Oracle Errata System
Oracle Linux
5.3
2021-09-09T12:47:50
ELSA-2013-0216: freetype security update (IMPORTANT)
Oracle Linux 5
Oracle Linux 6
[2.3.11-14.el6_3.1]
- Fix CVE-2012-5669
(Use correct array size for checking 'glyph_enc')
- Resolves: #903542
[2.3.11-14]
- A little change in configure part
- Related: #723468
[2.3.11-13]
- Fix CVE-2012-{1126, 1127, 1130, 1131, 1132, 1134, 1136,
1137, 1139, 1140, 1141, 1142, 1143, 1144}
- Properly initialize array 'result' in
FT_Outline_Get_Orientation()
- Check bytes per row for overflow in _bdf_parse_glyphs()
- Resolves: #806269
[2.3.11-12]
- Add freetype-2.3.11-CVE-2011-3439.patch
(Various loading fixes.)
- Resolves: #754012
[2.3.11-11]
- Add freetype-2.3.11-CVE-2011-3256.patch
(Handle some border cases.)
- Resolves: #747084
[2.3.11-10]
- Use -fno-strict-aliasing instead of __attribute__((__may_alias__))
- Resolves: #723468
[2.3.11-9]
- Allow FT_Glyph to alias (to pass Rpmdiff)
- Resolves: #723468
[2.3.11-8]
- Add freetype-2.3.11-CVE-2011-0226.patch
(Add better argument check for 'callothersubr'.)
- based on patches by Werner Lemberg,
Alexei Podtelezhnikov and Matthias Drochner
- Resolves: #723468
[2.3.11-7]
- Add freetype-2.3.11-CVE-2010-3855.patch
(Protect against invalid 'runcnt' values.)
- Resolves: #651762
IMPORTANT
Copyright 2013 Oracle, Inc.
CVE-2012-5669
freetype
freetype-demos
freetype-devel
oraclelinux-release
66ced3de1e5e0159
72f97b74ec551f03
^5
ia64
0:2.2.1-32.el5_9.1
x86_64
i386
^6
0:2.3.11-14.el6_3.1
i686