Jump to content


NEW UPDATES Debian

debian updates sunrat bruno v.t. eric layton

  • Please log in to reply
1333 replies to this topic

#1326 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,321 posts

Posted 20 September 2017 - 07:07 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3980-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 20, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : apache2
CVE ID         : CVE-2017-9798
Debian Bug     : 876109

Hanno Boeck discovered that incorrect parsing of Limit directives of
.htaccess files by the Apache HTTP Server could result in memory
disclosure.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.4.10-10+deb8u11.

For the stable distribution (stretch), this problem has been fixed in
version 2.4.25-3+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3981-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 20, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2017-7518 CVE-2017-7558 CVE-2017-10661 CVE-2017-11600
                 CVE-2017-12134 CVE-2017-12146 CVE-2017-12153 CVE-2017-12154
                 CVE-2017-14106 CVE-2017-14140 CVE-2017-14156 CVE-2017-14340
                 CVE-2017-14489 CVE-2017-14497 CVE-2017-1000111 CVE-2017-1000112
                 CVE-2017-1000251 CVE-2017-1000252 CVE-2017-1000370 CVE-2017-1000371
                 CVE-2017-1000380
Debian Bug     : 866511 875881

Several vulnerabilities have been discovered in the Linux kernel that
may lead to privilege escalation, denial of service or information
leaks.

CVE-2017-7518

    Andy Lutomirski discovered that KVM is prone to an incorrect debug
    exception (#DB) error occurring while emulating a syscall
    instruction. A process inside a guest can take advantage of this
    flaw for privilege escalation inside a guest.

CVE-2017-7558 (stretch only)

    Stefano Brivio of Red Hat discovered that the SCTP subsystem is
    prone to a data leak vulnerability due to an out-of-bounds read
    flaw, allowing to leak up to 100 uninitialized bytes to userspace.

CVE-2017-10661 (jessie only)

    Dmitry Vyukov of Google reported that the timerfd facility does
    not properly handle certain concurrent operations on a single file
    descriptor.  This allows a local attacker to cause a denial of
    service or potentially execute arbitrary code.

CVE-2017-11600

    Bo Zhang reported that the xfrm subsystem does not properly
    validate one of the parameters to a netlink message. Local users
    with the CAP_NET_ADMIN capability can use this to cause a denial
    of service or potentially to execute arbitrary code.

CVE-2017-12134 / #866511 / XSA-229

    Jan H. Schoenherr of Amazon discovered that when Linux is running
    in a Xen PV domain on an x86 system, it may incorrectly merge
    block I/O requests.  A buggy or malicious guest may trigger this
    bug in dom0 or a PV driver domain, causing a denial of service or
    potentially execution of arbitrary code.

    This issue can be mitigated by disabling merges on the underlying
    back-end block devices, e.g.:
        echo 2 > /sys/block/nvme0n1/queue/nomerges

CVE-2017-12146 (stretch only)

    Adrian Salido of Google reported a race condition in access to the
    "driver_override" attribute for platform devices in sysfs. If
    unprivileged users are permitted to access this attribute, this
    might allow them to gain privileges.

CVE-2017-12153

    bo Zhang reported that the cfg80211 (wifi) subsystem does not
    properly validate the parameters to a netlink message. Local users
    with the CAP_NET_ADMIN capability (in any user namespace with a
    wifi device) can use this to cause a denial of service.

CVE-2017-12154

    Jim Mattson of Google reported that the KVM implementation for
    Intel x86 processors did not correctly handle certain nested
    hypervisor configurations. A malicious guest (or nested guest in a
    suitable L1 hypervisor) could use this for denial of service.

CVE-2017-14106

    Andrey Konovalov discovered that a user-triggerable division by
    zero in the tcp_disconnect() function could result in local denial
    of service.

CVE-2017-14140

    Otto Ebeling reported that the move_pages() system call performed
    insufficient validation of the UIDs of the calling and target
    processes, resulting in a partial ASLR bypass. This made it easier
    for local users to exploit vulnerabilities in programs installed
    with the set-UID permission bit set.

CVE-2017-14156

    "sohu0106" reported an information leak in the atyfb video driver.
    A local user with access to a framebuffer device handled by this
    driver could use this to obtain sensitive information.

CVE-2017-14340

    Richard Wareing discovered that the XFS implementation allows the
    creation of files with the "realtime" flag on a filesystem with no
    realtime device, which can result in a crash (oops). A local user
    with access to an XFS filesystem that does not have a realtime
    device can use this for denial of service.

CVE-2017-14489

    ChunYu Wang of Red Hat discovered that the iSCSI subsystem does not
    properly validate the length of a netlink message, leading to
    memory corruption. A local user with permission to manage iSCSI
    devices can use this for denial of service or possibly to execute
    arbitrary code.

CVE-2017-14497 (stretch only)

    Benjamin Poirier of SUSE reported that vnet headers are not
    properly handled within the tpacket_rcv() function in the raw
    packet (af_packet) feature. A local user with the CAP_NET_RAW
    capability can take advantage of this flaw to cause a denial of
    service (buffer overflow, and disk and memory corruption) or have
    other impact.

CVE-2017-1000111

    Andrey Konovalov of Google reported a race condition in the raw
    packet (af_packet) feature. Local users with the CAP_NET_RAW
    capability can use this for denial of service or possibly to
    execute arbitrary code.

CVE-2017-1000112

    Andrey Konovalov of Google reported a race condition flaw in the
    UDP Fragmentation Offload (UFO) code. A local user can use this
    flaw for denial of service or possibly to execute arbitrary code.

CVE-2017-1000251 / #875881

    Armis Labs discovered that the Bluetooth subsystem does not
    properly validate L2CAP configuration responses, leading to a
    stack buffer overflow. This is one of several vulnerabilities
    dubbed "Blueborne". A nearby attacker can use this to cause a
    denial of service or possibly to execute arbitrary code on a
    system with Bluetooth enabled.

CVE-2017-1000252 (stretch only)

    Jan H. Schoenherr of Amazon reported that the KVM implementation
    for Intel x86 processors did not correctly validate interrupt
    injection requests. A local user with permission to use KVM could
    use this for denial of service.

CVE-2017-1000370

    The Qualys Research Labs reported that a large argument or
    environment list can result in ASLR bypass for 32-bit PIE binaries.

CVE-2017-1000371

    The Qualys Research Labs reported that a large argument
    orenvironment list can result in a stack/heap clash for 32-bit
    PIE binaries.

CVE-2017-1000380

    Alexander Potapenko of Google reported a race condition in the ALSA
    (sound) timer driver, leading to an information leak. A local user
    with permission to access sound devices could use this to obtain
    sensitive information.

Debian disables unprivileged user namespaces by default, but if they
are enabled (via the kernel.unprivileged_userns_clone sysctl) then
CVE-2017-11600, CVE-2017-14497 and CVE-2017-1000111 can be exploited
by any local user.

For the oldstable distribution (jessie), these problems have been fixed
in version 3.16.43-2+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 4.9.30-2+deb9u5.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1327 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,321 posts

Posted 22 September 2017 - 06:13 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3982-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 21, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : perl
CVE ID         : CVE-2017-12837 CVE-2017-12883
Debian Bug     : 875596 875597

Multiple vulnerabilities were discovered in the implementation of the
Perl programming language. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2017-12837

    Jakub Wilk reported a heap buffer overflow flaw in the regular
    expression compiler, allowing a remote attacker to cause a denial of
    service via a specially crafted regular expression with the
    case-insensitive modifier.

CVE-2017-12883

    Jakub Wilk reported a buffer over-read flaw in the regular
    expression parser, allowing a remote attacker to cause a denial of
    service or information leak.

For the oldstable distribution (jessie), these problems have been fixed
in version 5.20.2-3+deb8u9.

For the stable distribution (stretch), these problems have been fixed in
version 5.24.1-3+deb9u2.

For the testing distribution (buster), these problems have been fixed
in version 5.26.0-8.

For the unstable distribution (sid), these problems have been fixed in
version 5.26.0-8.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3983-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 22, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : samba
CVE ID         : CVE-2017-12150 CVE-2017-12151 CVE-2017-12163

Multiple security issues have been discoverd in Samba, a SMB/CIFS file,
print, and login server for Unix:

CVE-2017-12150

    Stefan Metzmacher discovered multiple code paths where SMB signing
    was not enforced.

CVE-2017-12151

    Stefan Metzmacher discovered that tools using libsmbclient did not
    enforce encryption when following DFS redirects, which could allow a
    man-in-the-middle attacker to read or modify connections which were
    meant to be encrypted.

CVE-2017-12163

    Yihan Lian and Zhibin Hu discovered that insufficient range checks
    in the processing of SMB1 write requests could result in disclosure
    of server memory.

For the oldstable distribution (jessie), these problems have been fixed
in version 2:4.2.14+dfsg-0+deb8u8.

For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.8+dfsg-2+deb9u2.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1328 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,321 posts

Posted 26 September 2017 - 07:31 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3984-1                   security@debian.org
https://www.debian.org/security/                           Florian Weimer
September 26, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : git
Debian Bug     : 876854

joernchen discovered that the git-cvsserver subcommand of Git, a
distributed version control system, suffers from a shell command
injection vulnerability due to unsafe use of the Perl backtick
operator.  The git-cvsserver subcommand is reachable from the
git-shell subcommand even if CVS support has not been configured
(however, the git-cvs package needs to be installed).

In addition to fixing the actual bug, this update removes the
cvsserver subcommand from git-shell by default.  Refer to the updated
documentation for instructions how to reenable in case this CVS
functionality is still needed.

For the oldstable distribution (jessie), this problem has been fixed
in version 1:2.1.4-2.1+deb8u5.

For the stable distribution (stretch), this problem has been fixed in
version 1:2.11.0-3+deb9u2.

For the unstable distribution (sid), this problem has been fixed in
version 1:2.14.2-1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1329 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,321 posts

Posted 28 September 2017 - 08:23 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3985-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
September 28, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
CVE ID         : CVE-2017-5111 CVE-2017-5112 CVE-2017-5113 CVE-2017-5114
                 CVE-2017-5115 CVE-2017-5116 CVE-2017-5117 CVE-2017-5118
                 CVE-2017-5119 CVE-2017-5120 CVE-2017-5121 CVE-2017-5122

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2017-5111

    Luat Nguyen discovered a use-after-free issue in the pdfium library.

CVE-2017-5112

    Tobias Klein discovered a buffer overflow issue in the webgl
    library.

CVE-2017-5113

    A buffer overflow issue was discovered in the skia library.

CVE-2017-5114

    Ke Liu discovered a memory issue in the pdfium library.

CVE-2017-5115

    Marco Giovannini discovered a type confusion issue in the v8
    javascript library.

CVE-2017-5116

    Guang Gong discovered a type confusion issue in the v8 javascript
    library.

CVE-2017-5117

    Tobias Klein discovered an uninitialized value in the skia library.

CVE-2017-5118

    WenXu Wu discovered a way to bypass the Content Security Policy.

CVE-2017-5119

    Another uninitialized value was discovered in the skia library.

CVE-2017-5120

    Xiaoyin Liu discovered a way downgrade HTTPS connections during
    redirection.

CVE-2017-5121

    Jordan Rabet discovered an out-of-bounds memory access in the v8
    javascript library.

CVE-2017-5122

    Choongwoo Han discovered an out-of-bounds memory access in the v8
    javascript library.

For the stable distribution (stretch), these problems have been fixed in
version 61.0.3163.100-1~deb9u1.

For the testing distribution (buster), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 61.0.3163.100-1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1330 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,321 posts

Posted 30 September 2017 - 07:28 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3986-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 29, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ghostscript
CVE ID         : CVE-2017-9611 CVE-2017-9612 CVE-2017-9726 CVE-2017-9727
                 CVE-2017-9739 CVE-2017-9835 CVE-2017-11714
Debian Bug     : 869907 869910 869913 869915 869916 869917 869977

Several vulnerabilities were discovered in Ghostscript, the GPL
PostScript/PDF interpreter, which may result in denial of service if a
specially crafted Postscript file is processed.

For the oldstable distribution (jessie), these problems have been fixed
in version 9.06~dfsg-2+deb8u6.

For the stable distribution (stretch), these problems have been fixed in
version 9.20~dfsg-3.2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3987-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 29, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2017-7793 CVE-2017-7805 CVE-2017-7810 CVE-2017-7814
                 CVE-2017-7818 CVE-2017-7819 CVE-2017-7823 CVE-2017-7824

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees, buffer
overflows and other implementation errors may lead to the execution of
arbitrary code, denial of service, cross-site scripting or bypass of
the phishing and malware protection feature.

For the oldstable distribution (jessie), these problems have been fixed
in version 52.4.0esr-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 52.4.0esr-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3988-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 30, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libidn2-0
CVE ID         : CVE-2017-14062
Debian Bug     : 873902

An integer overflow vulnerability was discovered in decode_digit() in
libidn2-0, the GNU library for Internationalized Domain Names (IDNs),
allowing a remote attacker to cause a denial of service against an
application using the library (application crash).

For the oldstable distribution (jessie), this problem has been fixed
in version 0.10-2+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 0.16-1+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 2.0.2-4.

For the unstable distribution (sid), this problem has been fixed in
version 2.0.2-4.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1331 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,321 posts

Posted 06 October 2017 - 06:55 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3989-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
October 02, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : dnsmasq
CVE ID         : CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494
                 CVE-2017-14495 CVE-2017-14496

Felix Wilhelm, Fermin J. Serna, Gabriel Campana, Kevin Hamacher, Ron
Bowes and Gynvael Coldwind of the Google Security Team discovered
several vulnerabilities in dnsmasq, a small caching DNS proxy and
DHCP/TFTP server, which may result in denial of service, information
leak or the execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 2.72-3+deb8u2.

For the stable distribution (stretch), these problems have been fixed in
version 2.76-5+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3990-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 03, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : asterisk
CVE ID         : CVE-2017-14603

Klaus-Peter Junghann discovered that insufficient validation of RTCP
packets in Asterisk may result in an information leak. Please see the
upstream advisory at
http://downloads.ast...T-2017-008.html for
additional details.

For the oldstable distribution (jessie), this problem has been fixed
in version 1:11.13.1~dfsg-2+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 1:13.14.1~dfsg-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3991-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 03, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : qemu
CVE ID         : CVE-2017-9375 CVE-2017-12809 CVE-2017-13672 CVE-2017-13711
                 CVE-2017-14167

Multiple vulnerabilities were found in in qemu, a fast processor emulator:

CVE-2017-9375

    Denial of service via memory leak in USB XHCI emulation.
      
CVE-2017-12809

    Denial of service in the CDROM device drive emulation.

CVE-2017-13672

    Denial of service in VGA display emulation.

CVE-2017-13711

    Denial of service in SLIRP networking support.

CVE-2017-14167

    Incorrect validation of multiboot headers could result in the
    execution of arbitrary code.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3992-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
October 06, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : curl
CVE ID         : CVE-2017-1000100 CVE-2017-1000101 CVE-2017-1000254
Debian Bug     : 871554 871555 877671

Several vulnerabilities have been discovered in cURL, an URL transfer
library. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2017-1000100

    Even Rouault reported that cURL does not properly handle long file
    names when doing an TFTP upload. A malicious HTTP(S) server can take
    advantage of this flaw by redirecting a client using the cURL
    library to a crafted TFTP URL and trick it to send private memory
    contents to a remote server over UDP.

CVE-2017-1000101

    Brian Carpenter and Yongji Ouyang reported that cURL contains a flaw
    in the globbing function that parses the numerical range, leading to
    an out-of-bounds read when parsing a specially crafted URL.

CVE-2017-1000254

    Max Dymond reported that cURL contains an out-of-bounds read flaw in
    the FTP PWD response parser. A malicious server can take advantage
    of this flaw to effectively prevent a client using the cURL library
    to work with it, causing a denial of service.

For the oldstable distribution (jessie), these problems have been fixed
in version 7.38.0-4+deb8u6.

For the stable distribution (stretch), these problems have been fixed in
version 7.52.1-5+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3993-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 06, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tor
CVE ID         : CVE-2017-0380

It was discovered that the Tor onion service could leak sensitive
information to log files if the "SafeLogging" option is set to "0".

The oldstable distribution (jessie) is not affected.

For the stable distribution (stretch), this problem has been fixed in
version 0.2.9.12-1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1332 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,321 posts

Posted 08 October 2017 - 06:18 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3994-1                   security@debian.org
https://www.debian.org/security/                        Yves-Alexis Perez
October 07, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : nautilus
CVE ID         : CVE-2017-14604
Debian Bug     : 860268

Christian Boxdörfer discovered a vulnerability in the handling of
FreeDesktop.org .desktop files in Nautilus, a file manager for the GNOME
desktop environment. An attacker can craft a .desktop file intended to run
malicious commands but displayed as a innocuous document file in Nautilus. An
user would then trust it and open the file, and Nautilus would in turn execute
the malicious content. Nautilus protection of only trusting .desktop files with
executable permission can be bypassed by shipping the .desktop file inside a
tarball.

For the oldstable distribution (jessie), this problem has not been fixed yet.

For the stable distribution (stretch), this problem has been fixed in
version 3.22.3-1+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 3.26.0-1.

For the unstable distribution (sid), this problem has been fixed in
version 3.26.0-1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1333 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,321 posts

Posted 11 October 2017 - 06:43 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3995-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 10, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libxfont
CVE ID         : CVE-2017-13720 CVE-2017-13722

Two vulnerabilities were found in libXfont, the X11 font rasterisation
library, which could result in denial of service or memory disclosure.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:1.5.1-1+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.0.1-3+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3996-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 10, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ffmpeg
CVE ID         : CVE-2017-14054 CVE-2017-14055 CVE-2017-14056
                 CVE-2017-14057 CVE-2017-14058 CVE-2017-14059
CVE-2017-14169 CVE-2017-14170 CVE-2017-14171
CVE-2017-14222 CVE-2017-14223 CVE-2017-14225
                 CVE-2017-14767

Several vulnerabilities have been discovered in the FFmpeg multimedia
framework, which could result in denial of service or potentially the
execution of arbitrary code if malformed Real, MV, RL2, ASF, Apple HLS,
Phantom Cine, MXF, NSV, MOV or RTP H.264 files/streams are processed.

For the stable distribution (stretch), these problems have been fixed in
version 7:3.2.8-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3997-1                   security@debian.org
https://www.debian.org/security/                        Yves-Alexis Perez
October 10, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wordpress
CVE ID         : CVE-2017-14718 CVE-2017-14719 CVE-2017-14720 CVE-2017-14721
                 CVE-2017-14722 CVE-2017-14723 CVE-2017-14724 CVE-2017-14725
                 CVE-2017-14726 CVE-2017-14990
Debian Bug     : 876274 877629

Several vulnerabilities were discovered in Wordpress, a web blogging tool.
They would allow remote attackers to exploit path-traversal issues, perform SQL
injections and various cross-site scripting attacks.

For the oldstable distribution (jessie), these problems have been fixed
in version 4.1+dfsg-1+deb8u15.

For the stable distribution (stretch), these problems have been fixed in
version 4.7.5+dfsg-2+deb9u1.

For the testing distribution (buster), these problems have been fixed
in version 4.8.2+dfsg-2.

For the unstable distribution (sid), these problems have been fixed in
version 4.8.2+dfsg-2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3998-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
October 11, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : nss
CVE ID         : CVE-2017-7805

Martin Thomson discovered that nss, the Mozilla Network Security Service
library, is prone to a use-after-free vulnerability in the TLS 1.2
implementation when handshake hashes are generated. A remote attacker
can take advantage of this flaw to cause an application using the nss
library to crash, resulting in a denial of service, or potentially to
execute arbitrary code.

For the oldstable distribution (jessie), this problem has been fixed
in version 2:3.26-1+debu8u3.

For the stable distribution (stretch), this problem has been fixed in
version 2:3.26.2-1.1+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 2:3.33-1.

For the unstable distribution (sid), this problem has been fixed in
version 2:3.33-1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1334 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,321 posts

Posted 16 October 2017 - 05:57 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3999-1                   security@debian.org
https://www.debian.org/security/                        Yves-Alexis Perez
October 16, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wpa
CVE ID         : CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
                 CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087
                 CVE-2017-13088

Mathy Vanhoef of the imec-DistriNet research group of KU Leuven discovered
multiple vulnerabilities in the WPA protocol, used for authentication in
wireless networks. Those vulnerabilities applies to both the access point
(implemented in hostapd) and the station (implemented in wpa_supplicant).

An attacker exploiting the vulnerabilities could force the vulnerable system to
reuse cryptographic session keys, enabling a range of cryptographic attacks
against the ciphers used in WPA1 and WPA2.

More information can be found in the researchers's paper, Key Reinstallation
Attacks: Forcing Nonce Reuse in WPA2.

CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake
CVE-2017-13078: reinstallation of the group key in the Four-way handshake
CVE-2017-13079: reinstallation of the integrity group key in the Four-way
                handshake
CVE-2017-13080: reinstallation of the group key in the Group Key handshake
CVE-2017-13081: reinstallation of the integrity group key in the Group Key
                handshake
CVE-2017-13082: accepting a retransmitted Fast BSS Transition Reassociation
                Request and reinstalling the pairwise key while processing it
CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey
                (TPK) key in the TDLS handshake
CVE-2017-13087: reinstallation of the group key (GTK) when processing a
                Wireless Network Management (WNM) Sleep Mode Response frame
CVE-2017-13088: reinstallation of the integrity group key (IGTK) when
                processing a Wireless Network Management (WNM) Sleep Mode
                Response frame

For the oldstable distribution (jessie), these problems have been fixed
in version 2.3-1+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 2:2.4-1+deb9u1.

For the testing distribution (buster), these problems have been fixed
in version 2:2.4-1.1.

For the unstable distribution (sid), these problems have been fixed in
version 2:2.4-1.1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.





Also tagged with one or more of these keywords: debian, updates, sunrat, bruno, v.t. eric layton

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users