it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 3337-1] gdk-pixbuf security update
- Date: Tue, 18 Aug 2015 15:37:18 +0200
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-return-path: <jmm AT inutil.org>
- Priority: urgent
- Resent-date: Tue, 18 Aug 2015 13:37:38 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <bBAKoXDFGeJ.A.pmB.iUz0VB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3337-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 18, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : gdk-pixbuf
CVE ID : CVE-2015-4491
Gustavo Grieco discovered a heap overflow in the processing of BMP images
which may result in the execution of arbitrary code if a malformed image
is opened.
For the oldstable distribution (wheezy), this problem has been fixed
in version 2.26.1-1+deb7u1.
For the stable distribution (jessie), this problem has been fixed in
version 2.31.1-2+deb8u2.
For the testing distribution (stretch), this problem has been fixed
in version 2.31.5-1.
For the unstable distribution (sid), this problem has been fixed in
version 2.31.5-1.
We recommend that you upgrade your gdk-pixbuf packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=Ezva
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 3337-1] gdk-pixbuf security update, Moritz Muehlenhoff, 18.08.2015
Archiv bereitgestellt durch MHonArc 2.6.19.