Debian 10166 Published by

The following updates has been released for Debian 7 LTS:

[DLA 899-1] feh security update
[DLA 900-1] freetype security update
[DLA 901-1] radare2 security update



[DLA 899-1] feh security update

Package : feh
Version : 2.3-2+deb7u1
CVE ID : CVE-2017-7875
Debian Bug : 860367

Tobias Stoeckmann discovered it was possible to trigger an
out-of-boundary heap write with the image viewer feh while receiving
an IPC message.

For Debian 7 "Wheezy", these problems have been fixed in version
2.3-2+deb7u1.

We recommend that you upgrade your feh packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DLA 900-1] freetype security update

Package : freetype
Version : 2.4.9-1.1+deb7u5
CVE ID : CVE-2016-10328
Debian Bug : 860303

The Freetype 2 font engine was vulnerable to an out-of-bounds write
caused by a heap-based buffer overflow in the cff_parser_run function
in cff/cffparse.c.

For Debian 7 "Wheezy", these problems have been fixed in version
2.4.9-1.1+deb7u5.

We recommend that you upgrade your freetype packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DLA 901-1] radare2 security update

Package : radare2
Version : 0.9-3+deb7u2
CVE ID : CVE-2017-6448

CVE-2017-6448
The dalvik_disassemble function in libr/asm/p/asm_dalvik.c in
radare2 1.2.1 allows remote attackers to cause a denial of
service (stack-based buffer overflow and application crash) or
possibly have unspecified other impact via a crafted DEX file.


For Debian 7 "Wheezy", these problems have been fixed in version
0.9-3+deb7u2.

We recommend that you upgrade your radare2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS