freetype-devel-2.3.11-19.el6_10.i686
[364 KiB] |
Changelog
by Marek Kasik (2019-12-04):
- Fix potential buffer overflow
- Resolves: #1767863
|
freetype-devel-2.3.11-17.el6.i686
[364 KiB] |
Changelog
by Felipe Borges (2015-12-15):
- Fix computation of size of rasterization buffer
- Resolves: #1154625
|
freetype-devel-2.3.11-15.el6_6.1.i686
[364 KiB] |
Changelog
by Marek Kasik (2015-03-04):
- Fixes CVE-2014-9657
- Check minimum size of `record_size'.
- Fixes CVE-2014-9658
- Use correct value for minimum table length test.
- Fixes CVE-2014-9675
- New macro that checks one character more than `strncmp'.
- Fixes CVE-2014-9660
- Check `_BDF_GLYPH_BITS'.
- Fixes CVE-2014-9661
- Initialize `face->ttf_size'.
- Always set `face->ttf_size' directly.
- Exclusively use the `truetype' font driver for loading
the font contained in the `sfnts' array.
- Fixes CVE-2014-9663
- Fix order of validity tests.
- Fixes CVE-2014-9664
- Add another boundary testing.
- Fix boundary testing.
- Fixes CVE-2014-9667
- Protect against addition overflow.
- Fixes CVE-2014-9669
- Protect against overflow in additions and multiplications.
- Fixes CVE-2014-9670
- Add sanity checks for row and column values.
- Fixes CVE-2014-9671
- Check `size' and `offset' values.
- Fixes CVE-2014-9673
- Fix integer overflow by a broken POST table in resource-fork.
- Fixes CVE-2014-9674
- Fix integer overflow by a broken POST table in resource-fork.
- Additional overflow check in the summation of POST fragment lengths.
- Work around behaviour of X11's `pcfWriteFont' and `pcfReadFont' functions
- Resolves: #1197737
|
freetype-devel-2.3.11-14.el6_3.1.i686
[363 KiB] |
Changelog
by Marek Kasik (2013-01-24):
- Fix CVE-2012-5669
(Use correct array size for checking `glyph_enc')
- Resolves: #903542
|
freetype-devel-2.3.11-6.el6_2.9.i686
[363 KiB] |
Changelog
by Marek Kasik (2012-04-03):
- Fix CVE-2012-{1126, 1127, 1130, 1131, 1132, 1134, 1136,
1137, 1139, 1140, 1141, 1142, 1143, 1144}
- Properly initialize array "result" in
FT_Outline_Get_Orientation()
- Check bytes per row for overflow in _bdf_parse_glyphs()
- Resolves: #806268
|
freetype-devel-2.3.11-6.el6_1.8.i686
[362 KiB] |
Changelog
by Marek Kasik (2011-11-15):
- Add freetype-2.3.11-CVE-2011-3439.patch
(Various loading fixes.)
- Resolves: #754011
|
freetype-devel-2.3.11-6.el6_1.7.i686
[362 KiB] |
Changelog
by Marek Kasik (2011-10-21):
- Add freetype-2.3.11-CVE-2011-3256.patch
(Handle some border cases.)
- Resolves: #747083
|
freetype-devel-2.3.11-6.el6_1.6.i686
[362 KiB] |
Changelog
by Marek Kasik (2011-07-20):
- A little change in configure part
- Resolves: #723467
|
freetype-devel-2.3.11-6.el6_0.2.i686
[361 KiB] |
Changelog
by Marek Kasik (2010-11-10):
- Add freetype-2.3.11-CVE-2010-3855.patch
(Protect against invalid `runcnt' values.)
- Resolves: #651761
|
freetype-devel-2.3.11-6.el6_0.1.i686
[361 KiB] |
Changelog
by Marek Kasik (2010-09-30):
- Add freetype-2.3.11-CVE-2010-2805.patch
(Fix comparison.)
- Add freetype-2.3.11-CVE-2010-2806.patch
(Protect against negative string_size. Fix comparison.)
- Add freetype-2.3.11-CVE-2010-2808.patch
(Check the total length of collected POST segments.)
- Add freetype-2.3.11-CVE-2010-3311.patch
(Don't seek behind end of stream.)
- Resolves: #638838
|