drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in libwmf
Name: |
Mehrere Probleme in libwmf |
|
ID: |
SSA:2018-120-01 |
|
Distribution: |
Slackware |
|
Plattformen: |
Slackware -current, Slackware 13.0, Slackware x86_64 13.0, Slackware x86_64 -current, Slackware x86_64 13.1, Slackware 13.1, Slackware x86_64 13.37, Slackware 13.37, Slackware 14.0, Slackware x86_64 14.0, Slackware 14.1, Slackware x86_64 14.1, Slackware 14.2, Slackware x86_64 14.2 |
|
Datum: |
Di, 1. Mai 2018, 09:57 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455 |
|
Applikationen: |
libwmf |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] libwmf (SSA:2018-120-01)
New libwmf packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/libwmf-0.2.8.4-i586-7_slack14.1.txz: Rebuilt. Patched denial of service and possible execution of arbitrary code security issues. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362 (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: libwmf-0.2.8.4-i486-5_slack13.0.txz
Updated package for Slackware x86_64 13.0: libwmf-0.2.8.4-x86_64-5_slack13.0.txz
Updated package for Slackware 13.1: libwmf-0.2.8.4-i486-6_slack13.1.txz
Updated package for Slackware x86_64 13.1: libwmf-0.2.8.4-x86_64-6_slack13.1.txz
Updated package for Slackware 13.37: libwmf-0.2.8.4-i486-6_slack13.37.txz
Updated package for Slackware x86_64 13.37: libwmf-0.2.8.4-x86_64-6_slack13.37.txz
Updated package for Slackware 14.0: libwmf-0.2.8.4-i486-6_slack14.0.txz
Updated package for Slackware x86_64 14.0: libwmf-0.2.8.4-x86_64-6_slack14.0.txz
Updated package for Slackware 14.1: libwmf-0.2.8.4-i486-6_slack14.1.txz
Updated package for Slackware x86_64 14.1: libwmf-0.2.8.4-x86_64-6_slack14.1.txz
Updated package for Slackware 14.2: libwmf-0.2.8.4-i586-7_slack14.1.txz
Updated package for Slackware x86_64 14.2: libwmf-0.2.8.4-x86_64-7_slack14.1.txz
Updated package for Slackware -current: libwmf-0.2.8.4-i586-8.txz
Updated package for Slackware x86_64 -current: libwmf-0.2.8.4-x86_64-8.txz
MD5 signatures: +-------------+
Slackware 13.0 package: 6d0143e7e105188714f767aea522f4cb libwmf-0.2.8.4-i486-5_slack13.0.txz
Slackware x86_64 13.0 package: 3f47383d824d93c4518f8fc738c0c820 libwmf-0.2.8.4-x86_64-5_slack13.0.txz
Slackware 13.1 package: 871f2ed8d5b43a139607a4d6f959ff93 libwmf-0.2.8.4-i486-6_slack13.1.txz
Slackware x86_64 13.1 package: a8cff7e3b53153589eab0a0bab9209de libwmf-0.2.8.4-x86_64-6_slack13.1.txz
Slackware 13.37 package: 5db38178040f541080caf9776256331d libwmf-0.2.8.4-i486-6_slack13.37.txz
Slackware x86_64 13.37 package: 5d308a63d03d940622ec21d870b01cde libwmf-0.2.8.4-x86_64-6_slack13.37.txz
Slackware 14.0 package: c806e42bd0498db0f3b70957c7c3a401 libwmf-0.2.8.4-i486-6_slack14.0.txz
Slackware x86_64 14.0 package: 376835bf78178bb15bb3c56cee454eb4 libwmf-0.2.8.4-x86_64-6_slack14.0.txz
Slackware 14.1 package: 8a30446ddb36004db6d5ce10728807af libwmf-0.2.8.4-i486-6_slack14.1.txz
Slackware x86_64 14.1 package: ceb7fa835645c9d55c3ad5eac9eab754 libwmf-0.2.8.4-x86_64-6_slack14.1.txz
Slackware 14.2 package: 4d98c4cad02f173e00570dccccba226a libwmf-0.2.8.4-i586-7_slack14.1.txz
Slackware x86_64 14.2 package: 0750711520b0cf4ff5a9a6e363815702 libwmf-0.2.8.4-x86_64-7_slack14.1.txz
Slackware -current package: ac7070e538cf1d1bb08b68cf7883de6d l/libwmf-0.2.8.4-i586-8.txz
Slackware x86_64 -current package: 5a60b94c51180b5a2d53dba2fe430379 l/libwmf-0.2.8.4-x86_64-8.txz
Installation instructions: +------------------------+
Upgrade the package as root: # upgradepkg libwmf-0.2.8.4-i586-7_slack14.1.txz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAlrnmukACgkQakRjwEAQIjPNXgCeMvoMF3+o5j2NjGNL4XYJDfof jZIAn2DRjyfoNZn7I6obni8P13FuyPek =hcxT -----END PGP SIGNATURE-----
|
|
|
|