Debian 9858 Published by

The following two updates has been released for Debian 6 LTS:

[DLA 188-1] arj security update
[DLA 189-1] libgd2 security update



[DLA 188-1] arj security update

Package : arj
Version : 3.10.22-9+deb6u1
CVE ID : CVE-2015-0556 CVE-2015-0557 CVE-2015-2782
Debian Bug : 774015 774434 774435

Multiple vulnerabilities have been discovered in arj, an open source
version of the arj archiver. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2015-0556

Jakub Wilk discovered that arj follows symlinks created during
unpacking of an arj archive. A remote attacker could use this flaw
to perform a directory traversal attack if a user or automated
system were tricked into processing a specially crafted arj archive.

CVE-2015-0557

Jakub Wilk discovered that arj does not sufficiently protect from
directory traversal while unpacking an arj archive containing file
paths with multiple leading slashes. A remote attacker could use
this flaw to write to arbitrary files if a user or automated system
were tricked into processing a specially crafted arj archive.

CVE-2015-2782

Jakub Wilk and Guillem Jover discovered a buffer overflow
vulnerability in arj. A remote attacker could use this flaw to cause
an application crash or, possibly, execute arbitrary code with the
privileges of the user running arj.

[DLA 189-1] libgd2 security update

Package : libgd2
Version : 2.0.36~rc1~dfsg-5+deb6u1
CVE ID : CVE-2014-2497 CVE-2014-9709
Debian Bug : 744719

Multiple vulnerabilities were discovered in libgd2, a graphics library:

CVE-2014-2497

The gdImageCreateFromXpm() function would try to dereference a NULL
pointer when reading an XPM file with a special color table. This
could allow remote attackers to cause a denial of service (crash) via
crafted XPM files.

CVE-2014-9709

Importing an invalid GIF file using the gdImageCreateFromGif() function
would cause a read buffer overflow that could allow remote attackers to
cause a denial of service (crash) via crafted GIF files.