lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 17 Jul 2018 22:36:50 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4248-1] blender security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4248-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 17, 2018                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : blender
CVE ID         : CVE-2017-2899 CVE-2017-2900 CVE-2017-2901 CVE-2017-2902 
                 CVE-2017-2903 CVE-2017-2904 CVE-2017-2905 CVE-2017-2906 
                 CVE-2017-2907 CVE-2017-2908 CVE-2017-2918 CVE-2017-12081 
                 CVE-2017-12082 CVE-2017-12086 CVE-2017-12099 CVE-2017-12100 
                 CVE-2017-12101 CVE-2017-12102 CVE-2017-12103 CVE-2017-12104 
                 CVE-2017-12105

Multiple vulnerabilities have been discovered in various parsers of
Blender, a 3D modeller/ renderer. Malformed .blend model files and
malformed multimedia files (AVI, BMP, HDR, CIN, IRIS, PNG, TIFF) may
result in the execution of arbitrary code.
							        
For the stable distribution (stretch), these problems have been fixed in
version 2.79.b+dfsg0-1~deb9u1.

We recommend that you upgrade your blender packages.

For the detailed security status of blender please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/blender

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=OeWg
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists