Debian alert DLA-2934-1 (freecad)
| From: | Emilio Pozuelo Monfort <pochu@debian.org> | |
| To: | <debian-lts-announce@lists.debian.org> | |
| Subject: | [SECURITY] [DLA 2934-1] freecad security update | |
| Date: | Mon, 07 Mar 2022 13:21:29 +0100 | |
| Message-ID: | <20220307122129.6F9FD2A01AD@andromeda> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2934-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort March 07, 2022 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : freecad Version : 0.16+dfsg2-3+deb9u1 CVE ID : CVE-2021-45844 Debian Bug : 1005747 A command injection vulnerability was found in FreeCAD, a parametric 3D modeler, when importing DWF files with crafted filenames. For Debian 9 stretch, this problem has been fixed in version 0.16+dfsg2-3+deb9u1. We recommend that you upgrade your freecad packages. For the detailed security status of freecad please refer to its security tracker page at: https://security-tracker.debian.org/tracker/freecad Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAmIl+MkACgkQnUbEiOQ2 gwKWXw/+NOyjQnx+Xmg/AIsY4GiyM984/w2U4y6/kscxFpSGVxdYNEdUKa+Qgt86 jZNTVC/aEdAt3rRNvLJfRfrTlSdkXewQvaQTngsAUOpoeXLfVOkLSB8VKd7BUn97 lxa/giTW3UoF6xM36RcCoPczOx8L2zea/TchmHdNf8zCCcZc3qrX0bZGCzmAA3RW NQ89aFFgE22/Gyr5teL5e8exWU0prawFRWxvcvPry/jj1egw7XlmLtyxtkPsB4Rt dMjTslRtJKFPkJUMQT5F6z28rQw47hT7LjHRVMw3dfsOKJOCXOXl4HbLbu/znUGE 071ACnHmWt1eURzAjZLiXpguT0c+N0LODKl1V7BVcwg/5gLms3y8ARXjaKGsivfz G472nDGeNgs+Ynp6QqnVx3Q6gjns2K5ntQBFInYQkhpSLAnGDeltZQ4JV8PQ0QJC 2u3UkQjDZZvuZcWqhjvmjsctTvuSsxSJOipnEThxPF9iCnJqPwqdmj7KnL5y3zLB 4n8oT9fU2Y6ZhU512cGy41IZyJNGK5QtQbBgbU76SQQRPcUXOQ8cvbt/moXq85zJ dxIOB1xGsHexTregdHFKK//xlk7DfzgNL5eMxLWTZ44FuQRaBztXNpB4kKCMymky wPoi/RDdWKAMeEf6TuRHjEE6aYbxSdtsgSlP/EfqYBjxvw9KEn4= =IUgk -----END PGP SIGNATURE-----
