Mehrere Probleme in graphite2
ID: | DSA-3894-1 |
Distribution: | Debian |
Plattformen: | Debian jessie, Debian stretch |
Datum: | Do, 22. Juni 2017, 23:42 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776 |
Applikationen: | Graphite2 |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3894-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff June 22, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : graphite2 CVE ID : CVE-2017-7771 CVE-2017-7772 CVE-2017-7773 CVE-2017-7774 CVE-2017-7775 CVE-2017-7776 CVE-2017-7777 CVE-2017-7778 Multiple vulnerabilities have been found in the Graphite font rendering engine which might result in denial of service or the execution of arbitrary code if a malformed font file is processed. For the oldstable distribution (jessie), these problems have been fixed in version 1.3.10-1~deb8u1. For the stable distribution (stretch), these problems have been fixed prior to the initial release. We recommend that you upgrade your graphite2 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAllMAZcACgkQEMKTtsN8 TjY0uQ//SzW6gQ3w48JMRKnSr1W3AwvgbGGptNpmePVD9+UmyCNqCPYHGSL0xOm4 gxlrMKaXP+Q6cdXD84ebhzmsJoDY04XCAG5WYEthQTvZC7Rh/fNjqJQUBeeO0Qps T3/je6Mdy5hQRzu8R7/47lyZ0ypKMKjx5WSgJj7T1UoA2rWITffvdLCx48qy5Env 57GG4Aft8UOU+l4OokpZqYk6KZspc+lNkj/X032vRNQJOA758YqJHK3K7nraDV3T +iPFSAMu9Zu/ybvYnH4ylxSGR3c+3pWV40dY4DhWyxdLNGI7kRCXVlbgO0UvSYmd s/0/Jil3gvc1NWOB3T2rJAcjw5KZ9Rsd9HaYm0hZLuYB4z6xELpHw0ayLgwnkbP4 xadrMWRroccL/HaRyd21WrMVeLBknvNB9TXrnnZYhm07cSbFZzkPOjkE0Z5F9nJV K9YtH5FcH1o/yAeY2ruuCYXfkXlFvhA4grs8xcgGBAQH7Cfq7zLZYhpWueh3Qz6g vSuuJoscuWgfWFiVvSKLMCNPbStO1iVV7GZWSweC0c/FUjVzq2Yk+6d7TkSdC0Ry WKjlP3m40QUAzDqsj/J43Z4W+3VGQ7aHc2pE+HEMkcDkvYaitTxCMo1lauCdIkix 8RjOrgTl8o8aIZKSgYiS65T9dVzkdPBf5dXRklrj35Z357Tkdn8= =gCVt -----END PGP SIGNATURE----- |