[ubuntu/vivid-proposed] freetype 2.5.2-2ubuntu3 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Tue Feb 24 16:46:13 UTC 2015
freetype (2.5.2-2ubuntu3) vivid; urgency=medium
* SECURITY UPDATE: denial of service and possible code execution via
multiple security issues
- debian/patches-freetype/CVE-2014-96xx/*.patch: backport a large
quantity of upstream commits to fix multiple security issues.
- CVE-2014-9656
- CVE-2014-9657
- CVE-2014-9658
- CVE-2014-9659
- CVE-2014-9660
- CVE-2014-9661
- CVE-2014-9662
- CVE-2014-9663
- CVE-2014-9664
- CVE-2014-9665
- CVE-2014-9666
- CVE-2014-9667
- CVE-2014-9668
- CVE-2014-9669
- CVE-2014-9670
- CVE-2014-9671
- CVE-2014-9672
- CVE-2014-9673
- CVE-2014-9674
- CVE-2014-9675
Date: Tue, 24 Feb 2015 11:28:03 -0500
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/freetype/2.5.2-2ubuntu3
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 24 Feb 2015 11:28:03 -0500
Source: freetype
Binary: libfreetype6 libfreetype6-dev freetype2-demos libfreetype6-udeb
Architecture: source
Version: 2.5.2-2ubuntu3
Distribution: vivid
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
freetype2-demos - FreeType 2 demonstration programs
libfreetype6 - FreeType 2 font engine, shared library files
libfreetype6-dev - FreeType 2 font engine, development files
libfreetype6-udeb - FreeType 2 font engine for the debian-installer (udeb)
Changes:
freetype (2.5.2-2ubuntu3) vivid; urgency=medium
.
* SECURITY UPDATE: denial of service and possible code execution via
multiple security issues
- debian/patches-freetype/CVE-2014-96xx/*.patch: backport a large
quantity of upstream commits to fix multiple security issues.
- CVE-2014-9656
- CVE-2014-9657
- CVE-2014-9658
- CVE-2014-9659
- CVE-2014-9660
- CVE-2014-9661
- CVE-2014-9662
- CVE-2014-9663
- CVE-2014-9664
- CVE-2014-9665
- CVE-2014-9666
- CVE-2014-9667
- CVE-2014-9668
- CVE-2014-9669
- CVE-2014-9670
- CVE-2014-9671
- CVE-2014-9672
- CVE-2014-9673
- CVE-2014-9674
- CVE-2014-9675
Checksums-Sha1:
7a8a478d098d0cb8e3c588ec0cccadf62112caf3 2193 freetype_2.5.2-2ubuntu3.dsc
c500a676e2a823075822978a7ffb774038aa287e 84393 freetype_2.5.2-2ubuntu3.diff.gz
Checksums-Sha256:
4629befb00caf73a75695bc4c2d668be76606bb0aed1cd9c120d048372a8ca28 2193 freetype_2.5.2-2ubuntu3.dsc
c3339de7774da82b7f41727e22ef97954c47e984b509294d41bf0cf1462b40dd 84393 freetype_2.5.2-2ubuntu3.diff.gz
Files:
35e53be5699e70561e0a29f5cea6ceab 2193 libs optional freetype_2.5.2-2ubuntu3.dsc
2bc6a04308b88c08b154672e9a975a4c 84393 libs optional freetype_2.5.2-2ubuntu3.diff.gz
Original-Maintainer: Steve Langasek <vorlon at debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCgAGBQJU7KogAAoJEGVp2FWnRL6TNaUP/iqo80QOJqiKKLETUcj1nur9
ScQhAg/1yakzBN4hMxDkTXPoiBF1isSPzG+HKaeNk+lEmo87/hGoMKlz3pcc+xiJ
jrrQswR5Jz4vTNMoN5CP5y/O21CNzNN39Kp+6bafkacgRUCQC40gV2EzOmHu47rm
EzFZsoH6UejVcb8QPYUdRJLfwRXhKgQ6zarK61KNm9xNZgW312L9/OWPx0OiNVBD
XAAUiNKMhYUzZCyvV9GJqCjXNW+btrtnbt2hMJ66OVNuapjvVn5evn7tjHMYauon
53hHjmIDtS3xz82brU1eDDnFOAZFnztsNmlEfwwq2rTh8Z8dcdN/Mc1AvJ0Fgv8X
avkTQgUzBQB5f2h2sKx4CWYSuarnuVCK12bmdCo0Uk2mrthOntvo5xv3aOleib6B
ByUgY4tOtRe5hGTkGXWwAKWlf+zQ8rNbAYp2rXwzimuLPhWlyR6oCq9z/sCl2ZUC
tZ7Go0ykOTKwZ1hoCTqQgpyYbI7KJYdeoeeVNlRgfH49OA3eiZjf1A7DfumDfHw2
aH0CSO9L4T20XTuKUYlBjEWaH/SexvJvc4zOWix4jmuYbFi1irEL7nkY3DO5Dge2
B4gFfeU5cLYeYcXlkZ8tizQqnTSZNjwXS2EU4Hjt5qP56dzmR6qj74HzjlQ/vRyz
K/UAQzHd/Sa1JvcPv+gP
=ymd3
-----END PGP SIGNATURE-----
More information about the Vivid-changes
mailing list