Debian 10203 Published by

The following updates has been released for Debian GNU/Linux 8 and 9:

DSA 4058-1: optipng security update
DSA 4059-1: libxcursor security update



DSA 4058-1: optipng security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4058-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 08, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : optipng
CVE ID : CVE-2017-16938 CVE-2017-1000229
Debian Bug : 878839 882032

Two vulnerabilities were discovered in optipng, an advanced PNG
optimizer, which may result in denial of service or the execution of
arbitrary code if a malformed file is processed.

For the oldstable distribution (jessie), these problems have been fixed
in version 0.7.5-1+deb8u2.

For the stable distribution (stretch), these problems have been fixed in
version 0.7.6-1+deb9u1.

We recommend that you upgrade your optipng packages.

For the detailed security status of optipng please refer to its security
tracker page at: https://security-tracker.debian.org/tracker/optipng

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/



DSA 4059-1: libxcursor security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4059-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 08, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libxcursor
CVE ID : CVE-2017-16612
Debian Bug : 883792

It was discovered that libXcursor, a X cursor management library, is
prone to several heap overflows when parsing malicious files. An
attacker can take advantage of these flaws for arbitrary code execution,
if a user is tricked into processing a specially crafted cursor file.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:1.1.14-1+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:1.1.14-1+deb9u1.

We recommend that you upgrade your libxcursor packages.

For the detailed security status of libxcursor please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/libxcursor

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/