[SECURITY] [DLA 666-1] guile-2.0 security update

2016-10-18 Thread Markus Koschany
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Package: guile-2.0 Version: 2.0.5+1-3+deb7u1 CVE ID : CVE-2016-8605 CVE-2016-8606 Debian Bug : 840555 840556 Several vulnerabilities were discovered in GNU Guile, an implementation of the Scheme programming language.

[SECURITY] [DLA 665-1] libgd2 security update

2016-10-18 Thread Thorsten Alteholz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Package: libgd2 Version: 2.0.36~rc1~dfsg-6.1+deb7u6 CVE ID : CVE-2016-6911 CVE-2016-8670 CVE-2016-6911 invalid read in gdImageCreateFromTiffPtr() (most of the code is not present in the Wheezy version)

[SECURITY] [DLA 663-1] tor security update

2016-10-18 Thread Peter Palfrader
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: tor Version: 0.2.4.27-2 It has been discovered that Tor treats the contents of some buffer chunks as if they were a NUL-terminated string. This issue could enable a remote attacker to crash a Tor client, hidden service,

[SECURITY] [DLA 664-1] libxrender security update

2016-10-18 Thread Markus Koschany
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Package: libxrender Version: 1:0.9.7-1+deb7u3 CVE ID : CVE-2016-7949 CVE-2016-7950 Debian Bug : 840443 Tobias Stoeckmann from the OpenBSD project has discovered a number of issues in the way various X client libraries

[SECURITY] [DLA 662-1] quagga security update

2016-10-18 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: quagga Version: 0.99.22.4-1+wheezy3+deb7u1 CVE ID : CVE-2016-1245 Debian Bug : 841162 It was discovered that there was stack overrun in IPv6 RA receive code in quagga, a BGP/OSPF/RIP routing daemon. The buffer