I would argue this is more than just "wishlist". In FreeType 2.6 an actual thread safety model was introduced making FreeType no longer thread antagonistic. Also, between 2.6 and 2.6.2 FreeType was heavily fuzzed which resulted in a number of fixes, some of which may be of security interest but because they were not found as vulnerabilities they will probably never end up with CVE numbers. If Xenial ships with FreeType 2.5.2, I have no doubt that it will have already known but unpatched security issues for its entire life.
-- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to freetype in Ubuntu. https://bugs.launchpad.net/bugs/1521299 Title: Update to 2.6.3 Status in freetype package in Ubuntu: Triaged Status in freetype package in Debian: New Bug description: Please update the package to 2.6.3. There's quite a bit of interesting new features and stability fixes via fuzzing since 2.5.x, have a look at www.freetype.org -> "More on the 2.6.2 release for users and developers". To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/freetype/+bug/1521299/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp