[SECURITY] [DLA 960-1] imagemagick security update

2017-05-28 Thread Roberto C. Sanchez
Package: imagemagick
Version: 6.7.7.10-5+deb7u14
CVE ID : CVE-2014-8354 CVE-2014-8355 CVE-2014-8562 CVE-2014-8716 
 CVE-2014-9841 CVE-2015-8900 CVE-2015-8901 CVE-2015-8902 
 CVE-2015-8903 CVE-2017-7941 CVE-2017-7943 CVE-2017-8343 
 CVE-2017-8344 CVE-2017-8345 CVE-2017-8346 CVE-2017-8347 
 CVE-2017-8348 CVE-2017-8349 CVE-2017-8350 CVE-2017-8351 
 CVE-2017-8352 CVE-2017-8353 CVE-2017-8354 CVE-2017-8355 
 CVE-2017-8356 CVE-2017-8357 CVE-2017-8765 CVE-2017-8830 
 CVE-2017-9098 CVE-2017-9141 CVE-2017-9142 CVE-2017-9143 
 CVE-2017-9144
Debian Bug : 767240 767240 768494 773834 860734 860736 862572 862574
 862573 862575 862577 862578 862579 862587 862589 862590
 862632 862633 862634 862635 862636 862653 862637 862967
 863124 863125 863123 863126


This update fixes several vulnerabilities in imagemagick: Various memory
handling problems and cases of missing or incomplete input sanitising
may result in denial of service, memory disclosure, or the execution of
arbitrary code if malformed PCX, DCM, JPEG, PSD, HDR, MIFF, PDB, VICAR,
SGI, SVG, AAI, MNG, EXR, MAT, SFW, JNG, PCD, XWD, PICT, BMP, MTV, SUN,
EPT, ICON, DDS, or ART files are processed.

For Debian 7 "Wheezy", these problems have been fixed in version
6.7.7.10-5+deb7u14.

We recommend that you upgrade your imagemagick packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



signature.asc
Description: Digital signature


[SECURITY] [DLA 959-1] libical security update

2017-05-28 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: libical
Version: 0.48-2+deb7u1
CVE ID : CVE-2016-5824 CVE-2016-9584
Debian Bug : #860451, #852034

It was discovered that there was a use-after-free vulnerability in the libical
iCalendar library. Remote attackers could cause a denial of service and
possibly read heap memory via a specially crafted .ICS file.

For Debian 7 "Wheezy", this issue has been fixed in libical version
0.48-2+deb7u1.

We recommend that you upgrade your libical packages.


Regards,

- -- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-

-BEGIN PGP SIGNATURE-
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=tx1k
-END PGP SIGNATURE-



[SECURITY] [DLA 957-1] bind9 security update

2017-05-28 Thread Thorsten Alteholz

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Package: bind9
Version: 1:9.8.4.dfsg.P1-6+nmu2+deb7u16
CVE ID : CVE-2017-3136 CVE-2017-3137 CVE-2017-3138

CVE-2017-3136

Oleg Gorokhov of Yandex discovered that BIND does not properly
handle certain queries when using DNS64 with the "break-dnssec yes;"
option, allowing a remote attacker to cause a denial-of-service.

CVE-2017-3137

It was discovered that BIND makes incorrect assumptions about the
ordering of records in the answer section of a response containing
CNAME or DNAME resource records, leading to situations where BIND
exits with an assertion failure. An attacker can take advantage of
this condition to cause a denial-of-service.

CVE-2017-3138

Mike Lalumiere of Dyn, Inc. discovered that BIND can exit with a
REQUIRE assertion failure if it receives a null command string on
its control channel. Note that the fix applied in Debian is only
applied as a hardening measure. Details about the issue can be found
at https://kb.isc.org/article/AA-01471 .


For Debian 7 "Wheezy", these problems have been fixed in version
1:9.8.4.dfsg.P1-6+nmu2+deb7u16.

We recommend that you upgrade your bind9 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=lJWn
-END PGP SIGNATURE-