it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5880-1] freetype security update
- Date: Mon, 17 Mar 2025 17:52:37 +0000
- Authentication-results: lists.piratenpartei.de; dkim=none; spf=none (lists.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 82.195.75.100) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"; dmarc=none
- List-archive: https://lists.debian.org/msgid-search/E1tuEdh-00HSu5-LT AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=0O1L9zIVhahomk0+UzWUre3F+cpDJdnK+A+91Jm/Z6Q=; b=lB qVLecl41H9qNJUN6p9SHwqb37o0mcl63lOfTI0C85XpVZE5GqZtBM7/nu9o1Bo5QFoSoQ5vFZCn9U BimwgWyByRIEsPaHFZxtAdHARIlArRd3N1lnOy1qjOCz30dzh/CJecIVfUtI1Vs+1cv6QRPmbDTMG 4mFH06T5bOPD15/YOyAnyhZ1R5s3rxU+djR8QYVCVOBdiczulp8AhLU9M+tOTut2f4L18B9rHEAWF lT8jTXzvqSCLdhi5LFRLjBGRfG4CQVXD2DSFGmW6R91UQj1TF6hNhQaSQsXXBl0d7KK7p+vuYlhig nJAlniHNRdm25QTuu8whBrtBhEOvvx2A==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Mon, 17 Mar 2025 17:53:02 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <1gb_jxG70CF.A.PP3I.-FG2nB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5880-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 17, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : freetype
CVE ID : CVE-2025-27363
An out-of-bounds write vulnerability when attempting to parse font
subglyph structures related to TrueType GX and variable font files was
discovered in FreeType, which may result in the execution of arbitrary
code when processing specially crafted fonts.
For the stable distribution (bookworm), this problem has been fixed in
version 2.12.1+dfsg-5+deb12u4.
We recommend that you upgrade your freetype packages.
For the detailed security status of freetype please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/freetype
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=7u8e
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5880-1] freetype security update, Salvatore Bonaccorso, 17.03.2025
Archiv bereitgestellt durch MHonArc 2.6.19+.