—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3864-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 27, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : fop
CVE ID : CVE-2017-5661
It was discovered that an XML external entities vulnerability in the
Apache FOP XML formatter may result in information disclosure.
For the stable distribution (jessie), this problem has been fixed in
version 1:1.1.dfsg2-1+deb8u1.
For the upcoming stable distribution (stretch), this problem has been
fixed in version 1:2.1-6.
For the unstable distribution (sid), this problem has been fixed in
version 1:2.1-6.
We recommend that you upgrade your fop packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=Xi/H
—–END PGP SIGNATURE—–