[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20150315194903.GA20059@pisco.westfalen.local>
Date: Sun, 15 Mar 2015 20:49:03 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3188-1] freetype security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3188-1 security@...ian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 15, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : freetype
CVE ID : CVE-2014-9656 CVE-2014-9657 CVE-2014-9658 CVE-2014-9660
CVE-2014-9661 CVE-2014-9663 CVE-2014-9664 CVE-2014-9666
CVE-2014-9667 CVE-2014-9669 CVE-2014-9670 CVE-2014-9671
CVE-2014-9672 CVE-2014-9673 CVE-2014-9675
Mateusz Jurczyk discovered multiple vulnerabilities in Freetype. Opening
malformed fonts may result in denial of service or the execution of
arbitrary code.
For the stable distribution (wheezy), these problems have been fixed in
version 2.4.9-1.1+deb7u1.
For the upcoming stable distribution (jessie), these problems have been
fixed in version 2.5.2-3.
For the unstable distribution (sid), these problems have been fixed in
version 2.5.2-3.
We recommend that you upgrade your freetype packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBAgAGBQJVBeCbAAoJEBDCk7bDfE42leoQALkgig4oYJV7BfDrWzo4Uty/
10A9lTwbTx1mps3jnp3ez+vnXJq+qdavsHIC5jUFG7nA93I5iFhh/7aAwcWzSAu9
jtq+IPugUPGbKtX0gSACgyyudaBLARkoWmuHOr8+XwSWpkteKgdx0Muuq7Qi5UiQ
AEWT4OKqpPMjSCWQqJSxNmjYe3a5ggJbJ5c9B9SoHQBsUM/A2hN+RPDT56fpdwoG
fRyQWjePev7ZMz66814VCO7SJie4LajjNa/FK7evIFqQ1qpcDzErGKghjGVSxFSM
YOvgIFlrn7NXg791ZrKFdbOfTTcYVogN8UZq9JGJ2w7A9Q4lLKPAxGv8OX4uPn9W
Sraiol2fBGtMtx7Z5fXjICJWXW3kXS0UhwvxS8T8FI/cNPIZpRFUr+1rM/knt72C
v52iFEqhqmUfT8XGAZO25W2zAH+zO5I7fzreKJ0iO88oXVp7aD5bzTH7Qp63d5e2
NB8zeMP7z/1M1bfnTJl7XTqHseMZ8RNcrRO5cFhtqKc+Pw2sDrCrFJrBKTvBfpUX
BAlJ8KxatnuaaGO3kgrO+vPgNfftpKkTGxzD43AcV7POZ6lLm+bOr49WuY9aSMhE
mk2FcYGjmaT2tnmmiLtciH0B0sKDl8oTfTpurmWQVf8dkeLY8Yx1YhGj1ZxDWaG3
5i14+D+e1Uaw99e7jkSU
=dRlW
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists