Jump to content


NEW UPDATES Debian

debian updates sunrat bruno v.t. eric layton

  • Please log in to reply
1440 replies to this topic

#1351 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 17 November 2017 - 07:50 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4040-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 17, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : imagemagick
CVE ID         : CVE-2017-11352 CVE-2017-11640 CVE-2017-12431
                 CVE-2017-12640 CVE-2017-12877 CVE-2017-12983
CVE-2017-13134 CVE-2017-13139 CVE-2017-13144
CVE-2017-13758 CVE-2017-13769 CVE-2017-14224
                 CVE-2017-14607 CVE-2017-14682 CVE-2017-14989
CVE-2017-15277 CVE-2017-16546

This update fixes several vulnerabilities in imagemagick: Various memory
handling problems and cases of missing or incomplete input sanitising
may result in denial of service, memory disclosure or the execution of
arbitrary code if malformed image files are processed.

For the oldstable distribution (jessie), these problems have been fixed
in version 8:6.8.9.9-5+deb8u11.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1352 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 19 November 2017 - 06:41 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4041-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 19, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : procmail
CVE ID         : CVE-2017-16844
Debian Bug     : 876511

Jakub Wilk reported a heap-based buffer overflow vulnerability in
procmail's formail utility when processing specially-crafted email
headers. A remote attacker could use this flaw to cause formail to
crash, resulting in a denial of service or data loss.

For the oldstable distribution (jessie), this problem has been fixed
in version 3.22-24+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 3.22-25+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4042-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 19, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libxml-libxml-perl
CVE ID         : CVE-2017-10672
Debian Bug     : 866676

A use-after-free vulnerability was discovered in XML::LibXML, a Perl
interface to the libxml2 library, allowing an attacker to execute
arbitrary code by controlling the arguments to a replaceChild() call.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.0116+dfsg-1+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 2.0128+dfsg-1+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1353 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 22 November 2017 - 07:58 AM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4043-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 21, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : samba
CVE ID         : CVE-2017-14746 CVE-2017-15275

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

CVE-2017-14746

    Yihan Lian and Zhibin Hu of Qihoo 360 GearTeam discovered a
    use-after-free vulnerability allowing a client to compromise a SMB
    server via malicious SMB1 requests.

CVE-2017-15275

    Volker Lendecke of SerNet and the Samba team discovered that Samba
    is prone to a heap memory information leak, where server allocated
    heap memory may be returned to the client without being cleared.

For the oldstable distribution (jessie), these problems have been fixed
in version 2:4.2.14+dfsg-0+deb8u9.

For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.12+dfsg-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4044-1                   security@debian.org
https://www.debian.org/security/                        Yves-Alexis Perez
November 21, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : swauth
CVE ID         : CVE-2017-16613
Debian Bug     : 882314

A vulnerability has been discovered in swauth, an authentication system for
Swift, a distributed virtual object store used in Openstack.

The authentication token for an user is saved in clear text to the log file,
which could enable an attacker with access to the logs to bypass the
authentication provided by swauth.

For the stable distribution (stretch), this problem has been fixed in
version 1.2.0-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4045-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 21, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : vlc
CVE ID         : CVE-2017-9300 CVE-2017-10699

Several vulnerabilities have been found in VLC, the VideoLAN project's
media player. Processing malformed media files could lead to denial of
service and potentially the execution of arbitrary code.
      
For the oldstable distribution (jessie), these problems have been fixed
in version 2.2.7-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 2.2.7-1~deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1354 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 22 November 2017 - 06:22 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4046-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
November 22, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libspring-ldap-java
CVE ID         : CVE-2017-8028

Tobias Schneider discovered that libspring-ldap-java, a Java library
for Spring-based applications using the Lightweight Directory Access
Protocol, would under some circumstances allow authentication with a
correct username but an arbitrary password.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.3.1.RELEASE-5+deb8u1.

We recommend that you upgrade your libspring-ldap-java packages.

For the detailed security status of libspring-ldap-java please refer to
its security tracker page at:
https://security-tra...pring-ldap-java
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1355 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 23 November 2017 - 06:36 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4047-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 23, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : otrs2
CVE ID         : CVE-2017-15864 CVE-2017-16664

Two vulnerabilities were discovered in the Open Ticket Request System
which could result in disclosure of database credentials or the
execution of arbitrary shell commands by logged-in agents.

For the oldstable distribution (jessie), these problems have been fixed
in version 3.3.18-1+deb8u2.

For the stable distribution (stretch), these problems have been fixed in
version 5.0.16-1+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4048-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 23, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openjdk-7
CVE ID         : CVE-2017-10274 CVE-2017-10281 CVE-2017-10285 CVE-2017-10295
                 CVE-2017-10345 CVE-2017-10346 CVE-2017-10347 CVE-2017-10348
                 CVE-2017-10349 CVE-2017-10350 CVE-2017-10355 CVE-2017-10356
                 CVE-2017-10357 CVE-2017-10388

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in impersonation
of Kerberos services, denial of service, sandbox bypass or HTTP header
injection.

For the oldstable distribution (jessie), these problems have been fixed
in version 7u151-2.6.11-2~deb8u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1356 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 27 November 2017 - 06:32 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4049-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 27, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ffmpeg
CVE ID         : CVE-2017-15186 CVE-2017-15672 CVE-2017-16840

Several vulnerabilities have been discovered in the FFmpeg multimedia
framework, which could result in denial of service or potentially the
execution of arbitrary code if malformed files/streams are processed.
      
For the stable distribution (stretch), these problems have been fixed in
version 7:3.2.9-1~deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1357 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 30 November 2017 - 12:51 AM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4050-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 28, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xen
CVE ID         : CVE-2017-14316 CVE-2017-14317 CVE-2017-14318 CVE-2017-14319
                 CVE-2017-15588 CVE-2017-15589 CVE-2017-15590 CVE-2017-15592
                 CVE-2017-15593 CVE-2017-15594 CVE-2017-15595 CVE-2017-15597

Multiple vulnerabilities have been discovered in the Xen hypervisor, which
could result in denial of service, information leaks, privilege escalation
or the execution of arbitrary code.

For the oldstable distribution (jessie) a separate update will be
released.

For the stable distribution (stretch), these problems have been fixed in
version 4.8.2+xsa245-0+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4051-1                   security@debian.org
https://www.debian.org/security/                        Yves-Alexis Perez
November 29, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : curl
CVE ID         : CVE-2017-8816 CVE-2017-8817

Two vulnerabilities were discovered in cURL, an URL transfer library.

CVE-2017-8816

    Alex Nichols discovered a buffer overrun flaw in the NTLM authentication
    code which can be triggered on 32bit systems where an integer overflow
    might occur when calculating the size of a memory allocation.

CVE-2017-8817

    Fuzzing by the OSS-Fuzz project led to the discovery of a read out of
    bounds flaw in the FTP wildcard function in libcurl. A malicious server
    could redirect a libcurl-based client to an URL using a wildcard pattern,
    triggering the out-of-bound read.

For the oldstable distribution (jessie), these problems have been fixed
in version 7.38.0-4+deb8u8.

For the stable distribution (stretch), these problems have been fixed in
version 7.52.1-5+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4052-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 29, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : bzr
CVE ID         : CVE-2017-14176
Debian Bug     : 874429

Adam Collard discovered that Bazaar, an easy to use distributed version
control system, did not correctly handle maliciously constructed bzr+ssh
URLs, allowing a remote attackers to run an arbitrary shell command.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.6.0+bzr6595-6+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 2.7.0+bzr6619-7+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1358 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 01 December 2017 - 09:39 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4053-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 30, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : exim4
CVE ID         : CVE-2017-16943 CVE-2017-16944
Debian Bug     : 882648 882671

Several vulnerabilities have been discovered in Exim, a mail transport
agent. The Common Vulnerabilities and Exposures project identifies the
following issues:

CVE-2017-16943

    A use-after-free vulnerability was discovered in Exim's routines
    responsible for parsing mail headers. A remote attacker can take
    advantage of this flaw to cause Exim to crash, resulting in a denial
    of service, or potentially for remote code execution.

CVE-2017-16944

    It was discovered that Exim does not properly handle BDAT data
    headers allowing a remote attacker to cause Exim to crash, resulting
    in a denial of service.

For the stable distribution (stretch), these problems have been fixed in
version 4.89-2+deb9u2. Default installations disable advertising the
ESMTP CHUNKING extension and are not affected by these issues.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1359 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 03 December 2017 - 07:41 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4054-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 03, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tor
CVE ID         : CVE-2017-8819 CVE-2017-8820 CVE-2017-8821 CVE-2017-8822
                 CVE-2017-8823

Multiple vulnerabilities have been found in Tor, a connection-based
low-latency anonymous communication system.

For the oldstable distribution (jessie), these problems have been fixed
in version 0.2.5.16-1.

For the stable distribution (stretch), these problems have been fixed in
version 0.2.9.14-1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1360 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 07 December 2017 - 10:37 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4055-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
December 07, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : heimdal
CVE ID         : CVE-2017-17439
Debian Bug     : 878144

Michael Eder and Thomas Kittel discovered that Heimdal, an
implementation of Kerberos 5 that aims to be compatible with MIT
Kerberos, did not correctly handle ASN.1 data. This would allow an
unauthenticated remote attacker to cause a denial of service (crash of
the KDC daemon) by sending maliciously crafted packets.

For the stable distribution (stretch), this problem has been fixed in
version 7.1.0+dfsg-13+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4056-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
December 07, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : nova
CVE ID         : CVE-2017-16239
Debian Bug     : 882009

George Shuklin from servers.com discovered that Nova, a cloud
computing fabric controller, did not correctly enforce its image- or
hosts-filters. This allowed an authenticated user to bypass those
filters by simply rebuilding an instance.

For the stable distribution (stretch), this problem has been fixed in
version 2:14.0.0-4+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1361 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 08 December 2017 - 06:56 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4057-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 08, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : erlang
CVE ID         : CVE-2017-1000385

It was discovered that the TLS server in Erlang is vulnerable to an
adaptive chosen ciphertext attack against RSA keys.

For the oldstable distribution (jessie), this problem has been fixed
in version 1:17.3-dfsg-4+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 1:19.2.1+dfsg-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4058-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
December 08, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : optipng
CVE ID         : CVE-2017-16938 CVE-2017-1000229
Debian Bug     : 878839 882032

Two vulnerabilities were discovered in optipng, an advanced PNG
optimizer, which may result in denial of service or the execution of
arbitrary code if a malformed file is processed.

For the oldstable distribution (jessie), these problems have been fixed
in version 0.7.5-1+deb8u2.

For the stable distribution (stretch), these problems have been fixed in
version 0.7.6-1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4059-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
December 08, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libxcursor
CVE ID         : CVE-2017-16612
Debian Bug     : 883792

It was discovered that libXcursor, a X cursor management library, is
prone to several heap overflows when parsing malicious files. An
attacker can take advantage of these flaws for arbitrary code execution,
if a user is tricked into processing a specially crafted cursor file.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:1.1.14-1+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:1.1.14-1+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1362 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 09 December 2017 - 07:09 PM

New update versions for Stretch and Jessie. Open the News links for a full list of updated packages.

------------------------------------------------------------------------
The Debian Project                               https://www.debian.org/
Updated Debian 9: 9.3 released                          press@debian.org
December 9th, 2017           https://www.debian.o...2017/2017120902
------------------------------------------------------------------------


The Debian project is pleased to announce the third update of its stable
distribution Debian 9 (codename "stretch"). This point release mainly
adds corrections for security issues, along with a few adjustments for
serious problems. Security advisories have already been published
separately and are referenced where available.

Please note that the point release does not constitute a new version of
Debian 9 but only updates some of the packages included. There is no
need to throw away old "stretch" media. After installation, packages can
be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list

------------------------------------------------------------------------
The Debian Project                               https://www.debian.org/
Updated Debian 8: 8.10 released                         press@debian.org
December 9th, 2017             https://www.debian.o...s/2017/20171209
------------------------------------------------------------------------


The Debian project is pleased to announce the tenth update of its
oldstable distribution Debian 8 (codename "jessie"). This point release
mainly adds corrections for security issues, along with a few
adjustments for serious problems. Security advisories have already been
published separately and are referenced where available.

Please note that the point release does not constitute a new version of
Debian 8 but only updates some of the packages included. There is no
need to throw away old "jessie" media. After installation, packages can
be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1363 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 10 December 2017 - 08:16 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4060-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 09, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2017-11408 CVE-2017-13766 CVE-2017-17083 CVE-2017-17084
                 CVE-2017-17085

It was discovered that wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA,
NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the
execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.12.1+g01b65bf-4+deb8u12.

For the stable distribution (stretch), these problems have been fixed in
version 2.2.6+g32dac6a-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4061-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 10, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : thunderbird
CVE ID         : CVE-2017-7826 CVE-2017-7828 CVE-2017-7830

Multiple security issues have been found in Thunderbird, which may lead
to the execution of arbitrary code or denial of service.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:52.5.0-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:52.5.0-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4062-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 10, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2017-7843

It discovered that the Private Browsing mode in the Mozilla Firefox
web browser allowed to fingerprint a user across multiple sessions
via IndexedDB.

For the oldstable distribution (jessie), this problem has been fixed
in version 52.5.2esr-1~deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 52.5.2esr-1~deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1364 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 12 December 2017 - 07:37 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4063-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 11, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : pdns-recursor
CVE ID         : CVE-2017-15120

Toshifumi Sakaguchi discovered that PowerDNS Recursor, a high-performance
resolving name server was susceptible to denial of service via a crafted
CNAME answer.

The oldstable distribution (jessie) is not affected.

For the stable distribution (stretch), this problem has been fixed in
version 4.0.4-1+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4064-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
December 12, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
CVE ID         : CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410
                 CVE-2017-15411 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416
                 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420
                 CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426
                 CVE-2017-15427

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2017-15407

    Ned Williamson discovered an out-of-bounds write issue.

CVE-2017-15408

    Ke Liu discovered a heap overflow issue in the pdfium library.

CVE-2017-15409

    An out-of-bounds write issue was discovered in the skia library.

CVE-2017-15410

    Luat Nguyen discovered a use-after-free issue in the pdfium library.

CVE-2017-15411

    Luat Nguyen discovered a use-after-free issue in the pdfium library.

CVE-2017-15413

    Gaurav Dewan discovered a type confusion issue.

CVE-2017-15415

    Viktor Brange discovered an information disclosure issue.

CVE-2017-15416

    Ned Williamson discovered an out-of-bounds read issue.

CVE-2017-15417

    Max May discovered an information disclosure issue in the skia
    library.

CVE-2017-15418

    Kushal Arvind Shah discovered an uninitialized value in the skia
    library.

CVE-2017-15419

    Jun Kokatsu discoved an information disclosure issue.

CVE-2017-15420

    WenXu Wu discovered a URL spoofing issue.

CVE-2017-15423

    Greg Hudson discovered an issue in the boringssl library.

CVE-2017-15424

    Khalil Zhani discovered a URL spoofing issue.

CVE-2017-15425

    xisigr discovered a URL spoofing issue.

CVE-2017-15426

    WenXu Wu discovered a URL spoofing issue.

CVE-2017-15427

    Junaid Farhan discovered an issue with the omnibox.

For the stable distribution (stretch), these problems have been fixed in
version 63.0.3239.84-1~deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1365 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 17 December 2017 - 09:25 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4065-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
December 17, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openssl1.0
CVE ID         : CVE-2017-3737 CVE-2017-3738

Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2017-3737

    David Benjamin of Google reported that OpenSSL does not properly
    handle SSL_read() and SSL_write() while being invoked in an error
    state, causing data to be passed without being decrypted or
    encrypted directly from the SSL/TLS record layer.

CVE-2017-3738

    It was discovered that OpenSSL contains an overflow bug in the AVX2
    Montgomery multiplication procedure used in exponentiation with
    1024-bit moduli.

Details can be found in the upstream advisory:
https://www.openssl....dv/20171207.txt

For the stable distribution (stretch), these problems have been fixed in
version 1.0.2l-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4066-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 17, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : otrs2
CVE ID         : CVE-2017-16854 CVE-2017-16921

Two vulnerabilities were discovered in the Open Ticket Request System
which could result in information disclosure  or the execution of arbitrary
shell commands by logged-in agents.
      
For the oldstable distribution (jessie), these problems have been fixed
in version 3.3.18-1+deb8u3.

For the stable distribution (stretch), these problems have been fixed in
version 5.0.16-1+deb9u4.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4067-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 17, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openafs
CVE ID         : CVE-2017-17432

It was discovered that malformed jumbogram packets could result in
denial of service against OpenAFS, an implementation of the Andrew
distributed file system.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.6.9-2+deb8u6. This update also provides corrections for
CVE-2016-4536 and CVE-2016-9772.

For the stable distribution (stretch), this problem has been fixed in
version 1.6.20-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4068-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
December 17, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : rsync
CVE ID         : CVE-2017-16548 CVE-2017-17433 CVE-2017-17434
Debian Bug     : 880954 883665 883667

Several vulnerabilities were discovered in rsync, a fast, versatile,
remote (and local) file-copying tool, allowing a remote attacker to
bypass intended access restrictions or cause a denial of service.

For the oldstable distribution (jessie), these problems have been fixed
in version 3.1.1-3+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 3.1.2-1+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1366 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 21 December 2017 - 07:39 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4069-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
December 20, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : otrs2
CVE ID         : CVE-2017-17476
Debian Bug     : 884801

Francesco Sirocco discovered a flaw in otrs2, the Open Ticket Request
System, which could result in session information disclosure when cookie
support is disabled. A remote attacker can take advantage of this flaw
to take over an agent's session if the agent is tricked into clicking a
link in a specially crafted mail.

For the oldstable distribution (jessie), this problem has been fixed
in version 3.3.18-1+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 5.0.16-1+deb9u5.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4070-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 21, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : enigmail
CVE ID         : not yet available

Multiple vulnerabilities were discovered in Enigmail, an OpenPGP
extension for Thunderbird, which could result in a loss of
confidentiality, faked signatures, plain text leaks and denial of
service. Additional information can be found under
https://enigmail.net...3 - Excerpt.pdf

For the oldstable distribution (jessie), this problem has been fixed
in version 2:1.9.9-1~deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 2:1.9.9-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4071-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
December 21, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : sensible-utils
CVE ID         : CVE-2017-17512
Debian Bug     : 881767

Gabriel Corona reported that sensible-browser from sensible-utils, a
collection of small utilities used to sensibly select and spawn an
appropriate browser, editor or pager, does not validate strings before
launching the program specified by the BROWSER environment variable,
potentially allowing a remote attacker to conduct argument-injection
attacks if a user is tricked into processing a specially crafted URL.

For the oldstable distribution (jessie), this problem has been fixed
in version 0.0.9+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 0.0.9+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4072-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 21, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : bouncycastle
CVE ID         : CVE-2017-13098

Hanno Boeck, Juraj Somorovsky and Craig Young discovered that the
TLS implementation in Bouncy Castle is vulnerable to an adaptive chosen
ciphertext attack against RSA keys.

For the stable distribution (stretch), this problem has been fixed in
version 1.56-1+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1367 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 25 December 2017 - 10:28 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4073-1                   security@debian.org
https://www.debian.org/security/                            Ben Hutchings
December 23, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2017-8824 CVE-2017-16538 CVE-2017-16644 CVE-2017-16995
                 CVE-2017-17448 CVE-2017-17449 CVE-2017-17450 CVE-2017-17558
                 CVE-2017-17712 CVE-2017-17741 CVE-2017-17805 CVE-2017-17806
                 CVE-2017-17807 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864
                 CVE-2017-1000407 CVE-2017-1000410

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

CVE-2017-8824

    Mohamed Ghannam discovered that the DCCP implementation did not
    correctly manage resources when a socket is disconnected and
    reconnected, potentially leading to a use-after-free.  A local
    user could use this for denial of service (crash or data
    corruption) or possibly for privilege escalation.  On systems that
    do not already have the dccp module loaded, this can be mitigated
    by disabling it:
    echo >> /etc/modprobe.d/disable-dccp.conf install dccp false

CVE-2017-16538

    Andrey Konovalov reported that the dvb-usb-lmedm04 media driver
    did not correctly handle some error conditions during
    initialisation.  A physically present user with a specially
    designed USB device can use this to cause a denial of service
    (crash).

CVE-2017-16644

    Andrey Konovalov reported that the hdpvr media driver did not
    correctly handle some error conditions during initialisation.  A
    physically present user with a specially designed USB device can
    use this to cause a denial of service (crash).

CVE-2017-16995

    Jann Horn discovered that the Extended BPF verifier did not
    correctly model the behaviour of 32-bit load instructions.  A
    local user can use this for privilege escalation.

CVE-2017-17448

    Kevin Cernekee discovered that the netfilter subsystem allowed
    users with the CAP_NET_ADMIN capability in any user namespace, not
    just the root namespace, to enable and disable connection tracking
    helpers.  This could lead to denial of service, violation of
    network security policy, or have other impact.

CVE-2017-17449

    Kevin Cernekee discovered that the netlink subsystem allowed
    users with the CAP_NET_ADMIN capability in any user namespace
    to monitor netlink traffic in all net namespaces, not just
    those owned by that user namespace.  This could lead to
    exposure of sensitive information.

CVE-2017-17450

    Kevin Cernekee discovered that the xt_osf module allowed users
    with the CAP_NET_ADMIN capability in any user namespace to modify
    the global OS fingerprint list.

CVE-2017-17558

    Andrey Konovalov reported that that USB core did not correctly
    handle some error conditions during initialisation.  A physically
    present user with a specially designed USB device can use this to
    cause a denial of service (crash or memory corruption), or
    possibly for privilege escalation.

CVE-2017-17712

    Mohamed Ghannam discovered a race condition in the IPv4 raw socket
    implementation.  A local user could use this to obtain sensitive
    information from the kernel.

CVE-2017-17741

    Dmitry Vyukov reported that the KVM implementation for x86 would
    over-read data from memory when emulating an MMIO write if the
    kvm_mmio tracepoint was enabled.  A guest virtual machine might be
    able to use this to cause a denial of service (crash).

CVE-2017-17805

    It was discovered that some implementations of the Salsa20 block
    cipher did not correctly handle zero-length input.  A local user
    could use this to cause a denial of service (crash) or possibly
    have other security impact.

CVE-2017-17806

    It was discovered that the HMAC implementation could be used with
    an underlying hash algorithm that requires a key, which was not
    intended.  A local user could use this to cause a denial of
    service (crash or memory corruption), or possibly for privilege
    escalation.

CVE-2017-17807

    Eric Biggers discovered that the KEYS subsystem lacked a check for
    write permission when adding keys to a process's default keyring.
    A local user could use this to cause a denial of service or to
    obtain sensitive information.

CVE-2017-17862

    Alexei Starovoitov discovered that the Extended BPF verifier
    ignored unreachable code, even though it would still be processed
    by JIT compilers.  This could possibly be used by local users for
    denial of service.  It also increases the severity of bugs in
    determining unreachable code.

CVE-2017-17863

    Jann Horn discovered that the Extended BPF verifier did not
    correctly model pointer arithmetic on the stack frame pointer.
    A local user can use this for privilege escalation.

CVE-2017-17864

    Jann Horn discovered that the Extended BPF verifier could fail to
    detect pointer leaks from conditional code.  A local user could
    use this to obtain sensitive information in order to exploit
    other vulnerabilities.

CVE-2017-1000407

    Andrew Honig reported that the KVM implementation for Intel
    processors allowed direct access to host I/O port 0x80, which
    is not generally safe.  On some systems this allows a guest
    VM to cause a denial of service (crash) of the host.

CVE-2017-1000410

    Ben Seri reported that the Bluetooth subsystem did not correctly
    handle short EFS information elements in L2CAP messages.  An
    attacker able to communicate over Bluetooth could use this to
    obtain sensitive information from the kernel.

The various problems in the Extended BPF verifier can be mitigated by
disabling use of Extended BPF by unprivileged users:
sysctl kernel.unprivileged_bpf_disabled=1

Debian disables unprivileged user namespaces by default, but if they
are enabled (via the kernel.unprivileged_userns_clone sysctl) then
CVE-2017-17448 can be exploited by any local user.

For the stable distribution (stretch), these problems have been fixed in
version 4.9.65-3+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1368 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 28 December 2017 - 09:52 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4074-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 28, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : imagemagick
CVE ID         : CVE-2017-12877 CVE-2017-16546 CVE-2017-17499
                 CVE-2017-17504 CVE-2017-17879

This update fixes several vulnerabilities in imagemagick: Various memory
handling problems and cases of missing or incomplete input sanitising may
result in denial of service, memory disclosure or the execution of
arbitrary code if malformed image files are processed.
      
For the stable distribution (stretch), these problems have been fixed in
version 8:6.9.7.4+dfsg-11+deb9u4.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1369 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 30 December 2017 - 06:27 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4075-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 29, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : thunderbird
CVE ID         : CVE-2017-7826 CVE-2017-7828 CVE-2017-7829 CVE-2017-7830
                 CVE-2017-7846 CVE-2017-7847 CVE-2017-7848

Multiple security issues have been found in Thunderbird, which may lead
to the execution of arbitrary code, denial of service, information
disclosure or spoofing of sender's email addresses.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:52.5.2-2~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:52.5.2-2~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4076-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 30, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : asterisk
CVE ID         : CVE-2017-16671 CVE-2017-16672 CVE-2017-17090
                 CVE-2017-17664

Multiple vulnerabilities have been discovered in Asterisk, an open source
PBX and telephony toolkit, which may result in denial of service,
information disclosure and potentially the execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:11.13.1~dfsg-2+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 1:13.14.1~dfsg-2+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4077-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
December 30, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gimp
CVE ID         : CVE-2017-17784 CVE-2017-17785 CVE-2017-17786 CVE-2017-17787
                 CVE-2017-17788 CVE-2017-17789
Debian Bug     : 884836 884837 884862 884925 884927 885347

Several vulnerabilities were discovered in GIMP, the GNU Image
Manipulation Program, which could result in denial of service
(application crash) or potentially the execution of arbitrary code if
malformed files are opened.

For the oldstable distribution (jessie), these problems have been fixed
in version 2.8.14-1+deb8u2.

For the stable distribution (stretch), these problems have been fixed in
version 2.8.18-1+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1370 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 07 January 2018 - 08:14 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4078-1                   security@debian.org
https://www.debian.org/security/                        Yves-Alexis Perez
January 04, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2017-5754

Multiple researchers have discovered a vulnerability in Intel processors,
enabling an attacker controlling an unprivileged process to read memory from
arbitrary addresses, including from the kernel and all other processes running
on the system.

This specific attack has been named Meltdown and is addressed in the Linux
kernel for the Intel x86-64 architecture by a patch set named Kernel Page Table
Isolation, enforcing a near complete separation of the kernel and userspace
address maps and preventing the attack. This solution might have a performance
impact, and can be disabled at boot time by passing `pti=off' to the kernel
command line.

We also identified a regression for ancient userspaces using the vsyscall
interface, for example chroot and containers using (e)glibc 2.13 and older,
including those based on Debian 7 or RHEL/CentOS 6. This regression will be
fixed in a later update.

The other vulnerabilities (named Spectre) published at the same time are not
addressed in this update and will be fixed in a later update.

For the oldstable distribution (jessie), this problem will be fixed in a
separate update.

For the stable distribution (stretch), this problem has been fixed in
version 4.9.65-3+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4079-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 07, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : poppler
CVE ID         : CVE-2017-9406  CVE-2017-9408  CVE-2017-9775
                 CVE-2017-9776  CVE-2017-9865  CVE-2017-14517
CVE-2017-14518 CVE-2017-14519 CVE-2017-14520
CVE-2017-14975 CVE-2017-14976 CVE-2017-14977
                 CVE-2017-15565

Multiple vulnerabilities were discovered in the poppler PDF rendering
library, which could result in denial of service or the execution of
arbitrary code if a malformed PDF file is processed.
    
For the oldstable distribution (jessie), these problems have been fixed
in version 0.26.5-2+deb8u2.

For the stable distribution (stretch), these problems have been fixed in
version 0.48.0-2+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1371 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 09 January 2018 - 06:12 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4080-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 08, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : php7.0
CVE ID         : CVE-2017-11144 CVE-2017-11145 CVE-2017-11628
                 CVE-2017-12932 CVE-2017-12933 CVE-2017-12934
CVE-2017-16642

Several vulnerabilities were found in PHP, a widely-used open source
general purpose scripting language:

CVE-2017-11144

    Denial of service in openssl extension due to incorrect return value
    check of OpenSSL sealing function

CVE-2017-11145

    Out-of-bounds read in wddx_deserialize()

CVE-2017-11628

    Buffer overflow in PHP INI parsing API

CVE-2017-12932 / CVE-2017-12934

    Use-after-frees during unserialisation

CVE-2017-12933

    Buffer overread in finish_nested_data()

CVE-2017-16642

    Out-of-bounds read in timelib_meridian()

For the stable distribution (stretch), these problems have been fixed in
version 7.0.27-0+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4081-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 08, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : php5
CVE ID         : CVE-2017-11142 CVE-2017-11143 CVE-2017-11144
                 CVE-2017-11145 CVE-2017-11628 CVE-2017-12933
CVE-2017-16642

Several vulnerabilities were found in PHP, a widely-used open source
general purpose scripting language:

CVE-2017-11142

    Denial of service via overly long form variables

CVE-2017-11143

    Invalid free() in wddx_deserialize()

CVE-2017-11144

    Denial of service in openssl extension due to incorrect return value
    check of OpenSSL sealing function.

CVE-2017-11145

    Out-of-bounds read in wddx_deserialize()

CVE-2017-11628

    Buffer overflow in PHP INI parsing API

CVE-2017-12933

    Buffer overread in finish_nested_data()

CVE-2017-16642

    Out-of-bounds read in timelib_meridian()

For the oldstable distribution (jessie), these problems have been fixed
in version 5.6.33+dfsg-0+deb8u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4082-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 09, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2017-5754 CVE-2017-8824 CVE-2017-15868 CVE-2017-16538
                 CVE-2017-16939 CVE-2017-17448 CVE-2017-17449 CVE-2017-17450
                 CVE-2017-17558 CVE-2017-17741 CVE-2017-17805 CVE-2017-17806
                 CVE-2017-17807 CVE-2017-1000407 CVE-2017-1000410

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

CVE-2017-5754

    Multiple researchers have discovered a vulnerability in Intel
    processors, enabling an attacker controlling an unprivileged
    process to read memory from arbitrary addresses, including from
    the kernel and all other processes running on the system.

    This specific attack has been named Meltdown and is addressed in
    the Linux kernel for the Intel x86-64 architecture by a patch set
    named Kernel Page Table Isolation, enforcing a near complete
    separation of the kernel and userspace address maps and preventing
    the attack. This solution might have a performance impact, and can
    be disabled at boot time by passing `pti=off' to the kernel
    command line.

CVE-2017-8824

    Mohamed Ghannam discovered that the DCCP implementation did not
    correctly manage resources when a socket is disconnected and
    reconnected, potentially leading to a use-after-free.  A local
    user could use this for denial of service (crash or data
    corruption) or possibly for privilege escalation.  On systems that
    do not already have the dccp module loaded, this can be mitigated
    by disabling it:
    echo >> /etc/modprobe.d/disable-dccp.conf install dccp false

CVE-2017-15868

    Al Viro found that the Bluebooth Network Encapsulation Protocol
    (BNEP) implementation did not validate the type of the second
    socket passed to the BNEPCONNADD ioctl(), which could lead to
    memory corruption.  A local user with the CAP_NET_ADMIN capability
    can use this for denial of service (crash or data corruption) or
    possibly for privilege escalation.

CVE-2017-16538

    Andrey Konovalov reported that the dvb-usb-lmedm04 media driver
    did not correctly handle some error conditions during
    initialisation.  A physically present user with a specially
    designed USB device can use this to cause a denial of service
    (crash).

CVE-2017-16939

    Mohamed Ghannam reported (through Beyond Security's SecuriTeam
    Secure Disclosure program) that the IPsec (xfrm) implementation
    did not correctly handle some failure cases when dumping policy
    information through netlink.  A local user with the CAP_NET_ADMIN
    capability can use this for denial of service (crash or data
    corruption) or possibly for privilege escalation.

CVE-2017-17448

    Kevin Cernekee discovered that the netfilter subsystem allowed
    users with the CAP_NET_ADMIN capability in any user namespace, not
    just the root namespace, to enable and disable connection tracking
    helpers.  This could lead to denial of service, violation of
    network security policy, or have other impact.

CVE-2017-17449

    Kevin Cernekee discovered that the netlink subsystem allowed
    users with the CAP_NET_ADMIN capability in any user namespace
    to monitor netlink traffic in all net namespaces, not just
    those owned by that user namespace.  This could lead to
    exposure of sensitive information.

CVE-2017-17450

    Kevin Cernekee discovered that the xt_osf module allowed users
    with the CAP_NET_ADMIN capability in any user namespace to modify
    the global OS fingerprint list.

CVE-2017-17558

    Andrey Konovalov reported that that USB core did not correctly
    handle some error conditions during initialisation.  A physically
    present user with a specially designed USB device can use this to
    cause a denial of service (crash or memory corruption), or
    possibly for privilege escalation.

CVE-2017-17741

    Dmitry Vyukov reported that the KVM implementation for x86 would
    over-read data from memory when emulating an MMIO write if the
    kvm_mmio tracepoint was enabled.  A guest virtual machine might be
    able to use this to cause a denial of service (crash).

CVE-2017-17805

    Dmitry Vyukov reported that the KVM implementation for x86 would
    over-read data from memory when emulating an MMIO write if the
    kvm_mmio tracepoint was enabled.  A guest virtual machine might be
    able to use this to cause a denial of service (crash).

CVE-2017-17806

    It was discovered that the HMAC implementation could be used with
    an underlying hash algorithm that requires a key, which was not
    intended.  A local user could use this to cause a denial of
    service (crash or memory corruption), or possibly for privilege
    escalation.

CVE-2017-17807

    Eric Biggers discovered that the KEYS subsystem lacked a check for
    write permission when adding keys to a process's default keyring.
    A local user could use this to cause a denial of service or to
    obtain sensitive information.

CVE-2017-1000407

    Andrew Honig reported that the KVM implementation for Intel
    processors allowed direct access to host I/O port 0x80, which
    is not generally safe.  On some systems this allows a guest
    VM to cause a denial of service (crash) of the host.

CVE-2017-1000410

    Ben Seri reported that the Bluetooth subsystem did not correctly
    handle short EFS information elements in L2CAP messages.  An
    attacker able to communicate over Bluetooth could use this to
    obtain sensitive information from the kernel.

For the oldstable distribution (jessie), these problems have been fixed
in version 3.16.51-3+deb8u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1372 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 11 January 2018 - 09:01 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4083-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
January 11, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : poco
CVE ID         : CVE-2017-1000472

Stephan Zeisberg discovered that poco, a collection of open source C++
class libraries, did not correctly validate file paths in ZIP
archives. An attacker could leverage this flaw to create or overwrite
arbitrary files.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.3.6p1-5+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.7.6+dfsg1-5+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1373 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 13 January 2018 - 06:17 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4084-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
January 12, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gifsicle
CVE ID         : CVE-2017-1000421

It was discovered that gifsicle, a tool for manipulating GIF image
files, contained a flaw that could lead to arbitrary code execution.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.86-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.88-3+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4085-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 12, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xmltooling
CVE ID         : CVE-2018-0486

Philip Huppert discovered the Shibboleth service provider is vulnerable
to impersonation attacks and information disclosure due to mishandling
of DTDs in the XMLTooling XML parsing library. For additional details
please refer to the upstream advisory at
https://shibboleth.n...dv_20180112.txt  

For the oldstable distribution (jessie), this problem has been fixed
in version 1.5.3-2+deb8u2.

The stable distribution (stretch) is not affected.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4086-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 13, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libxml2
CVE ID         : CVE-2017-15412
Debian Bug     : 883790

Nick Wellnhofer discovered that certain function calls inside XPath
predicates can lead to use-after-free and double-free errors when
executed by libxml2's XPath engine via an XSLT transformation.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.9.1+dfsg1-5+deb8u6.

For the stable distribution (stretch), this problem has been fixed in
version 2.9.4+dfsg1-2.2+deb9u2.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1374 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 15 January 2018 - 07:30 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4087-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 14, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : transmission
CVE ID         : not yet available

Tavis Ormandy discovered a vulnerability in the Transmission BitTorrent
client; insecure RPC handling between the Transmission daemon and the
client interface(s) may result in the execution of arbitrary code if a
user visits a malicious website while Transmission is running.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.84-0.2+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 2.92-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4088-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 15, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gdk-pixbuf
CVE ID         : CVE-2017-1000422

It was discovered that multiple integer overflows in the GIF image loader
in the GDK Pixbuf library may result in denial of service and potentially
the execution of arbitrary code if a malformed image file is opened.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.31.1-2+deb8u7.

For the stable distribution (stretch), this problem has been fixed in
version 2.36.5-2+deb9u2. In addition this update provides fixes for
CVE-2017-6312, CVE-2017-6313 and CVE-2017-6314.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1375 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,535 posts

Posted 17 January 2018 - 05:38 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4089-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 16, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : bind9
CVE ID         : CVE-2017-3145

Jayachandran Palanisamy of Cygate AB reported that BIND, a DNS server
implementation, was improperly sequencing cleanup operations, leading in
some cases to a use-after-free error, triggering an assertion failure
and crash in named.

For the oldstable distribution (jessie), this problem has been fixed
in version 1:9.9.5.dfsg-9+deb8u15.

For the stable distribution (stretch), this problem has been fixed in
version 1:9.10.3.dfsg.P4-12.3+deb9u4.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4090-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
January 17, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wordpress
CVE ID         : CVE-2017-9066 CVE-2017-16510 CVE-2017-17091 CVE-2017-17092
                 CVE-2017-17093 CVE-2017-17094
Debian Bug     : 862816 883314 880528

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform SQL injections and
various Cross-Side Scripting (XSS) and Server-Side Request Forgery
(SSRF) attacks, as well as bypass some access restrictions.

For the oldstable distribution (jessie), these problems have been fixed
in version 4.1+dfsg-1+deb8u16.

For the stable distribution (stretch), these problems have been fixed in
version 4.7.5+dfsg-2+deb9u2.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.





Also tagged with one or more of these keywords: debian, updates, sunrat, bruno, v.t. eric layton

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users