Debian 10228 Published by

The following updates has been released for Debian:

[DLA 501-1] gdk-pixbuf security update
[DSA 3591-1] imagemagick security update
[DSA 3592-1] nginx security update



[DLA 501-1] gdk-pixbuf security update

Package : gdk-pixbuf
Version : 2.26.1-1+deb7u5
CVE ID : CVE-2015-7552


It was discovered that the original fix for CVE-2015-7552 (DLA-450-1)
was incomplete.

A heap-based buffer overflow in gdk-pixbuf, a library for image
loading and saving facilities, fast scaling and compositing of
pixbufs, allows remote attackers to cause a denial of service or
possibly execute arbitrary code via a crafted BMP file.

For Debian 7 "Wheezy", these problems have been fixed in version
2.26.1-1+deb7u5.

We recommend that you upgrade your gdk-pixbuf packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


[DSA 3591-1] imagemagick security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3591-1 security@debian.org
https://www.debian.org/security/ Luciano Bello
June 01, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : imagemagick
CVE ID : CVE-2016-5118
Debian Bug : 825799

Bob Friesenhahn from the GraphicsMagick project discovered a command
injection vulnerability in ImageMagick, a program suite for image
manipulation. An attacker with control on input image or the input
filename can execute arbitrary commands with the privileges of the user
running the application.

This update removes the possibility of using pipe (|) in filenames to
interact with imagemagick.

It is important that you upgrade the libmagickcore-6.q16-2 and not just
the imagemagick package. Applications using libmagickcore-6.q16-2 might
also be affected and need to be restarted after the upgrade.

For the stable distribution (jessie), this problem has been fixed in
version 6.8.9.9-5+deb8u3.

We recommend that you upgrade your imagemagick packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3592-1] nginx security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3592-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 01, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : nginx
CVE ID : CVE-2016-4450

It was discovered that a NULL pointer dereference in the Nginx code
responsible for saving client request bodies to a temporary file might
result in denial of service: Malformed requests could crash worker
processes.

For the stable distribution (jessie), this problem has been fixed in
version 1.6.2-5+deb8u2.

For the unstable distribution (sid), this problem has been fixed in
version 1.10.1-1.

We recommend that you upgrade your nginx packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/