[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1065-1] fontforge security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : fontforge
Version        : 0.0.20120101+git-2+deb7u1
CVE ID         : CVE-2017-11568 CVE-2017-11569 CVE-2017-11571 CVE-2017-11572
                 CVE-2017-11574 CVE-2017-11575 CVE-2017-11576 CVE-2017-11577

FontForge is vulnerable to heap-based buffer over-read in several functions, resulting in DoS or code execution via a crafted otf file:


For Debian 7 "Wheezy", these problems have been fixed in version
0.0.20120101+git-2+deb7u1.

We recommend that you upgrade your fontforge packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=ySS9
-----END PGP SIGNATURE-----


Reply to: