Name: | stb_truetype-devel |
---|---|
Version: | 1.26 |
Release: | 0.39.20231011gitbeebb24.el7 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 201543 |
License: | MIT OR Unlicense |
RPM: | stb_truetype-devel-1.26-0.39.20231011gitbeebb24.el7.x86_64.rpm |
Source RPM: | stb-0-0.39.20231011gitbeebb24.el7.src.rpm |
Build Date: | Sat Nov 04 2023 |
Build Host: | build-ol7-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | https://github.com/nothings/stb |
Summary: | Parse, decode, and rasterize characters from TrueType fonts |
Description: | Parse, decode, and rasterize characters from TrueType fonts. ======================================================================= NO SECURITY GUARANTEE -- DO NOT USE THIS ON UNTRUSTED FONT FILES This library does no range checking of the offsets found in the file, meaning an attacker can use it to read arbitrary memory. ======================================================================= This library processes TrueType files: • parse files • extract glyph metrics • extract glyph shapes • render glyphs to one-channel bitmaps with antialiasing (box filter) • render glyphs to one-channel SDF bitmaps (signed-distance field/function) |
- stb_vorbis: fix GHSL-2023-165 / fix CVE-2023-45675
- stb_image: fix GHSL-2023-151 / fix CVE-2023-45667
- stb_image: fix GHSL-2023-150 / fix CVE-2023-45666
- Document another bug, PR, and name (GHSL-2023-149) for CVE-2023-43898
- stb_image: fix GHSL-2023-148 / fix CVE-2023-45664
- stb_image: fix GHSL-2023-147 / fix CVE-2023-45663
- stb_image: fix GHSL-2023-146 / fix CVE-2023-45662
- stb_image: fix GHSL-2023-145 / fix CVE-2023-45661
- Document that 1454.patch fixes CVE-2023-43898
- Backport a PR fixing undefined behavior in stb_image_resize2