lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20171010192211.7iop3xjdoq7znhwt@pisco.westfalen.local>
Date: Tue, 10 Oct 2017 21:22:11 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3995-1] libxfont security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3995-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 10, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libxfont
CVE ID         : CVE-2017-13720 CVE-2017-13722

Two vulnerabilities were found in libXfont, the X11 font rasterisation
library, which could result in denial of service or memory disclosure.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:1.5.1-1+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.0.1-3+deb9u1.

We recommend that you upgrade your libxfont packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=y1vG
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ