Lucene search

K
oraclelinuxOracleELSA-2010-0578
HistoryJul 30, 2010 - 12:00 a.m.

freetype security update

2010-07-3000:00:00
Oracle
linux.oracle.com
19

EPSS

0.024

Percentile

89.9%

[2.2.1-25]

  • Add freetype-2.2.1-axis-name-overflow.patch
    (Avoid overflow when dealing with names of axes)
  • Resolves: #614012
    [2.2.1-24]
  • Modify freetype-2.2.1-CVE-2010-2519.patch (additional fix)
    (If the type of the POST fragment is 0, the segment is completely ignored)
  • Resolves: #614012
    [2.2.1-23]
  • Add freetype-2.2.1-CVE-2010-2527.patch
    (Use precision for ‘%s’ where appropriate to avoid buffer overflows)
  • Resolves: #614012
    [2.2.1-22]
  • Add freetype-2.2.1-CVE-2010-2498.patch
    (Assure that ‘end_point’ is not larger than ‘glyph->num_points’)
  • Add freetype-2.2.1-CVE-2010-2499.patch
    (Check the buffer size during gathering PFB fragments)
  • Add freetype-2.2.1-CVE-2010-2500.patch
    (Use smaller threshold values for ‘width’ and ‘height’)
  • Add freetype-2.2.1-CVE-2010-2519.patch
    (Check ‘rlen’ the length of fragment declared in the POST fragment header)
  • Resolves: #614012