Change logs for freetype source package in Breezy

  • freetype (2.1.7-2.4ubuntu1.3) breezy-security; urgency=low
    
      * SECURITY UPDATE: arbitrary code execution via integer overflows.
      * Add debian/patches/404-bdf-integer.patch from upstream changes.
      * References
        CVE-2007-1351
    
     -- Kees Cook <email address hidden>   Mon,  2 Apr 2007 15:53:16 -0700
  • freetype (2.1.7-2.4ubuntu1.2) breezy-security; urgency=low
    
      * SECURITY UPDATE: Arbitrary code execution and DoS with crafted font files.
      * Add debian/patches/403-pcf-strlen.patch:
        - src/pcf/pcfread.c: Detect invalid string lengths.
        - CVE-2006-3467
    
     -- Martin Pitt <email address hidden>   Wed, 26 Jul 2006 10:53:25 +0000
  • freetype (2.1.7-2.4ubuntu1.1) breezy-security; urgency=low
    
      * SECURITY UPDATE: Arbitrary code execution and DoS with crafted font files.
      * Add debian/patches/401-odd_blue_num-safe_alloc.patch:
        - src/pshinter/pshglob.c: Prevent integer underflow with malformed fonts
          which have an odd number of blue values (these are broken according to
          the specs). [CVE-2006-0747]
        - src/base/ftutil.c: Fail with an 'invalid argument' error on negative
          allocations, just to make double sure. [CVE-2006-2661]
        - Patches taken from upstream CVS.
      * Add debian/patches/402-int-overflows.patch:
        - Various int overflow protections. [CVE-2006-1861, CVE-2006-2493]
        - Patches taken from upstream CVS.
      * Many thanks to Josh Bressers for extracting the patches!
    
     -- Martin Pitt <email address hidden>   Fri,  2 Jun 2006 13:56:03 +0000
  • freetype (2.1.7-2.4ubuntu1) breezy; urgency=low
    
    
      * Slightly relax the header check on Type1 fonts, enabling wider display of
        PDFs, et al; based on a change to FreeType CVS (closes: Ubuntu#10087).
    
     -- Daniel Stone <email address hidden>  Thu, 12 May 2005 12:41:38 +1000