-
freetype (2.4.12-0ubuntu1.1) saucy-security; urgency=medium
* SECURITY UPDATE: denial of service and possible code execution in
CFF rasterizer
- debian/patches-freetype/CVE-2014-2240.patch: validate hintMask in
src/cff/cf2hints.c.
- CVE-2014-2240
* SECURITY UPDATE: denial of service in CFF rasterizer
- debian/patches-freetype/CVE-2014-2241.patch: don't trigger asserts in
src/cff/cf2ft.c.
- CVE-2014-2241
-- Marc Deslauriers <email address hidden> Thu, 13 Mar 2014 12:52:16 -0400
-
freetype (2.4.12-0ubuntu1) saucy; urgency=low
* New upstream version (lp: #1179523)
* debian/patches-freetype/git_unitialized_variable.patch,
debian/patches-ft2demos/init_variables.patch:
- fix an unitialized variable warnings which were breaking the build
* debian/libfreetype6.symbols: updated
-- Sebastien Bacher <email address hidden> Mon, 13 May 2013 13:12:42 +0200
-
freetype (2.4.11-0ubuntu1) raring; urgency=low
* New upstream version
* debian/patches-freetype/CVE-2012-5668.patch,
debian/patches-freetype/CVE-2012-5669.patch,
debian/patches-freetype/CVE-2012-5670.patch:
- dropped, those fixes are in the new version
* debian/patches-ft2demos/compiler_hardening_fixes.patch:
- changed unsigned char* to char* to fix "pointer targets in assignment
differ in signedness" build error
* debian/libfreetype6.symbols: updated for the new version
-- Sebastien Bacher <email address hidden> Fri, 08 Feb 2013 12:50:09 +0100