freetype (2.3.5-1ubuntu4.8.04.10) hardy-security; urgency=low

  * SECURITY UPDATE: denial of service and possible code execution via NULL
    pointer dereference
    - debian/patches-freetype/CVE-2012-5668.patch: reset props_size in case
      of allocation error in src/bdf/bdflib.c.
    - CVE-2012-5668
  * SECURITY UPDATE: denial of service and possible code execution via heap
    buffer over-read in BDF parsing
    - debian/patches-freetype/CVE-2012-5669.patch: use correct array size
      in src/bdf/bdflib.c.
    - CVE-2012-5669

Date: 2013-01-11 20:30:28.974596+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
Signed-By: Ubuntu Archive Robot 
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/hardy/+source/freetype/2.3.5-1ubuntu4.8.04.10
Sorry, changesfile not available.
-- 
Hardy-changes mailing list
Hardy-changes@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/hardy-changes

Reply via email to