|
|
Subscribe / Log in / New account

Debian-LTS alert DLA-587-1 (fontconfig)

From:  Emilio Pozuelo Monfort <pochu@debian.org>
To:  debian-lts-announce@lists.debian.org
Subject:  [SECURITY] [DLA 587-1] fontconfig security update
Date:  Tue, 9 Aug 2016 17:08:42 +0200
Message-ID:  <94cb8760-1616-d8be-c5ad-0a03c3a85eb9@debian.org>

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : fontconfig Version : 2.9.0-7.1+deb7u1 CVE ID : CVE-2016-5384 Debian Bug : 833570 A possible double free vulnerability was found in fontconfig. The problem was due to insufficient validation when parsing the cache file. For Debian 7 "Wheezy", these problems have been fixed in version 2.9.0-7.1+deb7u1. We recommend that you upgrade your fontconfig packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJXqfH3AAoJEJ1GxIjkNoMConEQAIHXwS0ecHrK2P8aBYGoQQIS p7+ScducLEE24ryWdp/fwHaU9dLDmfTCjy0nAAm3W5WAd87EwOH8HdHmnhPbHDAp zrhSW5DwaQufxXi8yYnBIstntehu49nOuHW8Q8aeBw3haV7dhXU5+Bv93vNQeFTh 5RCAdUtvFgUargVcmQIq7YH8RkS4y4UCk7GBzC8ckROmGlxS+73Mtp8ot5lKPnXw msMj2TLti+a0CqJXO7PXCnszeS7qXGUnMxR8U2UEl//J9K1vXoZ7g3Yw0IHovIVu Dgq/weC4yt9QCdQhCGqNhd1+Ufxa0KiTcjNZjJNb+rmYbqbz3c6cM5UTPjx7R9tP Z5kwQlqSAoR726QK/mvlYbmIhLOMHr2Yci2oDk/yJ5fCkpw5A7U314yCO2mgc2W5 h8B3zErLrMohe+ux9Z4PzpR29MInbsDo6C9WjMyu3bJK1edg7cO4jBrTpbPZAmS7 iKq22i9UUcs0/C9HGo/1qOBuln0dF3S5o8+togP3LcitVbaiXPgrIx1TEJ2sNVkc G+sPzcymHCs/kDBVeBtFRI33s0qWYJgpYd9cn7M/WNU25aJZZM1kLCY24uLpwj1z aoKNZ516Z5xp5Hd26qGxE8NaooUrRDHmDqygICjq4xCq2PnxdxSZGxhFk0upLzBe HrXIeHfkVyOBvXBI8HY8 =HHN8 -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds