[SECURITY] [DSA 3959-1] libgcrypt20 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3959-1 secur...@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 29, 2017 https://www.debian.org/security/faq - - Package: libgcrypt20 CVE ID : CVE-2017-0379 Debian Bug : 873383 Daniel Genkin, Luke Valenta and Yuval Yarom discovered that Libgcrypt is prone to a local side-channel attack against the ECDH encryption with Curve25519, allowing recovery of the private key. See https://eprint.iacr.org/2017/806 for details. For the stable distribution (stretch), this problem has been fixed in version 1.7.6-2+deb9u2. For the unstable distribution (sid), this problem has been fixed in version 1.7.9-1. We recommend that you upgrade your libgcrypt20 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlmlx9pfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0T3pw/9Fh08Nkzniah4f7KqkgfYohv5SnxRw2or7nRNPNVmG8PpBNBIo3x9iXkC LWJXM2/86b5pseSFpWePnmOUxpUlsKrQuZduA76NAUFJ+Vz7UF62euBHWb/HU1ZS SwYA9aEukGwqSaJk3dhsR9LofPuVrElexfgpZxhpyhDWQBhGaHhpybvtCREDIk9q y5MiMW6PboF6B9aiMSTbCGxa2PbipI4gcmiHUJL2iMBaNjI69OO0xGKUyzXqZKoD H4MEVdjp0MYTIYySzOG7ytJhahoRtNEdj+nNrwgLwTnux9trRHnYucGL6avg56eI SFRq2iNNOCAoNHWpYHmMQxxMg4I1NEzZKbAXUXP2drn9Ai8QB+xy9oUejBpgnxYL d34Sh0kZVy819L8Cxablgg98n15NRZxTUB9qpX13Cij3q0cEv3iR6QUk/KSPz0jn 9ZvYEYPfPZL96mozTuttGDYV2uzeyErW5C1EgjcBGXhc66OohQfMF4LWflbR7v0t EAPG8rxfcoxmhZsj2e/zkSKmbBkJ+W6JxpwahZY46zXKndLJRQvNPW/MGzAByNHt l9VkgBw+DE+Ef3xQD6hybit8Cf31YEGt5yOpJQFGcGvCsXyY0aG058SipGXIQ5Td +7BZQUk0p5TdXdlT5LSMuy7egD2+bu4f9eBB/b+9zlTsfWRXuWA= =MWku -END PGP SIGNATURE-
[SECURITY] [DSA 3958-1] fontforge security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3958-1 secur...@debian.org https://www.debian.org/security/ Sebastien Delafond August 29, 2017 https://www.debian.org/security/faq - - Package: fontforge CVE ID : CVE-2017-11568 CVE-2017-11569 CVE-2017-11571 CVE-2017-11572 CVE-2017-11574 CVE-2017-11575 CVE-2017-11576 CVE-2017-11577 Debian Bug : 869614 It was discovered that FontForge, a font editor, did not correctly validate its input. An attacker could use this flaw by tricking a user into opening a maliciously crafted OpenType font file, thus causing a denial-of-service via application crash, or execution of arbitrary code. For the oldstable distribution (jessie), these problems have been fixed in version 20120731.b-5+deb8u1. For the stable distribution (stretch), these problems have been fixed in version 1:20161005~dfsg-4+deb9u1. We recommend that you upgrade your fontforge packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmlIokACgkQEL6Jg/PV nWT9QAf9GKd21mv9ExDFSOID2I+cIinOrZRSkOvnZSHVLhaJIg4yhhWOCfquktoU CgVRMuH02qeR/4PNJCvqC7mq0tvWg6TVJqtQGVQhqQmLqwA7m1bz0qzi4uBfEsML rFmmttIPNqi9J6gydeqJHG1Pl0eJWxsIpzKr6ZNeb+SxurE3mkhCsUW8mqkl8brb LtD7kxD573pS1L7Ny9mYm8ZutIN05dm/VqntleOxE1QeHDMBZVTChowT6RK7bq/q GWAgGoWZwF3JJCf8TW1ybXM/BHuSEh/v5k6srGt/kO7gM4tDdeNVlz1GXuT3GTI5 YI9BM6MO2NKq1eG4lt43GCq6gcjFVg== =AQ9b -END PGP SIGNATURE-