lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 15 Feb 2016 23:43:32 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3479-1] graphite2 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3479-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 15, 2016                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : graphite2
CVE ID         : CVE-2016-1521 CVE-2016-1522 CVE-2016-1523

Multiple vulnerabilities have been found in the Graphite font rendering
engine which might result in denial of service or the execution of
arbitrary code if a malformed font file is processed.


For the oldstable distribution (wheezy), these problems have been fixed
in version 1.3.5-1~deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 1.3.5-1~deb8u1.

For the testing distribution (stretch), these problems have been fixed
in version 1.3.5-1.

For the unstable distribution (sid), these problems have been fixed in
version 1.3.5-1.

We recommend that you upgrade your graphite2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJWwlRRAAoJEBDCk7bDfE429zAP/3wN/6nS/DXBfHcEbHM7uC/c
avJ3Yis9cjuDwCHiF4DttWCX8KLOarngYkacpi32XtthD4tYsr8ycXAeDRel6Rrs
dj1wOaaI01iBiaUSA+gVVqutdagjlmbF1N3pvJz6mGLuXJyDDIpWZnwOgfhgHKPs
GUr9x6j5zqpQnLJfTFvuo01FqS7+BrffjUN+ovU1ineHLFoQzrv1i4Qxs3Gq9N/z
BTeuuBEfvUn2sb16xczHYYdEzoUlJVJPT/gOv42uO/3j8cLu5X7rWlpJoYt1lmDt
fczy8aH4t2U2FxC1KgfdNTV4Us52E0WhssD4rPLKDHE7HIUrSlCWFQsEE6YDISj4
Py20RpU8eEVKZvsMLamMkoiCI+8H9Pz9TBdIK6OdxOOuQueRvXc4yVTCK+Ab2Rjt
yuR/iovcj25h38JasIiMA36gVZGd9YlswRlVVTNV8tifWBiFgMNvZWMnWCptvzEc
rJSpQ/akaBVhoGxVg9xCfGpRa4JznHblILXNPl7uxjC0+PKl6PJ+oTRkxeCiOx6r
I8m1iuXWclk4VI25RyXA9pBtMsqBDEeDqx888p94gYkiV3R3APh/NJ0z6Y8gz3xI
Y65v+1A7o3fWgIJFRGltxUA4ZO/jYVCKBswwFT6PlJp8ip9PlGKstSzK3dgph7dk
z3EtDVKSWfkDvLD1ZZjS
=v4q4
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ