CVE-2012-1137
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1138.patch: Correct typo resulting in
      invalid read from wrong memory location. Based on upstream patch.
    - CVE-2012-1138
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1139.patch: Check array index values to
      prevent reading invalid memory. Based on upstream patch.
    - CVE-2012-1139
  * SECURITY UPDATE: Denial of service via crafted PostScript font
    - debian/patches-freetype/CVE-2012-1140.patch: Fix off-by-one error in
      boundary checks. Based on upstream patch.
    - CVE-2012-1140
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1141.patch: Initialize field elements
      to prevent invalid read. Based on upstream patch.
    - CVE-2012-1141
  * SECURITY UPDATE: Denial of service via crafted Windows FNT/FON font
    - debian/patches-freetype/CVE-2012-1142.patch: Perform input sanitization
      on first and last character code fields. Based on upstream patch.
    - CVE-2012-1142
  * SECURITY UPDATE: Denial of service via crafted font
    - debian/patches-freetype/CVE-2012-1143.patch: Protect against divide by
      zero when dealing with 32 bit types. Based on upstream patch.
    - CVE-2012-1143
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted TrueType font
    - debian/patches-freetype/CVE-2012-1144.patch: Perform input sanitization
      on the first glyph outline point value. Based on upstream patch.
    - CVE-2012-1144
 -- Tyler Hicks <email address hidden>   Wed, 21 Mar 2012 19:57:51 -0500
Superseded in lucid-updates on 2013-01-14
Superseded in lucid-security on 2013-01-14
freetype (2.3.11-1ubuntu2.6) lucid-security; urgency=low

  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1126.patch: Perform better input
      sanitization when parsing properties. Based on upstream patch.
    - CVE-2012-1126
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1127.patch: Perform better input
      sanitization when parsing glyphs. Based on upstream patch.
    - CVE-2012-1127
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1128.patch: Improve loop logic to avoid
      NULL pointer dereference. Based on upstream patch.
    - CVE-2012-1128
  * SECURITY UPDATE: Denial of service via crafted Type42 font
    - debian/patches-freetype/CVE-2012-1129.patch: Perform better input
      sanitization when parsing SFNT strings. Based on upstream patch.
    - CVE-2012-1129
  * SECURITY UPDATE: Denial of service via crafted PCF font
    - debian/patches-freetype/CVE-2012-1130.patch: Allocate enough memory to
      properly NULL-terminate parsed properties strings. Based on upstream
      patch.
    - CVE-2012-1130
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1131.patch: Use appropriate data type to
      prevent integer truncation on 64 bit systems when rendering fonts. Based
      on upstream patch.
    - CVE-2012-1131
  * SECURITY UPDATE: Denial of service via crafted Type1 font
    - debian/patches-freetype/CVE-2012-1132.patch: Ensure strings are of
      appropriate length when loading Type1 fonts. Based on upstream patch.
    - CVE-2012-1132
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1133.patch: Limit range of negative
      glyph encoding values to prevent invalid array indexes. Based on
      upstream patch.
    - CVE-2012-1133
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted Type1 font
    - debian/patches-freetype/CVE-2012-1134.patch: Enforce a minimum Type1
      private dictionary size to prevent writing past array bounds. Based on
      upstream patch.
    - CVE-2012-1134
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1135.patch: Perform proper bounds
      checks when interpreting TrueType bytecode. Based on upstream patch.
    - CVE-2012-1135
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1136.patch: Ensure encoding field is
      defined when parsing glyphs. Based on upstream patch.
    - CVE-2012-1136
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1137.patch: Allocate sufficient number
      of array elements to prevent reading past array bounds. Based on
      upstream patch.
    - CVE-2012-1137
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1138.patch: Correct typo resulting in
      invalid read from wrong memory location. Based on upstream patch.
    - CVE-2012-1138
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1139.patch: Check array index values to
      prevent reading invalid memory. Based on upstream patch.
    - CVE-2012-1139
  * SECURITY UPDATE: Denial of service via crafted PostScript font
    - debian/patches-freetype/CVE-2012-1140.patch: Fix off-by-one error in
      boundary checks. Based on upstream patch.
    - CVE-2012-1140
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1141.patch: Initialize field elements
      to prevent invalid read. Based on upstream patch.
    - CVE-2012-1141
  * SECURITY UPDATE: Denial of service via crafted Windows FNT/FON font
    - debian/patches-freetype/CVE-2012-1142.patch: Perform input sanitization
      on first and last character code fields. Based on upstream patch.
    - CVE-2012-1142
  * SECURITY UPDATE: Denial of service via crafted font
    - debian/patches-freetype/CVE-2012-1143.patch: Protect against divide by
      zero when dealing with 32 bit types. Based on upstream patch.
    - CVE-2012-1143
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted TrueType font
    - debian/patches-freetype/CVE-2012-1144.patch: Perform input sanitization
      on the first glyph outline point value. Based on upstream patch.
    - CVE-2012-1144
 -- Tyler Hicks <email address hidden>   Wed, 21 Mar 2012 19:57:51 -0500
Obsolete in maverick-updates on 2013-03-05
Obsolete in maverick-security on 2013-03-05
freetype (2.4.2-2ubuntu0.4) maverick-security; urgency=low

  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1126.patch: Perform better input
      sanitization when parsing properties. Based on upstream patch.
    - CVE-2012-1126
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1127.patch: Perform better input
      sanitization when parsing glyphs. Based on upstream patch.
    - CVE-2012-1127
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1128.patch: Improve loop logic to avoid
      NULL pointer dereference. Based on upstream patch.
    - CVE-2012-1128
  * SECURITY UPDATE: Denial of service via crafted Type42 font
    - debian/patches-freetype/CVE-2012-1129.patch: Perform better input
      sanitization when parsing SFNT strings. Based on upstream patch.
    - CVE-2012-1129
  * SECURITY UPDATE: Denial of service via crafted PCF font
    - debian/patches-freetype/CVE-2012-1130.patch: Allocate enough memory to
      properly NULL-terminate parsed properties strings. Based on upstream
      patch.
    - CVE-2012-1130
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1131.patch: Use appropriate data type to
      prevent integer truncation on 64 bit systems when rendering fonts. Based
      on upstream patch.
    - CVE-2012-1131
  * SECURITY UPDATE: Denial of service via crafted Type1 font
    - debian/patches-freetype/CVE-2012-1132.patch: Ensure strings are of
      appropriate length when loading Type1 fonts. Based on upstream patch.
    - CVE-2012-1132
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1133.patch: Limit range of negative
      glyph encoding values to prevent invalid array indexes. Based on
      upstream patch.
    - CVE-2012-1133
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted Type1 font
    - debian/patches-freetype/CVE-2012-1134.patch: Enforce a minimum Type1
      private dictionary size to prevent writing past array bounds. Based on
      upstream patch.
    - CVE-2012-1134
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1135.patch: Perform proper bounds
      checks when interpreting TrueType bytecode. Based on upstream patch.
    - CVE-2012-1135
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1136.patch: Ensure encoding field is
      defined when parsing glyphs. Based on upstream patch.
    - CVE-2012-1136
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1137.patch: Allocate sufficient number
      of array elements to prevent reading past array bounds. Based on
      upstream patch.
    - CVE-2012-1137
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1138.patch: Correct typo resulting in
      invalid read from wrong memory location. Based on upstream patch.
    - CVE-2012-1138
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1139.patch: Check array index values to
      prevent reading invalid memory. Based on upstream patch.
    - CVE-2012-1139
  * SECURITY UPDATE: Denial of service via crafted PostScript font
    - debian/patches-freetype/CVE-2012-1140.patch: Fix off-by-one error in
      boundary checks. Based on upstream patch.
    - CVE-2012-1140
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1141.patch: Initialize field elements
      to prevent invalid read. Based on upstream patch.
    - CVE-2012-1141
  * SECURITY UPDATE: Denial of service via crafted Windows FNT/FON font
    - debian/patches-freetype/CVE-2012-1142.patch: Perform input sanitization
      on first and last character code fields. Based on upstream patch.
    - CVE-2012-1142
  * SECURITY UPDATE: Denial of service via crafted font
    - debian/patches-freetype/CVE-2012-1143.patch: Protect against divide by
      zero when dealing with 32 bit types. Based on upstream patch.
    - CVE-2012-1143
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted TrueType font
    - debian/patches-freetype/CVE-2012-1144.patch: Perform input sanitization
      on the first glyph outline point value. Based on upstream patch.
    - CVE-2012-1144
 -- Tyler Hicks <email address hidden>   Wed, 21 Mar 2012 19:57:51 -0500
Obsolete in natty-updates on 2013-06-04
Obsolete in natty-security on 2013-06-04
freetype (2.4.4-1ubuntu2.3) natty-security; urgency=low

  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1126.patch: Perform better input
      sanitization when parsing properties. Based on upstream patch.
    - CVE-2012-1126
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1127.patch: Perform better input
      sanitization when parsing glyphs. Based on upstream patch.
    - CVE-2012-1127
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1128.patch: Improve loop logic to avoid
      NULL pointer dereference. Based on upstream patch.
    - CVE-2012-1128
  * SECURITY UPDATE: Denial of service via crafted Type42 font
    - debian/patches-freetype/CVE-2012-1129.patch: Perform better input
      sanitization when parsing SFNT strings. Based on upstream patch.
    - CVE-2012-1129
  * SECURITY UPDATE: Denial of service via crafted PCF font
    - debian/patches-freetype/CVE-2012-1130.patch: Allocate enough memory to
      properly NULL-terminate parsed properties strings. Based on upstream
      patch.
    - CVE-2012-1130
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1131.patch: Use appropriate data type to
      prevent integer truncation on 64 bit systems when rendering fonts. Based
      on upstream patch.
    - CVE-2012-1131
  * SECURITY UPDATE: Denial of service via crafted Type1 font
    - debian/patches-freetype/CVE-2012-1132.patch: Ensure strings are of
      appropriate length when loading Type1 fonts. Based on upstream patch.
    - CVE-2012-1132
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1133.patch: Limit range of negative
      glyph encoding values to prevent invalid array indexes. Based on
      upstream patch.
    - CVE-2012-1133
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted Type1 font
    - debian/patches-freetype/CVE-2012-1134.patch: Enforce a minimum Type1
      private dictionary size to prevent writing past array bounds. Based on
      upstream patch.
    - CVE-2012-1134
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1135.patch: Perform proper bounds
      checks when interpreting TrueType bytecode. Based on upstream patch.
    - CVE-2012-1135
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1136.patch: Ensure encoding field is
      defined when parsing glyphs. Based on upstream patch.
    - CVE-2012-1136
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1137.patch: Allocate sufficient number
      of array elements to prevent reading past array bounds. Based on
      upstream patch.
    - CVE-2012-1137
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1138.patch: Correct typo resulting in
      invalid read from wrong memory location. Based on upstream patch.
    - CVE-2012-1138
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1139.patch: Check array index values to
      prevent reading invalid memory. Based on upstream patch.
    - CVE-2012-1139
  * SECURITY UPDATE: Denial of service via crafted PostScript font
    - debian/patches-freetype/CVE-2012-1140.patch: Fix off-by-one error in
      boundary checks. Based on upstream patch.
    - CVE-2012-1140
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1141.patch: Initialize field elements
      to prevent invalid read. Based on upstream patch.
    - CVE-2012-1141
  * SECURITY UPDATE: Denial of service via crafted Windows FNT/FON font
    - debian/patches-freetype/CVE-2012-1142.patch: Perform input sanitization
      on first and last character code fields. Based on upstream patch.
    - CVE-2012-1142
  * SECURITY UPDATE: Denial of service via crafted font
    - debian/patches-freetype/CVE-2012-1143.patch: Protect against divide by
      zero when dealing with 32 bit types. Based on upstream patch.
    - CVE-2012-1143
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted TrueType font
    - debian/patches-freetype/CVE-2012-1144.patch: Perform input sanitization
      on the first glyph outline point value. Based on upstream patch.
    - CVE-2012-1144
 -- Tyler Hicks <email address hidden>   Wed, 21 Mar 2012 19:57:51 -0500
Superseded in oneiric-updates on 2013-01-14
Superseded in oneiric-security on 2013-01-14
freetype (2.4.4-2ubuntu1.2) oneiric-security; urgency=low

  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1126.patch: Perform better input
      sanitization when parsing properties. Based on upstream patch.
    - CVE-2012-1126
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1127.patch: Perform better input
      sanitization when parsing glyphs. Based on upstream patch.
    - CVE-2012-1127
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1128.patch: Improve loop logic to avoid
      NULL pointer dereference. Based on upstream patch.
    - CVE-2012-1128
  * SECURITY UPDATE: Denial of service via crafted Type42 font
    - debian/patches-freetype/CVE-2012-1129.patch: Perform better input
      sanitization when parsing SFNT strings. Based on upstream patch.
    - CVE-2012-1129
  * SECURITY UPDATE: Denial of service via crafted PCF font
    - debian/patches-freetype/CVE-2012-1130.patch: Allocate enough memory to
      properly NULL-terminate parsed properties strings. Based on upstream
      patch.
    - CVE-2012-1130
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1131.patch: Use appropriate data type to
      prevent integer truncation on 64 bit systems when rendering fonts. Based
      on upstream patch.
    - CVE-2012-1131
  * SECURITY UPDATE: Denial of service via crafted Type1 font
    - debian/patches-freetype/CVE-2012-1132.patch: Ensure strings are of
      appropriate length when loading Type1 fonts. Based on upstream patch.
    - CVE-2012-1132
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1133.patch: Limit range of negative
      glyph encoding values to prevent invalid array indexes. Based on
      upstream patch.
    - CVE-2012-1133
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted Type1 font
    - debian/patches-freetype/CVE-2012-1134.patch: Enforce a minimum Type1
      private dictionary size to prevent writing past array bounds. Based on
      upstream patch.
    - CVE-2012-1134
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1135.patch: Perform proper bounds
      checks when interpreting TrueType bytecode. Based on upstream patch.
    - CVE-2012-1135
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted BDF font
    - debian/patches-freetype/CVE-2012-1136.patch: Ensure encoding field is
      defined when parsing glyphs. Based on upstream patch.
    - CVE-2012-1136
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1137.patch: Allocate sufficient number
      of array elements to prevent reading past array bounds. Based on
      upstream patch.
    - CVE-2012-1137
  * SECURITY UPDATE: Denial of service via crafted TrueType font
    - debian/patches-freetype/CVE-2012-1138.patch: Correct typo resulting in
      invalid read from wrong memory location. Based on upstream patch.
    - CVE-2012-1138
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1139.patch: Check array index values to
      prevent reading invalid memory. Based on upstream patch.
    - CVE-2012-1139
  * SECURITY UPDATE: Denial of service via crafted PostScript font
    - debian/patches-freetype/CVE-2012-1140.patch: Fix off-by-one error in
      boundary checks. Based on upstream patch.
    - CVE-2012-1140
  * SECURITY UPDATE: Denial of service via crafted BDF font
    - debian/patches-freetype/CVE-2012-1141.patch: Initialize field elements
      to prevent invalid read. Based on upstream patch.
    - CVE-2012-1141
  * SECURITY UPDATE: Denial of service via crafted Windows FNT/FON font
    - debian/patches-freetype/CVE-2012-1142.patch: Perform input sanitization
      on first and last character code fields. Based on upstream patch.
    - CVE-2012-1142
  * SECURITY UPDATE: Denial of service via crafted font
    - debian/patches-freetype/CVE-2012-1143.patch: Protect against divide by
      zero when dealing with 32 bit types. Based on upstream patch.
    - CVE-2012-1143
  * SECURITY UPDATE: Denial of service and arbitrary code execution via
    crafted TrueType font
    - debian/patches-freetype/CVE-2012-1144.patch: Perform input sanitization
      on the first glyph outline point value. Based on upstream patch.
    - CVE-2012-1144
 -- Tyler Hicks <email address hidden>   Wed, 21 Mar 2012 19:57:51 -0500
Superseded in precise-release on 2012-03-29
freetype (2.4.8-1) unstable; urgency=high

  * New upstream release
    - upstream fix for CVE-2011-3439.  Closes: #649122.
    - adjust libfreetype6.symbols for a newly-exported function.
 -- Tyler Hicks <email address hidden>   Fri,  18 Nov 2011 19:24:03 +0000

Available diffs

Superseded in hardy-updates on 2012-03-23
Superseded in hardy-security on 2012-03-23
freetype (2.3.5-1ubuntu4.8.04.7) hardy-security; urgency=low

  * SECURITY UPDATE: Arbitrary code execution via crafted Type 1 font
    - debian/patches-freetype/CVE-2011-3256.patch: Sanitize Type 1 font inputs
      in src/base/ftbitmap.c, src/psaux/t1decode.c, src/raster/ftrend1.c, and
      src/truetype/ttgxvar.c. Based on upstream patch.
    - CVE-2011-3256
  * SECURITY UPDATE: Arbitrary code execution via crafted CID-keyed PS font
    - debian/patches-freetype/CVE-2011-3439.patch: Sanitize CID-keyed
      PostScript font inputs in src/cid/cidload.c. Based on upstream patch.
    - CVE-2011-3439
 -- Tyler Hicks <email address hidden>   Thu, 17 Nov 2011 13:59:42 -0600
Superseded in lucid-updates on 2012-03-23
Superseded in lucid-security on 2012-03-23
freetype (2.3.11-1ubuntu2.5) lucid-security; urgency=low

  * SECURITY UPDATE: Arbitrary code execution via crafted Type 1 font
    - debian/patches-freetype/CVE-2011-3256.patch: Sanitize Type 1 font inputs
      in src/base/ftbitmap.c, src/psaux/t1decode.c, src/raster/ftrend1.c, and
      src/truetype/ttgxvar.c. Based on upstream patch.
    - CVE-2011-3256
  * SECURITY UPDATE: Arbitrary code execution via crafted CID-keyed PS font
    - debian/patches-freetype/CVE-2011-3439.patch: Sanitize CID-keyed
      PostScript font inputs in src/cid/cidload.c. Based on upstream patch.
    - CVE-2011-3439
 -- Tyler Hicks <email address hidden>   Thu, 17 Nov 2011 13:59:33 -0600
Superseded in maverick-updates on 2012-03-23
Superseded in maverick-security on 2012-03-23
freetype (2.4.2-2ubuntu0.3) maverick-security; urgency=low

  * SECURITY UPDATE: Arbitrary code execution via crafted Type 1 font
    - debian/patches-freetype/CVE-2011-3256.patch: Sanitize Type 1 font inputs
      in src/base/ftbitmap.c, src/psaux/t1decode.c, src/raster/ftrend1.c, and
      src/truetype/ttgxvar.c. Based on upstream patch.
    - CVE-2011-3256
  * SECURITY UPDATE: Arbitrary code execution via crafted CID-keyed PS font
    - debian/patches-freetype/CVE-2011-3439.patch: Sanitize CID-keyed
      PostScript font inputs in src/cid/cidload.c. Based on upstream patch.
    - CVE-2011-3439
 -- Tyler Hicks <email address hidden>   Thu, 17 Nov 2011 13:59:14 -0600
Superseded in natty-updates on 2012-03-23
Superseded in natty-security on 2012-03-23
freetype (2.4.4-1ubuntu2.2) natty-security; urgency=low

  * SECURITY UPDATE: Arbitrary code execution via crafted Type 1 font
    - debian/patches-freetype/CVE-2011-3256.patch: Sanitize Type 1 font inputs
      in src/base/ftbitmap.c, src/psaux/t1decode.c, src/raster/ftrend1.c, and
      src/truetype/ttgxvar.c. Based on upstream patch.
    - CVE-2011-3256
  * SECURITY UPDATE: Arbitrary code execution via crafted CID-keyed PS font
    - debian/patches-freetype/CVE-2011-3439.patch: Sanitize CID-keyed
      PostScript font inputs in src/cid/cidload.c. Based on upstream patch.
    - CVE-2011-3439
 -- Tyler Hicks <email address hidden>   Thu, 17 Nov 2011 13:58:59 -0600
Superseded in oneiric-updates on 2012-03-23
Superseded in oneiric-security on 2012-03-23
freetype (2.4.4-2ubuntu1.1) oneiric-security; urgency=low

  * SECURITY UPDATE: Arbitrary code execution via crafted Type 1 font
    - debian/patches-freetype/CVE-2011-3256.patch: Sanitize Type 1 font inputs
      in src/base/ftbitmap.c, src/psaux/t1decode.c, src/raster/ftrend1.c, and
      src/truetype/ttgxvar.c. Based on upstream patch.
    - CVE-2011-3256
  * SECURITY UPDATE: Arbitrary code execution via crafted CID-keyed PS font
    - debian/patches-freetype/CVE-2011-3439.patch: Sanitize CID-keyed
      PostScript font inputs in src/cid/cidload.c. Based on upstream patch.
    - CVE-2011-3439
 -- Tyler Hicks <email address hidden>   Thu, 17 Nov 2011 13:58:36 -0600
Superseded in precise-release on 2011-11-18
freetype (2.4.7-2) unstable; urgency=low


  * Use dpkg-buildflags through debhelper.
  * Don't set -Werror in CFLAGS on alpha or m68k, to work around a compiler
    bug.  Closes: #646334.

 -- Steve Langasek <email address hidden>  Mon, 24 Oct 2011 22:02:32 +0000
Superseded in precise-release on 2011-10-26
freetype (2.4.7-1) unstable; urgency=low


  * New upstream release
    - upstream fix for CVE-2011-3256.  Closes: #646120.
    - drop debian/patches-freetype/0001-Fix-Savannah-bug-33992.patch,
      included upstream.
  * Pass --without-bzip2 to configure, to avoid unwanted dependency on
    libbz2.  Closes: #639638.
  * Standards-Version 3.9.2.

 -- Steve Langasek <email address hidden>  Sat, 22 Oct 2011 20:18:59 +0000
Superseded in precise-release on 2011-10-24
freetype (2.4.6-2) unstable; urgency=low


  * debian/patches-freetype/0001-Fix-Savannah-bug-33992.patch: [PATCH]
    Fix Savannah bug #33992.  Thanks to David Bevan
    <email address hidden>.  Closes: #638348.

 -- Steve Langasek <email address hidden>  Sat, 20 Aug 2011 06:30:18 +0000
Superseded in precise-release on 2011-10-21
Published in oneiric-release on 2011-08-08
freetype (2.4.4-2ubuntu1) oneiric; urgency=low

  * SECURITY UPDATE: arbitrary code execution via crafted Type 1 font
    - debian/patches-freetype/CVE-2011-0226.patch: check for proper
      signedness in src/psaux/t1decode.c.
    - CVE-2011-0226
  * debian/rules: fix FTBFS with gcc 4.6 by adding
    -Wno-unused-but-set-variable to CFLAGS to downgrade it to a warning.
 -- Marc Deslauriers <email address hidden>   Mon, 08 Aug 2011 08:13:07 -0400

Available diffs

Superseded in natty-updates on 2011-11-18
Superseded in natty-security on 2011-11-18
freetype (2.4.4-1ubuntu2.1) natty-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution via crafted Type 1 font
    - debian/patches-freetype/CVE-2011-0226.patch: check for proper
      signedness in src/psaux/t1decode.c.
    - CVE-2011-0226
 -- Marc Deslauriers <email address hidden>   Thu, 21 Jul 2011 13:59:37 -0400
Superseded in maverick-updates on 2011-11-18
Superseded in maverick-security on 2011-11-18
freetype (2.4.2-2ubuntu0.2) maverick-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution via crafted Type 1 font
    - debian/patches-freetype/CVE-2011-0226.patch: check for proper
      signedness in src/psaux/t1decode.c.
    - CVE-2011-0226
 -- Marc Deslauriers <email address hidden>   Thu, 21 Jul 2011 14:02:47 -0400
Superseded in oneiric-release on 2011-08-08
freetype (2.4.4-2) unstable; urgency=low

  * Build for multiarch, using debhelper compat 9.
  * Add Pre-Depends: ${misc:Pre-Depends} to pick up multiarch-support
    dependency.
 -- Steve Langasek <email address hidden>   Thu,  23 Jun 2011 05:57:18 +0000

Available diffs

Superseded in oneiric-release on 2011-06-23
Obsolete in natty-release on 2013-06-04
freetype (2.4.4-1ubuntu2) natty; urgency=low

  * No-change rebuild against fixed pkgbinarymangler, to get correct
    multiarch-safe changelogs
 -- Steve Langasek <email address hidden>   Tue, 22 Mar 2011 05:50:45 +0000

Available diffs

Superseded in natty-release on 2011-03-22
freetype (2.4.4-1ubuntu1) natty; urgency=low

  * FFe LP: #733501.
  * Build for multiarch, using debhelper compat 9.
  * Add Pre-Depends: ${misc:Pre-Depends} to pick up multiarch-support
    dependency.
 -- Steve Langasek <email address hidden>   Thu, 17 Mar 2011 18:19:59 -0700

Available diffs

Superseded in natty-release on 2011-03-18
freetype (2.4.4-1) unstable; urgency=low

  * Acknowledge security NMU - thanks, Moritz!
  * New upstream release, closes: #606286, #600321
    - fixes PDF rendering issues.  Closes: #612484, LP: #709229.
    - fixes a rendering issue with 'S' glyphs in certain fonts.
      LP: #654010.
    - drop patches for CVE-2010-3855 and CVE-2010-3814, applied upstream.
    - drop patch ft2demos-2.1.7-ftbench.patch; doesn't apply cleanly, the
      code has changed significantly, patch never forwarded upstream.  If
      this is still an issue, someone will provide a fixed patch.
    - drop patch ft2demos-grkey.patch, fixed upstream.
  * debian/patches-freetype/enable-gxvalid-otvalid.patch: enable the
    otvalid and gxvalid table validation modules.  Thanks to Paul Wise
    <email address hidden>.  Closes: #520879, LP: #239626.
  * debian/libfreetype6.symbols: update the symbols file for the same.
  * debian/rules et al.: convert to dh 7
  * drop INSTALL.* from the libfreetype6-dev docs.  Closes: #550971.
  * move homepage out of debian/copyright and into debian/control.
  * fix GPL link to point to GPL-2 explicitly.
  * clean up long-obsolete conflicts/replaces.
  * drop debian/README.quilt, redundant with debian/README.source.
  * drop debian/README.Debian, which talks about the long-finished transition
    from freetype1.
  * strip dependency_libs out of /usr/lib/libfreetype.la.
  * bump standards-version to 3.9.1.
 -- Steve Langasek <email address hidden>   Mon, 21 Feb 2011 14:10:46 -0800

Available diffs

Superseded in natty-release on 2011-02-21
freetype (2.4.2-2.1) unstable; urgency=medium

  * Non-maintainer upload by the Security Team.
  * Fix CVE-2010-3855 and CVE-2010-3814 (Closes: #602221)
 -- Artur Rona <email address hidden>   Wed,  24 Nov 2010 11:43:49 +0000
Superseded in natty-release on 2010-11-24
Superseded in maverick-updates on 2011-07-25
Superseded in maverick-security on 2011-07-25
freetype (2.4.2-2ubuntu0.1) maverick-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via
    improper error handling of SHZ bytecode instruction
    - debian/patches/CVE-2010-3814.patch: add bounds check to
      src/truetype/ttinterp.c.
    - CVE-2010-3814
  * SECURITY UPDATE: denial of service and possible code execution via
    TrueType GX font
    - debian/patches/CVE-2010-3855.patch: add bounds checks to
      src/truetype/ttgxvar.c.
    - CVE-2010-3855
 -- Marc Deslauriers <email address hidden>   Tue, 02 Nov 2010 14:20:42 -0400
Superseded in lucid-updates on 2011-11-18
Superseded in lucid-security on 2011-11-18
freetype (2.3.11-1ubuntu2.4) lucid-security; urgency=low

  * SECURITY UPDATE: denial of service and possible arbitrary code
    execution via libXft overflow.
    - debian/patches/CVE-2010-3311.patch: correctly validate position in
      src/base/ftstream.c.
    - CVE-2010-3311
  * SECURITY UPDATE: denial of service and possible code execution via
    improper error handling of SHZ bytecode instruction
    - debian/patches/CVE-2010-3814.patch: add bounds check to
      src/truetype/ttinterp.c.
    - CVE-2010-3814
  * SECURITY UPDATE: denial of service and possible code execution via
    TrueType GX font
    - debian/patches/CVE-2010-3855.patch: add bounds checks to
      src/truetype/ttgxvar.c.
    - CVE-2010-3855
 -- Marc Deslauriers <email address hidden>   Tue, 02 Nov 2010 14:38:53 -0400
Obsolete in karmic-updates on 2013-03-04
Obsolete in karmic-security on 2013-03-04
freetype (2.3.9-5ubuntu0.4) karmic-security; urgency=low

  * SECURITY UPDATE: denial of service and possible arbitrary code
    execution via libXft overflow.
    - debian/patches/CVE-2010-3311.patch: correctly validate position in
      src/base/ftstream.c.
    - CVE-2010-3311
  * SECURITY UPDATE: denial of service and possible code execution via
    improper error handling of SHZ bytecode instruction
    - debian/patches/CVE-2010-3814.patch: add bounds check to
      src/truetype/ttinterp.c.
    - CVE-2010-3814
  * SECURITY UPDATE: denial of service and possible code execution via
    TrueType GX font
    - debian/patches/CVE-2010-3855.patch: add bounds checks to
      src/truetype/ttgxvar.c.
    - CVE-2010-3855
 -- Marc Deslauriers <email address hidden>   Tue, 02 Nov 2010 14:54:40 -0400
Superseded in hardy-updates on 2011-11-18
Superseded in hardy-security on 2011-11-18
freetype (2.3.5-1ubuntu4.8.04.6) hardy-security; urgency=low

  * SECURITY UPDATE: denial of service and possible arbitrary code
    execution via libXft overflow.
    - debian/patches/CVE-2010-3311.patch: correctly validate position in
      src/base/ftstream.c.
    - CVE-2010-3311
  * SECURITY UPDATE: denial of service and possible code execution via
    improper error handling of SHZ bytecode instruction
    - debian/patches/CVE-2010-3814.patch: add bounds check to
      src/truetype/ttinterp.c.
    - CVE-2010-3814
  * SECURITY UPDATE: denial of service and possible code execution via
    TrueType GX font
    - debian/patches/CVE-2010-3855.patch: add bounds checks to
      src/truetype/ttgxvar.c.
    - CVE-2010-3855
 -- Marc Deslauriers <email address hidden>   Tue, 02 Nov 2010 15:01:15 -0400
Obsolete in dapper-updates on 2011-09-06
Obsolete in dapper-security on 2011-09-06
freetype (2.1.10-1ubuntu2.10) dapper-security; urgency=low

  * SECURITY UPDATE: denial of service and possible arbitrary code
    execution via libXft overflow.
    - debian/patches/425-CVE-2010-3311.patch: correctly validate position
      in src/base/ftstream.c.
    - CVE-2010-3311
  * SECURITY UPDATE: denial of service and possible code execution via
    TrueType GX font
    - debian/patches/426-CVE-2010-3855.patch: add bounds checks to
      src/truetype/ttgxvar.c.
    - CVE-2010-3855
 -- Marc Deslauriers <email address hidden>   Tue, 02 Nov 2010 15:17:07 -0400
Superseded in natty-release on 2010-11-15
Obsolete in maverick-release on 2013-03-05
freetype (2.4.2-2) unstable; urgency=low

  * debian/patches-ft2demos/f2tdemos-grkey.patch: update to fix another
    problem when building under gcc-4.5 that was overlooked in the previous
    version of the patch.  LP: #624740.
 -- Steve Langasek <email address hidden>   Wed,  08 Sep 2010 07:45:46 +0100

Available diffs

Superseded in maverick-release on 2010-09-08
freetype (2.4.2-1) unstable; urgency=high

  * New upstream release
    - High urgency upload for RC security bugfix.
    - Corrects a stack overflow in the interpreter for CFF fonts
      (CVE-2010-1797).  Closes: #592399.
    - drop debian/patches-freetype/opentype-missing-glyphs, included
      upstream.
  * Update libfreetype6.symbols for two new functions.
 -- Steve Langasek <email address hidden>   Mon,  16 Aug 2010 05:46:05 +0100

Available diffs

Superseded in dapper-updates on 2010-11-04
Superseded in dapper-security on 2010-11-04
freetype (2.1.10-1ubuntu2.8) dapper-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in CFF Type2 CharStrings interpreter (LP: #617019)
    - debian/patches/418-CVE-2010-1797.patch: check number of operands
      in src/cff/cffgload.c.
    - CVE-2010-1797
  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in the ftmulti demo program (LP: #617019)
    - debian/patches/424-CVE-2010-2541.patch: use strncat and adjust
      sizes in src/ftmulti.c.
    - CVE-2010-2541
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches/419-CVE-2010-2805.patch: fix calculation in
      src/base/ftstream.c.
    - CVE-2010-2805
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches/420-CVE-2010-2806.patch: check string sizes in
      src/type42/t42parse.c.
    - CVE-2010-2806
  * SECURITY UPDATE: possible arbitrary code execution via improper type
    comparisons (LP: #617019)
    - debian/patches/421-CVE-2010-2807.patch: perform better bounds
      checking in src/smooth/ftsmooth.c, src/truetype/ttinterp.*.
    - CVE-2010-2807
  * SECURITY UPDATE: possible arbitrary code execution via memory
    corruption in Adobe Type 1 Mac Font File (LWFN) fonts (LP: #617019)
    - debian/patches/422-CVE-2010-2808.patch: check rlen in
      src/base/ftobjs.c.
    - CVE-2010-2808
  * SECURITY UPDATE: denial of service via bdf font (LP: #617019)
    - debian/patches/423-bug30135.patch: don't modify value in static
      string in src/bdf/bdflib.c.
 -- Marc Deslauriers <email address hidden>   Fri, 13 Aug 2010 10:55:35 -0400
Superseded in hardy-updates on 2010-11-04
Superseded in hardy-security on 2010-11-04
freetype (2.3.5-1ubuntu4.8.04.4) hardy-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in CFF Type2 CharStrings interpreter (LP: #617019)
    - debian/patches-freetype/CVE-2010-1797.patch: check number of operands
      in src/cff/cffgload.c.
    - CVE-2010-1797
  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in the ftmulti demo program (LP: #617019)
    - debian/patches-ft2demos/CVE-2010-2541.patch: use strncat and adjust
      sizes in src/ftmulti.c.
    - CVE-2010-2541
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches-freetype/CVE-2010-2805.patch: fix calculation in
      src/base/ftstream.c.
    - CVE-2010-2805
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches-freetype/CVE-2010-2806.patch: check string sizes in
      src/type42/t42parse.c.
    - CVE-2010-2806
  * SECURITY UPDATE: possible arbitrary code execution via improper type
    comparisons (LP: #617019)
    - debian/patches-freetype/CVE-2010-2807.patch: perform better bounds
      checking in src/smooth/ftsmooth.c, src/truetype/ttinterp.*.
    - CVE-2010-2807
  * SECURITY UPDATE: possible arbitrary code execution via memory
    corruption in Adobe Type 1 Mac Font File (LWFN) fonts (LP: #617019)
    - debian/patches-freetype/CVE-2010-2808.patch: check rlen in
      src/base/ftobjs.c.
    - CVE-2010-2808
  * SECURITY UPDATE: denial of service via bdf font (LP: #617019)
    - debian/patches-freetype/bug30135.patch: don't modify value in static
      string in src/bdf/bdflib.c.
 -- Marc Deslauriers <email address hidden>   Fri, 13 Aug 2010 10:35:08 -0400
Obsolete in jaunty-updates on 2013-02-28
Obsolete in jaunty-security on 2013-02-28
freetype (2.3.9-4ubuntu0.3) jaunty-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in CFF Type2 CharStrings interpreter (LP: #617019)
    - debian/patches-freetype/CVE-2010-1797.patch: check number of operands
      in src/cff/cffgload.c.
    - CVE-2010-1797
  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in the ftmulti demo program (LP: #617019)
    - debian/patches-ft2demos/CVE-2010-2541.patch: use strncat and adjust
      sizes in src/ftmulti.c.
    - CVE-2010-2541
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches-freetype/CVE-2010-2805.patch: fix calculation in
      src/base/ftstream.c.
    - CVE-2010-2805
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches-freetype/CVE-2010-2806.patch: check string sizes in
      src/type42/t42parse.c.
    - CVE-2010-2806
  * SECURITY UPDATE: possible arbitrary code execution via improper type
    comparisons (LP: #617019)
    - debian/patches-freetype/CVE-2010-2807.patch: perform better bounds
      checking in src/smooth/ftsmooth.c, src/truetype/ttinterp.*.
    - CVE-2010-2807
  * SECURITY UPDATE: possible arbitrary code execution via memory
    corruption in Adobe Type 1 Mac Font File (LWFN) fonts (LP: #617019)
    - debian/patches-freetype/CVE-2010-2808.patch: check rlen in
      src/base/ftobjs.c.
    - CVE-2010-2808
  * SECURITY UPDATE: denial of service via bdf font (LP: #617019)
    - debian/patches-freetype/bug30135.patch: don't modify value in static
      string in src/bdf/bdflib.c.
  * SECURITY UPDATE: denial of service via nested "seac" calls
    - debian/patches-freetype/nested-seac.patch: handle nested calls
      correctly in include/freetype/internal/psaux.h, src/cff/cffgload.c,
      src/cff/cffgload.h, src/psaux/t1decode.c.
 -- Marc Deslauriers <email address hidden>   Fri, 13 Aug 2010 10:23:02 -0400
Superseded in karmic-updates on 2010-11-04
Superseded in karmic-security on 2010-11-04
freetype (2.3.9-5ubuntu0.2) karmic-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in CFF Type2 CharStrings interpreter (LP: #617019)
    - debian/patches-freetype/CVE-2010-1797.patch: check number of operands
      in src/cff/cffgload.c.
    - CVE-2010-1797
  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in the ftmulti demo program (LP: #617019)
    - debian/patches-ft2demos/CVE-2010-2541.patch: use strncat and adjust
      sizes in src/ftmulti.c.
    - CVE-2010-2541
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches-freetype/CVE-2010-2805.patch: fix calculation in
      src/base/ftstream.c.
    - CVE-2010-2805
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches-freetype/CVE-2010-2806.patch: check string sizes in
      src/type42/t42parse.c.
    - CVE-2010-2806
  * SECURITY UPDATE: possible arbitrary code execution via improper type
    comparisons (LP: #617019)
    - debian/patches-freetype/CVE-2010-2807.patch: perform better bounds
      checking in src/smooth/ftsmooth.c, src/truetype/ttinterp.*.
    - CVE-2010-2807
  * SECURITY UPDATE: possible arbitrary code execution via memory
    corruption in Adobe Type 1 Mac Font File (LWFN) fonts (LP: #617019)
    - debian/patches-freetype/CVE-2010-2808.patch: check rlen in
      src/base/ftobjs.c.
    - CVE-2010-2808
  * SECURITY UPDATE: denial of service via bdf font (LP: #617019)
    - debian/patches-freetype/bug30135.patch: don't modify value in static
      string in src/bdf/bdflib.c.
  * SECURITY UPDATE: denial of service via nested "seac" calls
    - debian/patches-freetype/nested-seac.patch: handle nested calls
      correctly in include/freetype/internal/psaux.h, src/cff/cffgload.c,
      src/cff/cffgload.h, src/psaux/t1decode.c.
 -- Marc Deslauriers <email address hidden>   Fri, 13 Aug 2010 10:05:35 -0400
Superseded in lucid-updates on 2010-11-04
Superseded in lucid-security on 2010-11-04
freetype (2.3.11-1ubuntu2.2) lucid-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in CFF Type2 CharStrings interpreter (LP: #617019)
    - debian/patches-freetype/CVE-2010-1797.patch: check number of operands
      in src/cff/cffgload.c.
    - CVE-2010-1797
  * SECURITY UPDATE: possible arbitrary code execution via buffer overflow
    in the ftmulti demo program (LP: #617019)
    - debian/patches-ft2demos/CVE-2010-2541.patch: use strncat and adjust
      sizes in src/ftmulti.c.
    - CVE-2010-2541
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches-freetype/CVE-2010-2805.patch: fix calculation in
      src/base/ftstream.c.
    - CVE-2010-2805
  * SECURITY UPDATE: possible arbitrary code execution via improper bounds
    checking (LP: #617019)
    - debian/patches-freetype/CVE-2010-2806.patch: check string sizes in
      src/type42/t42parse.c.
    - CVE-2010-2806
  * SECURITY UPDATE: possible arbitrary code execution via improper type
    comparisons (LP: #617019)
    - debian/patches-freetype/CVE-2010-2807.patch: perform better bounds
      checking in src/smooth/ftsmooth.c, src/truetype/ttinterp.*.
    - CVE-2010-2807
  * SECURITY UPDATE: possible arbitrary code execution via memory
    corruption in Adobe Type 1 Mac Font File (LWFN) fonts (LP: #617019)
    - debian/patches-freetype/CVE-2010-2808.patch: check rlen in
      src/base/ftobjs.c.
    - CVE-2010-2808
  * SECURITY UPDATE: denial of service via bdf font (LP: #617019)
    - debian/patches-freetype/bug30135.patch: don't modify value in static
      string in src/bdf/bdflib.c.
 -- Marc Deslauriers <email address hidden>   Fri, 13 Aug 2010 08:26:33 -0400
Superseded in maverick-release on 2010-08-16
freetype (2.4.0-2) unstable; urgency=medium

  * debian/patches-freetype/opentype-missing-glyphs: fix from upstream for
    glyphs from OpenType fonts failing to render.  Closes: #589256,
    LP: #605858.
  * Medium-urgency upload to fix important regression.
 -- Steve Langasek <email address hidden>   Fri,  16 Jul 2010 22:53:17 +0100

Available diffs

Superseded in dapper-updates on 2010-08-17
Superseded in dapper-security on 2010-08-17
freetype (2.1.10-1ubuntu2.7) dapper-security; urgency=low

  * SECURITY UPDATE: denial of service and possible arbitrary code
    execution via invalid free
    - debian/patches/412-CVE-2010-2498.patch: validate number of points in
      src/pshinter/pshalgo.c.
    - CVE-2010-2498
  * SECURITY UPDATE: arbitrary code execution via buffer overflow
    - debian/patches/413-CVE-2010-2499.patch: check positions and return
      code in src/base/ftobjs.c.
    - CVE-2010-2499
  * SECURITY UPDATE: arbitrary code execution via integer overflow
    - debian/patches/414-CVE-2010-2500.patch: switch to unsigned in
      src/smooth/ftgrays.c, check signed width and height in
      src/smooth/ftsmooth.c.
    - CVE-2010-2500
  * SECURITY UPDATE: arbitrary code execution via heap buffer overflow
    - debian/patches/415-CVE-2010-2519.patch: correctly calculate length in
      src/base/ftobjs.c.
    - CVE-2010-2519
  * SECURITY UPDATE: arbitrary code execution via invalid realloc
    - debian/patches/416-CVE-2010-2520.patch: perform bounds checking in
      src/truetype/ttinterp.c.
    - CVE-2010-2520
  * SECURITY UPDATE: arbitrary code execution via buffer overflows
    - debian/patches/417-CVE-2010-2527.patch: change buffer sizes in
      src/{ftmulti,ftstring,ftview}.c.
    - CVE-2010-2527
 -- Marc Deslauriers <email address hidden>   Thu, 15 Jul 2010 13:00:49 -0400
Superseded in hardy-updates on 2010-08-17
Superseded in hardy-security on 2010-08-17
freetype (2.3.5-1ubuntu4.8.04.3) hardy-security; urgency=low

  * SECURITY UPDATE: denial of service and possible arbitrary code
    execution via invalid free
    - debian/patches/CVE-2010-2498.patch: validate number of points in
      src/pshinter/pshalgo.c.
    - CVE-2010-2498
  * SECURITY UPDATE: arbitrary code execution via buffer overflow
    - debian/patches/CVE-2010-2499.patch: check positions and return code
      in src/base/ftobjs.c.
    - CVE-2010-2499
  * SECURITY UPDATE: arbitrary code execution via integer overflow
    - debian/patches/CVE-2010-2500.patch: switch to unsigned in
      src/smooth/ftgrays.c, check signed width and height in
      src/smooth/ftsmooth.c.
    - CVE-2010-2500
  * SECURITY UPDATE: arbitrary code execution via heap buffer overflow
    - debian/patches/CVE-2010-2519.patch: correctly calculate length in
      src/base/ftobjs.c.
    - CVE-2010-2519
  * SECURITY UPDATE: arbitrary code execution via invalid realloc
    - debian/patches/CVE-2010-2520.patch: perform bounds checking in
      src/truetype/ttinterp.c.
    - CVE-2010-2520
  * SECURITY UPDATE: arbitrary code execution via buffer overflows
    - debian/patches/CVE-2010-2527.patch: change buffer sizes in
      src/{ftdiff,ftgrid,ftmulti,ftstring,ftview}.c.
    - CVE-2010-2527
 -- Marc Deslauriers <email address hidden>   Thu, 15 Jul 2010 10:47:33 -0400
Superseded in jaunty-updates on 2010-08-17
Superseded in jaunty-security on 2010-08-17
freetype (2.3.9-4ubuntu0.2) jaunty-security; urgency=low

  * SECURITY UPDATE: denial of service and possible arbitrary code
    execution via invalid free
    - debian/patches/CVE-2010-2498.patch: validate number of points in
      src/pshinter/pshalgo.c.
    - CVE-2010-2498
  * SECURITY UPDATE: arbitrary code execution via buffer overflow
    - debian/patches/CVE-2010-2499.patch: check positions and return code
      in src/base/ftobjs.c.
    - CVE-2010-2499
  * SECURITY UPDATE: arbitrary code execution via integer overflow
    - debian/patches/CVE-2010-2500.patch: switch to unsigned in
      src/smooth/ftgrays.c, check signed width and height in
      src/smooth/ftsmooth.c.
    - CVE-2010-2500
  * SECURITY UPDATE: arbitrary code execution via heap buffer overflow
    - debian/patches/CVE-2010-2519.patch: correctly calculate length in
      src/base/ftobjs.c.
    - CVE-2010-2519
  * SECURITY UPDATE: arbitrary code execution via invalid realloc
    - debian/patches/CVE-2010-2520.patch: perform bounds checking in
      src/truetype/ttinterp.c.
    - CVE-2010-2520
  * SECURITY UPDATE: arbitrary code execution via buffer overflows
    - debian/patches/CVE-2010-2527.patch: change buffer sizes in
      src/{ftdiff,ftgrid,ftmulti,ftstring,ftview}.c.
    - CVE-2010-2527
 -- Marc Deslauriers <email address hidden>   Thu, 15 Jul 2010 10:25:42 -0400
Superseded in karmic-updates on 2010-08-17
Superseded in karmic-security on 2010-08-17
freetype (2.3.9-5ubuntu0.1) karmic-security; urgency=low

  * SECURITY UPDATE: denial of service and possible arbitrary code
    execution via invalid free
    - debian/patches/CVE-2010-2498.patch: validate number of points in
      src/pshinter/pshalgo.c.
    - CVE-2010-2498
  * SECURITY UPDATE: arbitrary code execution via buffer overflow
    - debian/patches/CVE-2010-2499.patch: check positions and return code
      in src/base/ftobjs.c.
    - CVE-2010-2499
  * SECURITY UPDATE: arbitrary code execution via integer overflow
    - debian/patches/CVE-2010-2500.patch: switch to unsigned in
      src/smooth/ftgrays.c, check signed width and height in
      src/smooth/ftsmooth.c.
    - CVE-2010-2500
  * SECURITY UPDATE: arbitrary code execution via heap buffer overflow
    - debian/patches/CVE-2010-2519.patch: correctly calculate length in
      src/base/ftobjs.c.
    - CVE-2010-2519
  * SECURITY UPDATE: arbitrary code execution via invalid realloc
    - debian/patches/CVE-2010-2520.patch: perform bounds checking in
      src/truetype/ttinterp.c.
    - CVE-2010-2520
  * SECURITY UPDATE: arbitrary code execution via buffer overflows
    - debian/patches/CVE-2010-2527.patch: change buffer sizes in
      src/{ftdiff,ftgrid,ftmulti,ftstring,ftview}.c.
    - CVE-2010-2527
 -- Marc Deslauriers <email address hidden>   Thu, 15 Jul 2010 09:32:35 -0400
Superseded in lucid-updates on 2010-08-17
Superseded in lucid-security on 2010-08-17
freetype (2.3.11-1ubuntu2.1) lucid-security; urgency=low

  * SECURITY UPDATE: denial of service and possible arbitrary code
    execution via invalid free
    - debian/patches/CVE-2010-2498.patch: validate number of points in
      src/pshinter/pshalgo.c.
    - CVE-2010-2498
  * SECURITY UPDATE: arbitrary code execution via buffer overflow
    - debian/patches/CVE-2010-2499.patch: check positions and return code
      in src/base/ftobjs.c.
    - CVE-2010-2499
  * SECURITY UPDATE: arbitrary code execution via integer overflow
    - debian/patches/CVE-2010-2500.patch: switch to unsigned in
      src/smooth/ftgrays.c, check signed width and height in
      src/smooth/ftsmooth.c.
    - CVE-2010-2500
  * SECURITY UPDATE: arbitrary code execution via heap buffer overflow
    - debian/patches/CVE-2010-2519.patch: correctly calculate length in
      src/base/ftobjs.c.
    - CVE-2010-2519
  * SECURITY UPDATE: arbitrary code execution via invalid realloc
    - debian/patches/CVE-2010-2520.patch: perform bounds checking in
      src/truetype/ttinterp.c.
    - CVE-2010-2520
  * SECURITY UPDATE: arbitrary code execution via buffer overflows
    - debian/patches/CVE-2010-2527.patch: change buffer sizes in
      src/{ftdiff,ftgrid,ftmulti,ftstring,ftview}.c.
    - CVE-2010-2527
 -- Marc Deslauriers <email address hidden>   Thu, 15 Jul 2010 08:46:19 -0400
Superseded in maverick-release on 2010-07-17
freetype (2.4.0-1) unstable; urgency=high

  * New upstream release (closes: #572576).
    - fixes CVE-2010-2497, CVE-2010-2498, CVE-2010-2499, CVE-2010-2500,
      CVE-2010-2519, and CVE-2010-2520
    - high-urgency upload for security bugfixes.
    - drop debian/patches-freetype/freetype-bytecode-interpreter.patch and
      debian/patches-freetype/enable-full-bytecode-interpreter - the
      bytecode interpreter is now enabled by default upstream at last!
    - drop debian/patches-freetype/freetype-bdflib-large-encodings.patch and
      debian/patches-freetype/uninitialized-vars.patch, applied upstream.
    - drop debian/patches-freetype/331-hmtx-no-shorts.diff, implemented
      differently upstream.
    - new symbol FT_Library_SetLcdFilterWeights added to the symbols table,
      bump the shlibs.
    - fixes problem with outlines for some OpenType fonts.  Closes; #583868.
  * Add a debian/watch file - though we won't use it internally due to the
    multiple tarball issues.
  * Begin to simplify debian/rules a little by trimming dead code.
  * Don't set SHELL = /bin/bash in debian/rules, no bashisms found in
    the current package.
  * debian/patches/ft2demos-grkey.patch: don't point grKEY() at an enum when
    it's being passed values that aren't defined in that enum, fixing a build
    failure with gcc 4.5.  Thanks to Brian M. Carlson for the preliminary
    patch.  Closes: #564989.
  * docs/PATENTS no longer exists, so we don't install it.
  * Add ${misc:Depends} substitutions to all packages, per lintian.
  * Standards-Version to 3.8.4, no changes required.
  * Clarify in debian/copyright that freetype can be used under GPLv2 or
    later.
 -- Steve Langasek <email address hidden>   Wed,  14 Jul 2010 15:48:55 +0100

Available diffs

Superseded in maverick-release on 2010-07-14
Published in lucid-release on 2009-12-01
freetype (2.3.11-1ubuntu2) lucid; urgency=low

  * Revert last change. I really did have a FTBFS that "looked" like this
    was the cause, but it's actually something else that dropped it's
    dependency on libfreetype6-dev.
 -- Mario Limonciello <email address hidden>   Tue, 01 Dec 2009 02:25:21 -0600

Available diffs

Superseded in lucid-release on 2009-12-01
freetype (2.3.11-1ubuntu1) lucid; urgency=low

  * debian/libfreetype6.files:
    - Correct an extra period that was placed causing other packages to
      FTBFS when linking against freetype.
 -- Mario Limonciello <email address hidden>   Sun, 29 Nov 2009 23:30:35 -0600

Available diffs

Superseded in lucid-release on 2009-11-30
freetype (2.3.11-1) unstable; urgency=low

  * New upstream release
    - drop debian/patches-freetype/proper-armel-asm-declaration.patch and
      debian/patches-freetype/CVE-2009-0946.patch, applied upstream.
    - new symbol tt_cmap13_class_rec added to the symbols table, bump the
      shlibs.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Thu,  05 Nov 2009 05:58:41 +0000

Available diffs

Superseded in lucid-release on 2009-11-05
Obsolete in karmic-release on 2013-03-04
freetype (2.3.9-5) unstable; urgency=low

  * Pass proper --host/--build args to ./configure, to support
    cross-building.  Closes: #465292.
  * clean up a number of unused variables in debian/rules; maybe someday
    we'll get this package to converge on debhelper 7... :)
  * Fix the doc-base section for libfreetype6-dev.  Closes: #315845.
  * Remove one final reference to /usr/X11R6 in debian/rules.
  * Drop incorrect Replaces: freetype0, freetype1
  * Add debian/README.source, documenting the madness that is this source
    package.
  * Standards-Version to 3.8.0.
  * Fix multiple integer overflows leading to arbitrary code execution
    or DoS (CVE-2009-0946; Closes: #524925).  Thanks to Nico Golde for the
    NMU.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Thu,  04 Jun 2009 05:47:39 +0100

Available diffs

Superseded in karmic-release on 2009-06-04
freetype (2.3.9-4.1) unstable; urgency=high

  * Non-maintainer upload by the Security Team.
  * Fix multiple integer overflows leading to arbitrary code execution
    or DoS (CVE-2009-0946; Closes: #524925).

 -- Ubuntu Archive Auto-Sync <email address hidden>   Tue,  28 Apr 2009 23:04:48 +0100

Available diffs

Superseded in jaunty-updates on 2010-07-20
Superseded in jaunty-security on 2010-07-20
freetype (2.3.9-4ubuntu0.1) jaunty-security; urgency=low

  * SECURITY UPDATE: possible code execution via multiple integer overflows
    - debian/patches-freetype/security-CVE-2009-0946.patch: validate sid
      values in src/cff/cffload.c, check state->prefix in src/lzw/ftzopen.c,
      don't overflow int with table + length or ndp + numMappings * 4 in
      src/sfnt/ttcmap.c, validate glyph width and height in
      src/smooth/ftsmooth.c.
    - CVE-2009-0946

 -- Marc Deslauriers <email address hidden>   Wed, 22 Apr 2009 09:16:27 -0400
Superseded in hardy-updates on 2010-07-20
Superseded in hardy-security on 2010-07-20
freetype (2.3.5-1ubuntu4.8.04.2) hardy-security; urgency=low

  * SECURITY UPDATE: possible code execution via multiple integer overflows
    - debian/patches-freetype/security-CVE-2009-0946.patch: validate sid
      values in src/cff/cffload.c, check state->prefix in src/lzw/ftzopen.c,
      don't overflow int with table + length in src/sfnt/ttcmap.c, validate
      glyph width and height in src/smooth/ftsmooth.c.
    - CVE-2009-0946

 -- Marc Deslauriers <email address hidden>   Wed, 22 Apr 2009 10:02:21 -0400
Superseded in dapper-updates on 2010-07-20
Superseded in dapper-security on 2010-07-20
freetype (2.1.10-1ubuntu2.6) dapper-security; urgency=low

  * SECURITY UPDATE: possible code execution via multiple integer overflows
    - debian/patches/411-CVE-2009-0946.patch: validate sid values in
      src/cff/cffload.c, don't overflow int with table + length in
      src/sfnt/ttcmap.c, validate glyph width and height in
      src/smooth/ftsmooth.c.
    - CVE-2009-0946

 -- Marc Deslauriers <email address hidden>   Wed, 22 Apr 2009 10:37:05 -0400
Obsolete in intrepid-updates on 2013-02-20
Obsolete in intrepid-security on 2013-02-20
freetype (2.3.7-2ubuntu1.1) intrepid-security; urgency=low

  * SECURITY UPDATE: possible code execution via multiple integer overflows
    - debian/patches-freetype/security-CVE-2009-0946.patch: validate sid
      values in src/cff/cffload.c, check state->prefix in src/lzw/ftzopen.c,
      don't overflow int with table + length or ndp + numMappings * 4 in
      src/sfnt/ttcmap.c, validate glyph width and height in
      src/smooth/ftsmooth.c.
    - CVE-2009-0946

 -- Marc Deslauriers <email address hidden>   Wed, 22 Apr 2009 09:41:39 -0400
Superseded in karmic-release on 2009-04-28
Obsolete in jaunty-release on 2013-02-28
freetype (2.3.9-4build1) jaunty; urgency=low

  * No-change rebuild to fix lpia shared library dependencies.

 -- Colin Watson <email address hidden>   Thu, 19 Mar 2009 01:58:27 +0000

Available diffs

Superseded in jaunty-release on 2009-03-19
freetype (2.3.9-4) unstable; urgency=low

  * debian/patches-ft2demos/compiler-hardening-fixes.patch: always check the
    return value of fread(), to appease hardened compilers such as what's
    used in Ubuntu by default.  Set a good example, even if these demos
    shouldn't be security-sensitive!  Also, along the way catch and fix a
    small memory leak on error. :)
  * debian/patches-freetype/proper-armel-asm-declaration.patch: use __asm__
    for declaring assembly instead of asm, fixing a build failure on armel.

 -- Steve Langasek <email address hidden>   Sat, 14 Mar 2009 14:35:23 -0700

Available diffs

Superseded in jaunty-release on 2009-03-14
freetype (2.3.9-3) unstable; urgency=low

  * Drop spurious Suggests: on libfreetype6-dev.  Closes: #363937.
  * debian/patches-freetype/enable-subpixel-rendering.patch: enable subpixel
    rendering features, used by libcairo and xft to provide LCD colour
    filtering.  This is considered no more or less evil than the bytecode
    interpreter which we also enable.
  * Move debian/libfreetype6.copyright to debian/copyright, and selectively
    install it to the single binary package in debian/rules; the same
    copyright file is used for all the binaries anyway via symlinks, so
    there's no reason it shouldn't ship as debian/copyright.
    Closes: #381228.
  * Clip redundant LICENSE.TXT and GPL.TXT files from the
    libfreetype6-dev package.  Closes: #459802.

Available diffs

Superseded in hardy-updates on 2009-04-27
Superseded in hardy-security on 2009-04-27
freetype (2.3.5-1ubuntu4.8.04.1) hardy-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution via integer overflows.
  * Add debian/patches-freetype/CVE-2008-1806_7_8.patch: upstream fixes
    thanks to Steffen Joeris.
  * References
    CVE-2008-1806 CVE-2008-1807 CVE-2008-1808

 -- Kees Cook <email address hidden>   Wed, 10 Sep 2008 16:15:54 -0700
Obsolete in gutsy-updates on 2011-09-16
Obsolete in gutsy-security on 2011-09-16
freetype (2.3.5-1ubuntu4.7.10.1) gutsy-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution via integer overflows.
  * Add debian/patches-freetype/CVE-2008-1806_7_8.patch: upstream fixes
    thanks to Steffen Joeris.
  * References
    CVE-2008-1806 CVE-2008-1807 CVE-2008-1808

 -- Kees Cook <email address hidden>   Wed, 10 Sep 2008 16:28:22 -0700
Obsolete in feisty-updates on 2009-08-20
Obsolete in feisty-security on 2009-08-20
freetype (2.2.1-5ubuntu1.2) feisty-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution via integer overflows.
  * Add debian/patches-freetype/CVE-2008-1806_7_8.patch: upstream fixes
    thanks to Steffen Joeris.
  * References
    CVE-2008-1806 CVE-2008-1807 CVE-2008-1808

 -- Kees Cook <email address hidden>   Wed, 10 Sep 2008 16:29:25 -0700
175 of 107 results