lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20150315194903.GA20059@pisco.westfalen.local>
Date: Sun, 15 Mar 2015 20:49:03 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3188-1] freetype security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3188-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
March 15, 2015                         http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : freetype
CVE ID         : CVE-2014-9656 CVE-2014-9657 CVE-2014-9658 CVE-2014-9660 
                 CVE-2014-9661 CVE-2014-9663 CVE-2014-9664 CVE-2014-9666
                 CVE-2014-9667 CVE-2014-9669 CVE-2014-9670 CVE-2014-9671
                 CVE-2014-9672 CVE-2014-9673 CVE-2014-9675

Mateusz Jurczyk discovered multiple vulnerabilities in Freetype. Opening
malformed fonts may result in denial of service or the execution of
arbitrary code.

For the stable distribution (wheezy), these problems have been fixed in
version 2.4.9-1.1+deb7u1.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 2.5.2-3.

For the unstable distribution (sid), these problems have been fixed in
version 2.5.2-3.

We recommend that you upgrade your freetype packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=dRlW
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ