[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[BSA-078] Security Update for freetype



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

I uploaded new packages for freetype which fixed the
following security problems:

CVE-2012-5668: NULL Pointer Dereference in bdf_free_font.
CVE-2012-5669: Out-of-bounds read in _bdf_parse_glyphs.
CVE-2012-5670: Out-of-bounds write in _bdf_parse_glyphs.

For the squeeze-backports distribution the problems have been fixed in
version 2.4.9-1.1~bpo60+1.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=687O
-----END PGP SIGNATURE-----

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


Reply to: