Debian 9904 Published by

The following Debian updates has been released today:

[DLA 634-1] dropbear security update
[DSA 3673-2] openssl regression update
[DSA 3675-1] imagemagick security update



[DLA 634-1] dropbear security update

Package : dropbear
Version : 2012.55-1.3+deb7u1
CVE IDs : CVE-2016-7406 CVE-2016-7407

It was discovered that there were two issues in dropbear, a lightweight SSH2
server and client:

- CVE-2016-7406: Potential issues in exit message formatting.
- CVE-2016-7407: Overflows when parsing OpenSSH's ASN.1 key format.

For Debian 7 "Wheezy", this issue has been fixed in dropbear version
2012.55-1.3+deb7u1.

We recommend that you upgrade your dropbear packages.

[DSA 3673-2] openssl regression update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3673-2 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 23, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openssl
Debian Bug : 838652 838659

It was discovered that the original patch applied for CVE-2016-2182 in
DSA-3673-1 was incomplete, causing a regression when parsing
certificates. Updated packages are now available to address this
problem.

For the stable distribution (jessie), this problem has been fixed in
version 1.0.1t-1+deb8u5.

We recommend that you upgrade your openssl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3675-1] imagemagick security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3675-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 23, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : imagemagick
CVE ID : not yet available
Debian Bug : 836776 836172 836171

This updates fixes several vulnerabilities in imagemagick: Various memory
handling problems and cases of missing or incomplete input sanitising
may result in denial of service or the execution of arbitrary code if
malformed SIXEL, PDB, MAP, SGI, TIFF and CALS files are processed.

For the stable distribution (jessie), these problems have been fixed in
version 8:6.8.9.9-5+deb8u5.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your imagemagick packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/