—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
– ————————————————————————-
Debian Security Advisory DSA-3479-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 15, 2016 https://www.debian.org/security/faq
– ————————————————————————-
Package : graphite2
CVE ID : CVE-2016-1521 CVE-2016-1522 CVE-2016-1523
Multiple vulnerabilities have been found in the Graphite font rendering
engine which might result in denial of service or the execution of
arbitrary code if a malformed font file is processed.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.3.5-1~deb7u1.
For the stable distribution (jessie), these problems have been fixed in
version 1.3.5-1~deb8u1.
For the testing distribution (stretch), these problems have been fixed
in version 1.3.5-1.
For the unstable distribution (sid), these problems have been fixed in
version 1.3.5-1.
We recommend that you upgrade your graphite2 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=v4q4
—–END PGP SIGNATURE—–