Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 22 Oct 2020 16:25:50 +0000
From:      bugzilla-noreply@freebsd.org
To:        desktop@FreeBSD.org
Subject:   [Bug 250375] [exp-run] Upgrad print/freetype2 to 2.10.3
Message-ID:  <bug-250375-39348-odCVY5ddrd@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-250375-39348@https.bugs.freebsd.org/bugzilla/>
References:  <bug-250375-39348@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D250375

--- Comment #19 from commit-hook@FreeBSD.org ---
A commit references this bug:

Author: tcberner
Date: Thu Oct 22 16:25:19 UTC 2020
New revision: 552995
URL: https://svnweb.freebsd.org/changeset/ports/552995

Log:
  MFH: r552991

  print/freetype2: Security fix release  2.10.4

  From: https://sourceforge.net/projects/freetype/files/freetype2/2.10.4/"

    I. IMPORTANT BUG FIXES

    - A heap buffer overflow has been found  in the handling of embedded
      PNG bitmaps, introduced in FreeType version 2.6.

        https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2020-15999

      If you  use option  FT_CONFIG_OPTION_USE_PNG  you  should  upgrade
      immediately.

  Partial exp-run by:   antoine
  PR:           250375
  Security:     CVE-2020-15999

  Approved by:  ports-secteam (implicit)

Changes:
_U  branches/2020Q4/
  branches/2020Q4/print/freetype2/Makefile
  branches/2020Q4/print/freetype2/distinfo
  branches/2020Q4/print/freetype2/pkg-plist

--=20
You are receiving this mail because:
You are on the CC list for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-250375-39348-odCVY5ddrd>