lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 19 May 2016 19:09:15 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3584-1] librsvg security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3584-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
May 19, 2016                          https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : librsvg
CVE ID         : CVE-2015-7558 CVE-2016-4347 CVE-2016-4348

Gustavo Grieco discovered several flaws in the way librsvg, a SAX-based
renderer library for SVG files, parses SVG files with circular
definitions. A remote attacker can take advantage of these flaws to
cause an application using the librsvg library to crash.

For the stable distribution (jessie), these problems have been fixed in
version 2.40.5-1+deb8u2.

For the testing distribution (stretch), these problems have been fixed
in version 2.40.12-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.40.12-1.

We recommend that you upgrade your librsvg packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=qjtN
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ