* SECURITY UPDATE: uninitialized memory reads (LP: #1449225)
- debian/patches-freetype/savannah-bug-41309.patch: fix use of
uninitialized data in src/cid/cidload.c, src/psaux/psobjs.c,
src/type1/t1load.c, src/type42/t42parse.c.
- No CVE number
* SECURITY UPDATE: denial of service via infinite loop in parse_encode
(LP: #1492124)
- debian/patches-freetype/savannah-bug-41590.patch: protect against
invalid charcode in src/type1/t1load.c.
- No CVE number
This bug was fixed in the package freetype - 2.5.2-1ubuntu2.5
---------------
freetype (2.5.2-1ubuntu2.5) trusty-security; urgency=medium
* SECURITY UPDATE: uninitialized memory reads (LP: #1449225) patches- freetype/ savannah-bug-41309.patch: fix use of type1/t1load. c, src/type42/ t42parse. c. patches- freetype/ savannah-bug-41590.patch: protect against
- debian/
uninitialized data in src/cid/cidload.c, src/psaux/psobjs.c,
src/
- No CVE number
* SECURITY UPDATE: denial of service via infinite loop in parse_encode
(LP: #1492124)
- debian/
invalid charcode in src/type1/t1load.c.
- No CVE number
-- Marc Deslauriers <email address hidden> Thu, 10 Sep 2015 07:09:04 -0400