-
libxfont (1:1.5.1-1ubuntu0.16.04.4) xenial-security; urgency=medium
* SECURITY UPDATE: non-privileged arbitrary file access
- debian/patches/CVE-2017-16611.patch: open files with O_NOFOLLOW in
src/fontfile/dirfile.c, src/fontfile/fileio.c.
- CVE-2017-16611
-- Marc Deslauriers <email address hidden> Tue, 28 Nov 2017 14:46:50 -0500
-
libxfont (1:1.5.1-1ubuntu0.16.04.3) xenial-security; urgency=medium
* SECURITY UPDATE: invalid memory read in PatternMatch
- debian/patches/CVE-2017-13720.patch: check for end of string in
src/fontfile/fontdir.c.
- CVE-2017-13720
* SECURITY UPDATE: DoS or info leak via malformed PCF file
- debian/patches/CVE-2017-13722.patch: check string boundaries in
src/bitmap/pcfread.c.
- CVE-2017-13722
-- Marc Deslauriers <email address hidden> Fri, 06 Oct 2017 11:44:24 -0400
-
libxfont (1:1.5.1-1ubuntu0.16.04.2) xenial; urgency=medium
* Install developer documentation under the correct path. (LP:
#1709885)
-- Timo Aaltonen <email address hidden> Fri, 11 Aug 2017 01:16:51 +0300
-
libxfont (1:1.5.1-1ubuntu0.16.04.1) xenial; urgency=medium
* Rename libxfont-dev to libxfont1-dev. (LP: #1687981)
-- Timo Aaltonen <email address hidden> Sat, 13 May 2017 08:01:15 +0300
-
libxfont (1:1.5.1-1) unstable; urgency=high
* New upstream release
+ bdfReadProperties: property count needs range check [CVE-2015-1802]
+ bdfReadCharacters: bailout if a char's bitmap cannot be read
[CVE-2015-1803]
+ bdfReadCharacters: ensure metrics fit into xCharInfo struct
[CVE-2015-1804]
-- Julien Cristau <email address hidden> Tue, 17 Mar 2015 16:55:21 +0100