[SECURITY] [DLA 675-1] potrace security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Package : potrace
Version : 1.10-1+deb7u1
CVE ID : CVE-2013-7437 CVE-2016-8694 CVE-2016-8695
CVE-2016-8696 CVE-2016-8697 CVE-2016-8698
CVE-2016-8699 CVE-2016-8700 CVE-2016-8701
CVE-2016-8702 CVE-2016-8703
Debian Bug : #778646
Multiple vulnerabilities have been found in potrace.
CVE-2013-7437
Multiple integer overflows in potrace 1.11 allow remote attackers
to cause a denial of service (crash) via large dimensions in a BMP
image, which triggers a buffer overflow.
This bug was reported by Murray McAllister of the Red Hat
Security Response Team.
CVE-2016-8694
CVE-2016-8695
CVE-2016-8696
Multiple NULL pointer dereferences in bm_readbody_bmp.
This bug was discovered by Agostino Sarubbo of Gentoo.
CVE-2016-8697
Division by zero in bm_new.
This bug was discovered by Agostino Sarubbo of Gentoo.
CVE-2016-8698
CVE-2016-8699
CVE-2016-8700
CVE-2016-8701
CVE-2016-8702
CVE-2016-8703
Multiple heap-based buffer overflows in bm_readbody_bmp.
This bug was discovered by Agostino Sarubbo of Gentoo.
For Debian 7 "Wheezy", these problems have been fixed in version
1.10-1+deb7u1.
We recommend that you upgrade your potrace packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCAAGBQJYEJPyAAoJEJ1bI/kYT6UULBgH/iBiMsn+QOL4UmeKZKozpuCJ
xADON664qpnjIro109z6ohGTfxuDXbIwTZcfWwn1wyjWUORVw5EoJQyTeRtZQk8P
KPfN9MElLixIlsLhu4xP6X5V5rRMttJ03LuCGAuoB2La6Fp5ZsK/2AyBAI27Pw1o
SBzlAKyoGK2KOgwfenV4VOboSs6xPPYFAcBpI/zrrGCtCmy5VGmBlVotmYlRZQMi
AlQBcJdshNT1Vn6pSMm4lZ9xNm19vaxhquSOgw4V4+yhmT0ESPvg60iI5CIWiLg6
ASj7tr00H5L38RfU/1B5cd3riJsRGaxES8eCgtDzRxchon3AsqPLhleFX5famkY=
=Wn4j
-----END PGP SIGNATURE-----
Reply to: