freetype (2.4.8-1ubuntu2.7) precise-security; urgency=medium

  * SECURITY UPDATE: heap-based buffer over-read
    - debian/patches-freetype/CVE-2015-9381.patch: check
      if 'eexec' doesn't exceed 'limit' in src/type1/t1parse.c
    - CVE-2015-9381
  * SECURITY UPDATE: buffer over-read
    - debian/patches-freetype/CVE-2015-9382.patch: ensure that
      the cursor position doesn't get larger than the current limit
      in src/psaux/psobjs.c.
    - CVE-2015-9382
  * SECURITY UPDATE: heap-based buffer over-read
    - debian/patches-freetype/CVE-2015-9383.patch: check
      limit before accessing 'numRanges' and numMappings in
      src/sfnt/ttcmap.c.
    - CVE-2015-9383

Date: 2019-09-06 15:05:32.743768+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Steve Langasek <steve.langa...@canonical.com>
https://launchpad.net/ubuntu/+source/freetype/2.4.8-1ubuntu2.7
Sorry, changesfile not available.
-- 
Precise-changes mailing list
Precise-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/precise-changes

Reply via email to