Updated Freetype packages has been released for Debian GNU/Linux 7 Extended LTS and 8 LTS:
ELA-159-1 freetype security update
DLA 1909-1: freetype security update
ELA-159-1 freetype security update
DLA 1909-1: freetype security update
ELA-159-1 freetype security update
Package: freetype
Version: 2.4.9-1.1+deb7u9
Related CVE: CVE-2015-9381 CVE-2015-9382 CVE-2015-9383
Several newly-referenced issues have been fixed in the FreeType 2 font engine.
CVE-2015-9381
heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c
CVE-2015-9382
buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation
CVE-2015-9383
a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c
For Debian 7 Wheezy, these problems have been fixed in version 2.4.9-1.1+deb7u9.
We recommend that you upgrade your freetype packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
DLA 1909-1: freetype security update
Package : freetype
Version : 2.5.2-3+deb8u4
CVE ID : CVE-2015-9381 CVE-2015-9382 CVE-2015-9383
Several newly-referenced issues have been fixed in the FreeType 2 font
engine.
CVE-2015-9381
heap-based buffer over-read in T1_Get_Private_Dict in
type1/t1parse.c
CVE-2015-9382
buffer over-read in skip_comment in psaux/psobjs.c because
ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face
operation
CVE-2015-9383
a heap-based buffer over-read in tt_cmap14_validate in
sfnt/ttcmap.c
For Debian 8 "Jessie", these problems have been fixed in version
2.5.2-3+deb8u4.
We recommend that you upgrade your freetype packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS