On Wed, Sep 13, 2006 at 09:33:46PM +0200, Moritz Muehlenhoff wrote:
> Steve Langasek wrote:
> > Looks like it's time for another try at freetype.  CVE-2006-3467 appears to
> > be a potentially exploitable integer overflow in freetype's PCF parser. 
> > I've uploaded freetype_2.1.7-6 to
> > <http://people.debian.org/~vorlon/freetype-DSA/>, replacing the previous
> > version there; signed sources, unsigned changes.

> Thanks, this was already on my list. I've lost track of the status of the
> regression that did bite several users. Do I need to dig out the patch or
> was it fixed in r2?

That fix is included in 2.1.7-5, which is part of sarge r3, so -6 should be
a clean patch against that version for just this security fix.

Cheers,
-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
[EMAIL PROTECTED]                                   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to