UbuntuUpdates.org

Package "freetype"

Name: freetype

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • FreeType 2 font engine, shared library files
  • FreeType 2 font engine, development files

Latest version: 2.4.8-1ubuntu2.7
Release: precise (12.04)
Level: updates
Repository: main

Links



Other versions of "freetype" in Precise

Repository Area Version
base main 2.4.8-1ubuntu2
base universe 2.4.8-1ubuntu2
security universe 2.4.8-1ubuntu2.7
security main 2.4.8-1ubuntu2.7
updates universe 2.4.8-1ubuntu2.7

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.4.8-1ubuntu2.7 2021-05-03 15:06:26 UTC

  freetype (2.4.8-1ubuntu2.7) precise-security; urgency=medium

  * SECURITY UPDATE: heap-based buffer over-read
    - debian/patches-freetype/CVE-2015-9381.patch: check
      if 'eexec' doesn't exceed 'limit' in src/type1/t1parse.c
    - CVE-2015-9381
  * SECURITY UPDATE: buffer over-read
    - debian/patches-freetype/CVE-2015-9382.patch: ensure that
      the cursor position doesn't get larger than the current limit
      in src/psaux/psobjs.c.
    - CVE-2015-9382
  * SECURITY UPDATE: heap-based buffer over-read
    - debian/patches-freetype/CVE-2015-9383.patch: check
      limit before accessing 'numRanges' and numMappings in
      src/sfnt/ttcmap.c.
    - CVE-2015-9383

 -- <email address hidden> (Leonidas S. Barbosa) Fri, 06 Sep 2019 11:05:06 -0300

Source diff to previous version
CVE-2015-9381 FreeType before 2.6.1 has a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c.
CVE-2015-9382 FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face
CVE-2015-9383 FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.

Version: 2.4.8-1ubuntu2.6 2017-05-16 23:06:29 UTC

  freetype (2.4.8-1ubuntu2.6) precise-security; urgency=medium

  [ Marc Deslauriers ]
  * SECURITY UPDATE: out-of-bounds write in t1_decoder_parse_charstrings
    - debian/patches-freetype/CVE-2017-8105.patch: add a check to
      src/psaux/t1decode.c.
    - CVE-2017-8105
  * SECURITY UPDATE: out-of-bounds write in t1_builder_close_contour
    - debian/patches-freetype/CVE-2017-8287.patch: add a check to
      src/psaux/psobjs.c.
    - CVE-2017-8287

 -- Emily Ratliff <email address hidden> Mon, 15 May 2017 20:31:15 -0500

Source diff to previous version
CVE-2017-8105 FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function i
CVE-2017-8287 FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in ps

Version: 2.4.8-1ubuntu2.5 2017-04-21 02:07:13 UTC

  freetype (2.4.8-1ubuntu2.5) precise-security; urgency=medium

  * SECURITY UPDATE: heap based buffer overflow in cff_parser_run()
    - debian/patches-freetype/CVE-2016-10328.patch: add additional check
      to parser stack size in src/cff/cffparse.c
    - CVE-2016-10328

 -- Steve Beattie <email address hidden> Tue, 18 Apr 2017 14:35:42 -0700

Source diff to previous version
CVE-2016-1032 Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to

Version: 2.4.8-1ubuntu2.4 2017-03-20 19:06:53 UTC

  freetype (2.4.8-1ubuntu2.4) precise-security; urgency=medium

  * SECURITY UPDATE: DoS and possible code execution via missing glyph name
    - debian/patches/CVE-2016-10244.patch: add check to src/type1/t1load.c.
    - CVE-2016-10244

 -- Marc Deslauriers <email address hidden> Thu, 16 Mar 2017 13:42:14 -0400

Source diff to previous version
CVE-2016-1024 Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to

Version: 2.4.8-1ubuntu2.3 2015-09-10 19:06:35 UTC

  freetype (2.4.8-1ubuntu2.3) precise-security; urgency=medium

  * SECURITY UPDATE: uninitialized memory reads (LP: #1449225)
    - debian/patches-freetype/savannah-bug-41309.patch: fix use of
      uninitialized data in src/cid/cidload.c, src/psaux/psobjs.c,
      src/type1/t1load.c, src/type42/t42parse.c.
    - No CVE number
  * SECURITY UPDATE: denial of service via infinite loop in parse_encode
    (LP: #1492124)
    - debian/patches-freetype/savannah-bug-41590.patch: protect against
      invalid charcode in src/type1/t1load.c.
    - No CVE number

 -- Marc Deslauriers Thu, 10 Sep 2015 07:10:41 -0400

1449225 Backport #41309 ( 8b281f83e ) to fix use of uninitialized data.
1492124 infinite loop in parse_encoding (t1load.c)



About   -   Send Feedback to @ubuntu_updates