Change logs for freetype source package in Wily

  • freetype (2.5.2-4ubuntu2) wily; urgency=medium
    
      * SECURITY UPDATE: denial of service via infinite loop in parse_encode
        (LP: #1492124)
        - debian/patches-freetype/savannah-bug-41590.patch: protect against
          invalid charcode in src/type1/t1load.c.
        - No CVE number
    
     -- Marc Deslauriers <email address hidden>  Thu, 10 Sep 2015 07:05:53 -0400
  • freetype (2.5.2-4ubuntu1) wily; urgency=medium
    
      * Merge from Debian unstable, remaining changes:
        - debian/patches-freetype/revert_scalable_fonts_metric.patch:
          revert commit "Fix metrics on size request for scalable fonts.",
          which breaks gtk underlining markups
        - Make libfreetype6-dev M-A: same.
        - Error out on the use of the freetype-config --libtool option.
        - Don't add multiarch libdirs for freetype-config --libs.
        - Install the freetype2/config headers into the multiarch include path
          and provide symlinks in /usr/include.
        - debian/patches-freetype/multi-thread-violations.patch: fix
          multithread violations
      * Dropped changes, included in Debian:
        - debian/patches-freetype/CVE-2014-96xx/*
      * debian/patches-freetype/savannah-bug-41309.patch: fix use of
        uninitialized data. (LP: #1449225)
    
    freetype (2.5.2-4) unstable; urgency=medium
    
      * Fix Savannah bug #43774. Closes #780143.
      * Release 2.5.2-4
    
    freetype (2.5.2-3) unstable; urgency=medium
    
      * Fix Savannah bug #43535. CVE-2014-9675
      * [bdf] Fix Savannah bug #41692. CVE-2014-9675-fixup-1
      * src/base/ftobj.c (Mac_Read_POST_Resource): Additional overflow check
        in the summation of POST fragment lengths. CVE-2014-0674-part-2
      * src/base/ftobjs.c (Mac_Read_POST_Resource): Insert comments and fold
        too long tracing messages. CVS-2014-9674-fixup-2
      * src/base/ftobjs.c (Mac_Read_POST_Resource): Use unsigned long variables to read the lengths in POST fragments. CVE-2014-9674-fixup-1
      * Fix Savannah bug #43538. CVE-2014-9674-part-1
      * Fix Savannah bug #43539. CVE-2014-9673
      * src/base/ftobjs.c (Mac_Read_POST_Resource): Avoid memory leak by
        a broken POST table in resource-fork. CVE-2014-9673-fixup
      * Fix Savannah bug #43540. CVE-2014-9672
      * Fix Savannah bug #43547. CVE-2014-9671
      * Fix Savannah bug #43548. CVE-2014-9670
      * [sfnt] Fix Savannah bug #43588. CVE-2014-9669
      * [sfnt] Fix Savannah bug #43589. CVE-2014-9668
      * [sfnt] Fix Savannah bug #43590. CVE-2014-9667
      * [sfnt] Fix Savannah bug #43591. CVE-2014-9666
      * Change some fields in `FT_Bitmap' to unsigned type. CVE-2014-9665
      * Fix uninitialized variable warning. CVE-2014-9665-fixup-2
      * Make `FT_Bitmap_Convert' correctly handle negative `pitch' values.
        CVE-2014-9665-fixup
      * [type1, type42] Fix Savannah bug #43655. CVE-2014-9664
      * [sfnt] Fix Savannah bug #43656. CVE-2014-9663
      * [cff] Fix Savannah bug #43658. CVE-2014-9662
      * [type42] Allow only embedded TrueType fonts. CVE-2014-9661
      * [bdf] Fix Savannah bug #43660. CVE-2014-9660
      * [cff] Fix Savannah bug #43661. CVE-2014-9659
      * [sfnt] Fix Savannah bug #43672. CVE-2014-9658
      * [truetype] Fix Savannah bug #43679. CVE-2014-9657
      * [sfnt] Fix Savannah bug #43680. CVE-2014-9656
      * All CVEs patched. Closes: #777656.
    
     -- Marc Deslauriers <email address hidden>  Fri, 22 May 2015 11:03:23 -0400
  • freetype (2.5.2-2ubuntu3) vivid; urgency=medium
    
      * SECURITY UPDATE: denial of service and possible code execution via
        multiple security issues
        - debian/patches-freetype/CVE-2014-96xx/*.patch: backport a large
          quantity of upstream commits to fix multiple security issues.
        - CVE-2014-9656
        - CVE-2014-9657
        - CVE-2014-9658
        - CVE-2014-9659
        - CVE-2014-9660
        - CVE-2014-9661
        - CVE-2014-9662
        - CVE-2014-9663
        - CVE-2014-9664
        - CVE-2014-9665
        - CVE-2014-9666
        - CVE-2014-9667
        - CVE-2014-9668
        - CVE-2014-9669
        - CVE-2014-9670
        - CVE-2014-9671
        - CVE-2014-9672
        - CVE-2014-9673
        - CVE-2014-9674
        - CVE-2014-9675
     -- Marc Deslauriers <email address hidden>   Tue, 24 Feb 2015 11:28:03 -0500