Debian 10206 Published by

The following updates has been released for Debian 6 LTS:

[DLA 331-1] polarssl security update
[DLA 332-1] optipng security update



[DLA 331-1] polarssl security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package : polarssl
Version : 1.2.9-1~deb6u5
CVE ID : CVE-2015-5291

A flaw was found in PolarSSl and mbed TLS:

When the client creates its ClientHello message, due to insufficient
bounds checking it can overflow the heap-based buffer containing the
message while writing some extensions. Two extensions in particular could
be used by a remote attacker to trigger the overflow: the session ticket
extension and the server name indication (SNI) extension.

Although most of the vulnerable code is not present in the Squeeze
version, this upload contains at least a length check for incoming data.

[DLA 332-1] optipng security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package : optipng
Version : 0.6.4-1+deb6u11
CVE ID : CVE-2015-7801

Gustavo Grieco discovered a use-after-free causing an invalid/double
free in optipng 0.6.4.

For Debian 6 Squeeze, this issue has been fixed in optipng version
0.6.4-1+deb6u11.