[SECURITY] [DSA 3950-1] libraw security update

2017-08-21 Thread Luciano Bello
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

- -
Debian Security Advisory DSA-3950-1   secur...@debian.org
https://www.debian.org/security/Luciano Bello
August 21, 2017   https://www.debian.org/security/faq
- -

Package: libraw
CVE ID : CVE-2017-6886 CVE-2017-6887
Debian Bug : 864183

Hossein Lotfi and Jakub Jirasek from Secunia Research have discovered
multiple vulnerabilities in LibRaw, a library for reading RAW images. An
attacker could cause a memory corruption leading to a DoS (Denial of
Service) with craft KDC or TIFF file.

For the oldstable distribution (jessie), these problems have been fixed
in version 0.16.0-9+deb8u3.

For the stable distribution (stretch), these problems have been fixed in
version 0.17.2-6+deb9u1.

We recommend that you upgrade your libraw packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=RMQr
-END PGP SIGNATURE-



[SECURITY] [DSA 3949-1] augeas security update

2017-08-21 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3949-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
August 21, 2017   https://www.debian.org/security/faq
- -

Package: augeas
CVE ID : CVE-2017-7555
Debian Bug : 872400

Han Han of Red Hat discovered that augeas, a configuration editing
tool, improperly handled some escaped strings. A remote attacker could
leverage this flaw by sending maliciously crafted strings, thus
causing an augeas-enabled application to crash or potentially execute
arbitrary code.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.2.0-0.2+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 1.8.0-1+deb9u1.

We recommend that you upgrade your augeas packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmaoi0ACgkQEL6Jg/PV
nWQa6AgAuDE/urqDtUlXt53PL3b9pZsUSdKQ+74l64hhKMV0+kQ8SSitBdcjXR/8
1nsdd7Qi36lOCwYv7EEcCqz98puB+ef31LwVZiYbVLAG6YT54Zl7XSSIpXx94Ef+
JCAJ8NGOCLoqHjTNtsQVnPMtLUbV42aDqlNeDgMEXzvoDb/k8R4CmrSMremz8xn9
0bPuziBV73NfQAf3hnrj+Q+whEHg9rCie/wsH1m6QcpibJEJpLlTC1gV8PZehGMM
g3h+H2XV/YrMR1swecIH5VxIEeLCL0mgeLJ4azfIxyWH0adVFRCRp8ZiZ3c2KyQS
ejEgj24vgFvrvdQWGAeeh0dl2e/LWw==
=502b
-END PGP SIGNATURE-