drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in gd
Name: |
Mehrere Probleme in gd |
|
ID: |
DSA-3777-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian jessie |
|
Datum: |
Di, 31. Januar 2017, 21:56 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168 |
|
Applikationen: |
gd |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3777-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso January 31, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : libgd2 CVE ID : CVE-2016-6906 CVE-2016-6912 CVE-2016-9317 CVE-2016-10166 CVE-2016-10167 CVE-2016-10168
Multiple vulnerabilities have been discovered in libgd2, a library for programmatic graphics creation and manipulation, which may result in denial of service or potentially the execution of arbitrary code if a malformed file is processed.
For the stable distribution (jessie), these problems have been fixed in version 2.1.0-5+deb8u9.
For the testing distribution (stretch) and the unstable distribution (sid), these problems have been fixed in version 2.2.4-1.
We recommend that you upgrade your libgd2 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAliQ2gZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SViBAAilj6u75zRlTUX0RbCO/4Ag65MobTXcABw+0pku4EQpzjL7ddCyHsyadc GPKqw/NiVNY6YMOQQvosjjsLNmAUY7TDUCjNu5Zwb+ql0QGG7cMuftJDhZvKMVh7 NGgYGjzjkOss4NugYEJEV7DuLKcHRzpTM7SwD6r6lkN2h6xpVTn/eFgunoJa1zL/ rYInsjcihPaQXICeHICYeNlIzZncpdgODa026dA7gdGSnKDZvjHjL9Mq5Hj7Iv/9 ExzwfaouUqnW3v7BwRi8b/noIS+Bw/Y64LtJazI0CBMVNr0wjHbFBxn8KfNe7cn3 d7meZZPnB0tb7iKFmHsYSfBy8hJoPhxaaN9Lqzp4UVdNGrCRGHLmvBqpmFp4PE18 M8YE0bM2vLwX0KzGkQCEzg2EnJVew6VT0KUw3duR+SlkqgmKL2S6HYUJCw58xXOr jeikes9G59SMdmp52gLAJB2YpYdudDSYIFIYgSabFJqqbeBZlUBL1Q46w+aKRXb1 Jak6oavK4wFrUHPa1RM8N9FidCzquBlQR0wLhgiBszOEe2Cd+ovsnT0xbMaq0HdF m2o5bDXJbrZ+N5iJnD6HmT7qZSciVosl4ahdgRvZPTC1RTADRUpW279ph4Kz1q2l ixGhE601/PWMn7m+5a32fXsuR5BzE7fRo9FBqgk57LLXI87ExCg= =jiq4 -----END PGP SIGNATURE-----
|
|
|
|