[SECURITY] [DLA 844-1] libquicktime security update

2017-02-28 Thread Balint Reczey
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: libquicktime
Version: 2:1.2.4-3+deb7u1
CVE ID : CVE-2016-2399
Debian Bug : 855099

Marco 'nemux' Romano discovered that an integer overflow in the
quicktime_read_pascal function in libquicktime 1.2.4 and earlier
allows remote attackers to cause a denial of service or possibly have
other unspecified impact via a crafted hdlr MP4 atom.

For Debian 7 "Wheezy", these problems have been fixed in version
2:1.2.4-3+deb7u1.

We recommend that you upgrade your libquicktime packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=Z/1G
-END PGP SIGNATURE-



[SECURITY] [DLA 841-1] apache2 security update

2017-02-28 Thread Antoine Beaupré
Package: apache2
Version: 2.2.22-13+deb7u8
CVE ID : CVE-2016-8743

This upload fixes a security vulnerability in the header parsing code.

David Dennerline, of IBM Security's X-Force Researchers, and Régis
Leroy discovered problems in the way Apache handled a broad pattern of
unusual whitespace patterns in HTTP requests. In some configurations,
this could lead to response splitting or cache pollution
vulnerabilities. To fix these issues, this update makes Apache httpd
be more strict in what HTTP requests it accepts.

If this causes problems with non-conforming clients, some checks can
be relaxed by adding the new directive "HttpProtocolOptions unsafe" to
the configuration.  More information is available at

http://httpd.apache.org/docs/2.4/mod/core.html#httpprotocoloptions

For Debian 7 "Wheezy", these problems have been fixed in version
2.2.22-13+deb7u8.

We recommend that you upgrade your apache2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


signature.asc
Description: PGP signature


[SECURITY] [DLA 840-1] libplist security update

2017-02-28 Thread Markus Koschany
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Package: libplist
Version: 1.8-1+deb7u2
CVE ID : CVE-2017-5834 CVE-2017-5835
Debian Bug : 854000

Several vulnerabilities were discovered in libplist, a library for
reading and writing the Apple binary and XML property lists format. A
maliciously crafted plist file could cause an application to crash by
triggering a heap-based buffer overflow and memory allocation error in
the plist_from_bin function.

For Debian 7 "Wheezy", these problems have been fixed in version
1.8-1+deb7u2.

We recommend that you upgrade your libplist packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
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=wMLv
-END PGP SIGNATURE-