lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20170324223216.3safkttd4kbktpob@pisco.westfalen.local>
Date: Fri, 24 Mar 2017 23:32:16 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3817-1] jbig2dec security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3817-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 24, 2017                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : jbig2dec
CVE ID         : CVE-2016-9601

Multiple security issues have been found in the JBIG2 decoder library,
which may lead to lead to denial of service or the execution of arbitrary
code if a malformed image file (usually embedded in a PDF document) is
opened.

For the stable distribution (jessie), this problem has been fixed in
version 0.13-4~deb8u1.

For the upcoming stable distribution (stretch), this problem has been
fixed in version 0.13-4.

For the unstable distribution (sid), this problem has been fixed in
version 0.13-4.

We recommend that you upgrade your jbig2dec packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=Sxfe
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ