Control: tag -1 -moreinfo
Control: retitle -1 bookworm-pu: package freetype/2.12.1+dfsg-5+deb12u3
Hi Jonathan,
On Sun, 11 Feb 2024 at 01:40, Jonathan Wiltshire wrote:
>
> On Sat, Feb 10, 2024 at 12:23:06AM +1100, Hugh McMaster wrote:
> > When is the next point release scheduled for?
Hi Jonathan,
On Wed, 7 Feb 2024 at 04:47, Jonathan Wiltshire wrote:
> What's your plan at this point? We have skipped this update in two point
> releases now and it needs a resolution.
Thanks for following up. I’d actually forgotten about this.
I’d still like to disable the incomplete and
+1000
@@ -1,3 +1,10 @@
+freetype (2.12.1+dfsg-5+deb12u2) bookworm; urgency=high
+
+ * debian/patches: Temporarily revert disable_COLRv1.patch to allow
+Chromium to start (Closes: #1053142).
+
+ -- Hugh McMaster Fri, 29 Sep 2023 22:27:32 +1000
+
freetype (2.12.1+dfsg-5+deb12u1) bookworm
On Thu, 28 Sep 2023 at 21:44, Hugh McMaster wrote:
> Hi Andres,
>
> On Thu, 28 Sept 2023 at 18:49, Andres Salomon wrote:
> >
> > Control: affects -1 chromium
> >
> >
> > On Thu, 28 Sep 2023 01:24:00 +0900 SuperCat wrote:
> > > Hi,
> > >
Hi Andres,
On Thu, 28 Sept 2023 at 18:49, Andres Salomon wrote:
>
> Control: affects -1 chromium
>
>
> On Thu, 28 Sep 2023 01:24:00 +0900 SuperCat wrote:
> > Hi,
> >
> > In chromium source code, function SkScalerContext::GlyphMetrics
> > SkScalerContext_FreeType::generateMetrics() will call
> >
Control: tags -1 -moreinfo
Hi Adam,
On Sun, 24 Sept 2023 at 05:53, Adam D. Barratt wrote:
>
> Control: tags -1 moreinfo
>
> On Fri, 2023-09-22 at 22:16 +1000, Hugh McMaster wrote:
> > FreeType 2.12.1 shipped with experimental COLRv1 support enabled.
> > Th
was unintentionally enabled
+by upstream in this version of FreeType (Closes: #1051816).
+
+ -- Hugh McMaster Fri, 22 Sep 2023 21:48:19 +1000
+
freetype (2.12.1+dfsg-5) unstable; urgency=medium
* debian/patches: Add a patch to fix CVE-2023-2004 (Closes: #1034612).
diff -Nru freetype
Control: tags -1 - moreinfo
Hi Sebastian,
On Sun, 25 Jun 2023 at 20:01, Sebastian Ramacher wrote:
>
> Control: tags -1 moreinfo
>
> Hi
>
> On 2023-06-25 16:14:39 +1000, Hugh McMaster wrote:
> > Package: release.debian.org
> > Severity: normal
> > User: re
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
X-Debbugs-Cc: tclo...@packages.debian.org
Control: affects -1 + src:tclodbc
nmu tclodbc_2.5.1-2+b1 . ANY . unstable . -m "Rebuild against libodbc2 and
libodbcinst2."
+Replaces against odbcinst1debian1
+ (Closes: #1037172).
+ * unixodbc-common: Remove obsolete conffile (Closes: #1009152).
+
+ -- Hugh McMaster Thu, 15 Jun 2023 21:05:33 +1000
+
unixodbc (2.3.11-2) unstable; urgency=medium
* debian/control: Update Standards-Version to 4.6.1 (no changes
/patches: Add a patch to fix CVE-2023-2004 (Closes: #1034612).
+- Integer overflow in tt_hvadvance_adjust().
+
+ -- Hugh McMaster Thu, 20 Apr 2023 21:08:03 +1000
+
freetype (2.12.1+dfsg-4) unstable; urgency=medium
[ Debian Janitor ]
diff -Nru freetype-2.12.1+dfsg/debian/patches/CVE-2023
face_index.
+- CVE-2022-27406: segmentation violation via FT_Request_Size() when
+ attempting to read the value of an unguarded face size handle.
+
+ -- Hugh McMaster Thu, 28 Apr 2022 21:11:36 +1000
+
freetype (2.9.1-3+deb10u2) buster-security; urgency=high
* Non-maintainer upload
violation via ft_open_face_internal() when
+ attempting to read the value of FT_LONG face_index.
+- CVE-2022-27406: segmentation violation via FT_Request_Size() when
+ attempting to read the value of an unguarded face size handle.
+
+ -- Hugh McMaster Thu, 28 Apr 2022 19:54:23 +1000
Hi Sebastian,
On Wed, 3 Nov 2021 at 10:24, Sebastian Ramacher wrote:
>
> Why do the binary packages have Breaks + Replaces on binary packages
> with the old SONAME?
Some files are split from existing packages:
* unixodbc-common takes over some files from odbcinst and odbcinst1debian2.
*
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Due to various changes, unixodbc's libraries, libodbc, libodbccr and libodbccr
have a new soversion.
Test results after rebuilding all reverse dependencies and reverse-build
overflow in exif_entry_get_value() (CVE-2020-0182).
+- Fix an unsigned integer overflow in libexif/exif-data.c (CVE-2020-0198)
+ (Closes: #962345).
+
+ -- Hugh McMaster Wed, 24 Jun 2020 23:31:09 +1000
+
libexif (0.6.21-5.1+deb10u3) buster; urgency=medium
* Add upstream patches to fix
Hi Cyril,
On Sat, 27 Jul 2019 at 8:40 pm, Cyril Brulebois wrote:
> Adam D. Barratt (2019-07-26):
> > As freetype produces a udeb, this will need an ack from the d-i
> > release manager, so CCing and tagging appropriately.
>
> I'll need some time to get that tested properly.
How are you
Control: retitle -1 stretch-pu: package freetype/2.6.3-3.2+deb9u1
Updated debdiff, now with correct update version.
freetype-2.6.3-3.2+deb9u1.debdiff
Description: Binary data
18 matches
Mail list logo