Jump to content


NEW UPDATES Debian

debian updates sunrat bruno v.t. eric layton

  • Please log in to reply
1388 replies to this topic

#1376 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 18 January 2018 - 07:00 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4091-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 18, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mysql-5.5
CVE ID         : CVE-2018-2562 CVE-2018-2622 CVE-2018-2640 CVE-2018-2665
                 CVE-2018-2668

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.59, which includes additional changes. Please see the MySQL
5.5 Release Notes and Oracle's Critical Patch Update advisory for
further details:

https://dev.mysql.co...ews-5-5-59.html
http://www.oracle.co...18-3236628.html

For the oldstable distribution (jessie), these problems have been fixed
in version 5.5.59-0+deb8u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1377 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 19 January 2018 - 06:07 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4092-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
January 19, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : awstats
CVE ID         : CVE-2017-1000501
Debian Bug     : 885835

The cPanel Security Team discovered that awstats, a log file analyzer,
was vulnerable to path traversal attacks. A remote unauthenticated
attacker could leverage that to perform arbitrary code execution.

For the oldstable distribution (jessie), this problem has been fixed
in version 7.2+dfsg-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 7.6+dfsg-1+deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1378 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 23 January 2018 - 06:28 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4093-1                   security@debian.org
https://www.debian.org/security/                                        
January 21, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openocd
CVE ID         : CVE-2018-5704
Debian Bug     : 887488

Josef Gajdusek discovered that OpenOCD, a JTAG debugger for ARM and MIPS,
was vulnerable to Cross Protocol Scripting attacks. An attacker could
craft a HTML page that, when visited by a victim running OpenOCD, could
execute arbitrary commands on the victims host.

This fix also sets the OpenOCD default binding to localhost, instead of
every network interfaces. This can be changed with the added "bindto"
command argument.

For the oldstable distribution (jessie), this problem has been fixed
in version 0.8.0-4+deb7u1.

For the stable distribution (stretch), this problem has been fixed in
version 0.9.0-1+deb8u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4094-1                   security@debian.org
https://www.debian.org/security/                                        
January 22, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : smarty3
CVE ID         : CVE-2017-1000480
Debian Bug     : 886460

It was discovered that Smarty, a PHP template engine, was vulnerable to
code-injection attacks. An attacker was able to craft a filename in
comments that could lead to arbitrary code execution on the host running
Smarty.

For the oldstable distribution (jessie), this problem has been fixed
in version 3.1.21-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1379 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 24 January 2018 - 07:09 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4095-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 24, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gcab
CVE ID         : CVE-2018-5345
Debian Bug     : 887776

It was discovered that gcab, a Microsoft Cabinet file manipulation tool,
is prone to a stack-based buffer overflow vulnerability when extracting
.cab files. An attacker can take advantage of this flaw to cause a
denial-of-service or, potentially the execution of arbitrary code with
the privileges of the user running gcab, if a specially crafted .cab
file is processed.

For the stable distribution (stretch), this problem has been fixed in
version 0.7-2+deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1380 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 26 January 2018 - 08:16 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4096-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 25, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2018-5089 CVE-2018-5091 CVE-2018-5095 CVE-2018-5096
                 CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5102
                 CVE-2018-5103 CVE-2018-5104 CVE-2018-5117

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees, integer
overflows and other implementation errors may lead to the execution of
arbitrary code, denial of service or URL spoofing.

For the oldstable distribution (jessie), these problems have been fixed
in version 52.6.0esr-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 52.6.0esr-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4097-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 25, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : poppler
CVE ID         : CVE-2017-14929 CVE-2017-1000456

Multiple vulnerabilities were discovered in the poppler PDF rendering
library, which could result in denial of service or the execution of
arbitrary code if a malformed PDF file is processed.

This update also fixes a regression in the handling of Type 3 fonts.

For the oldstable distribution (jessie), these problems have been fixed
in version 0.26.5-2+deb8u3.

For the stable distribution (stretch), these problems have been fixed in
version 0.48.0-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4098-1                   security@debian.org
https://www.debian.org/security/                       Alessandro Ghedini
January 26, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : curl
CVE ID         : CVE-2018-1000005 CVE-2018-1000007

Two vulnerabilities were discovered in cURL, an URL transfer library.

CVE-2018-1000005

    Zhouyihai Ding discovered an out-of-bounds read in the code
    handling HTTP/2 trailers. This issue doesn't affect the oldstable
    distribution (jessie).

CVE-2018-1000007

    Craig de Stigter discovered that authentication data might be leaked
    to third parties when following HTTP redirects.

For the oldstable distribution (jessie), these problems have been fixed
in version 7.38.0-4+deb8u9.

For the stable distribution (stretch), these problems have been fixed in
version 7.52.1-5+deb9u4.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1381 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 30 January 2018 - 07:30 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4099-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 27, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ffmpeg
CVE ID         : CVE-2017-17081

Several vulnerabilities have been discovered in the FFmpeg multimedia
framework, which could result in denial of service or potentially the
execution of arbitrary code if malformed files/streams are processed.

For the stable distribution (stretch), this problem has been fixed in
version 7:3.2.10-1~deb9u1.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4100-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 27, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tiff
CVE ID         : CVE-2017-9935 CVE-2017-11335 CVE-2017-12944 CVE-2017-13726
                 CVE-2017-13727 CVE-2017-18013

Multiple vulnerabilities have been discovered in the libtiff library and
the included tools, which may result in denial of service or the
execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 4.0.3-12.3+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 4.0.8-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4101-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 28, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2018-5334 CVE-2018-5335 CVE-2018-5336

It was discovered that wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors/file parsers for IxVeriWave,
WCP, JSON, XML, NTP, XMPP and GDB, which could result in denial of
dervice or the execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version (1.12.1+g01b65bf-4+deb8u13.

For the stable distribution (stretch), these problems have been fixed in
version 2.2.6+g32dac6a-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4094-2                   security@debian.org
https://www.debian.org/security/                                        
January 30, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : smarty3
CVE ID         : CVE-2017-1000480
Debian Bug     : 886460

Côme Chilliet from the FusionDirectory team detected a regression in the
previously issued fix for CVE-2017-1000480. This regression only affects
the Jessie version of the patch. For reference, the relevant part of the
original advisory text follows.

It was discovered that Smarty, a PHP template engine, was vulnerable to
code-injection attacks. An attacker was able to craft a filename in
comments that could lead to arbitrary code execution on the host running
Smarty.

For the oldstable distribution (jessie), this problem has been fixed
in version 3.1.21-1+deb8u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4102-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 30, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : thunderbird
CVE ID         : CVE-2018-5089 CVE-2018-5091 CVE-2018-5095 CVE-2018-5096
                 CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5102
                 CVE-2018-5103 CVE-2018-5104 CVE-2018-5117

Multiple security issues have been found in Thunderbird, which may lead
to the execution of arbitrary code, denial of service or URL spoofing.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:52.6.0-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:52.6.0-1~deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1382 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 01 February 2018 - 06:57 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4103-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
January 31, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
CVE ID         : CVE-2017-15420 CVE-2017-15429 CVE-2018-6031 CVE-2018-6032
                 CVE-2018-6033 CVE-2018-6034 CVE-2018-6035 CVE-2018-6036
                 CVE-2018-6037 CVE-2018-6038 CVE-2018-6039 CVE-2018-6040
                 CVE-2018-6041 CVE-2018-6042 CVE-2018-6043 CVE-2018-6045
                 CVE-2018-6046 CVE-2018-6047 CVE-2018-6048 CVE-2018-6049
                 CVE-2018-6050 CVE-2018-6051 CVE-2018-6052 CVE-2018-6053
                 CVE-2018-6054

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2017-15420

    Drew Springall discovered a URL spoofing issue.

CVE-2017-15429

    A cross-site scripting issue was discovered in the v8 javascript
    library.

CVE-2018-6031

    A use-after-free issue was discovered in the pdfium library.

CVE-2018-6032

    Jun Kokatsu discovered a way to bypass the same origin policy.

CVE-2018-6033

    Juho Nurminen discovered a race condition when opening downloaded
    files.

CVE-2018-6034

    Tobias Klein discovered an integer overflow issue.

CVE-2018-6035

    Rob Wu discovered a way for extensions to access devtools.

CVE-2018-6036

    UK's National Cyper Security Centre discovered an integer overflow
    issue.

CVE-2018-6037

    Paul Stone discovered an issue in the autofill feature.

CVE-2018-6038

    cloudfuzzer discovered a buffer overflow issue.

CVE-2018-6039

    Juho Nurminen discovered a cross-site scripting issue in the
    developer tools.

CVE-2018-6040

    WenXu Wu discovered a way to bypass the content security policy.

CVE-2018-6041

    Luan Herrera discovered a URL spoofing issue.

CVE-2018-6042

    Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6043

    A character escaping issue was discovered.

CVE-2018-6045

    Rob Wu discovered a way for extensions to access devtools.

CVE-2018-6046

    Rob Wu discovered a way for extensions to access devtools.

CVE-2018-6047

    Masato Kinugawa discovered an information leak issue.

CVE-2018-6048

    Jun Kokatsu discoverd a way to bypass the referrer policy.

CVE-2018-6049

    WenXu Wu discovered a user interface spoofing issue.

CVE-2018-6050

    Jonathan Kew discovered a URL spoofing issue.

CVE-2018-6051

    Anonio Sanso discovered an information leak issue.

CVE-2018-6052

    Tanner Emek discovered that the referrer policy implementation
    was incomplete.

CVE-2018-6053

    Asset Kabdenov discoved an information leak issue.

CVE-2018-6054

    Rob Wu discovered a use-after-free issue.

For the oldstable distribution (jessie), security support for chromium
has been discontinued.

For the stable distribution (stretch), these problems have been fixed in
version 64.0.3282.119-1~deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1383 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 05 February 2018 - 07:27 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4104-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 04, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : p7zip
CVE ID         : CVE-2017-17969
Debian Bug     : 888297

'landave' discovered a heap-based buffer overflow vulnerability in the
NCompress::NShrink::CDecoder::CodeReal method in p7zip, a 7zr file
archiver with high compression ratio. A remote attacker can take
advantage of this flaw to cause a denial-of-service or, potentially the
execution of arbitrary code with the privileges of the user running
p7zip, if a specially crafted shrinked ZIP archive is processed.

For the oldstable distribution (jessie), this problem has been fixed
in version 9.20.1~dfsg.1-4.1+deb8u3.

For the stable distribution (stretch), this problem has been fixed in
version 16.02+dfsg-3+deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1384 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 07 February 2018 - 06:42 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4105-1                   security@debian.org
https://www.debian.org/security/                                        
February 06, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mpv
CVE ID         : CVE-2018-6360
Debian Bug     : 888654

It was discovered that mpv, a media player, was vulnerable to remote code
execution attacks. An attacker could craft a malicious web page that,
when used as an argument in mpv, could execute arbitrary code in the host
of the mpv user.

For the stable distribution (stretch), this problem has been fixed in
version 0.23.0-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4106-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 07, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libtasn1-6
CVE ID         : CVE-2017-10790 CVE-2018-6003
Debian Bug     : 867398

Two vulnerabilities were discovered in Libtasn1, a library to manage
ASN.1 structures, allowing a remote attacker to cause a denial of
service against an application using the Libtasn1 library.

For the stable distribution (stretch), these problems have been fixed in
version 4.10-1.1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4107-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 07, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : django-anymail
CVE ID         : CVE-2018-6596
Debian Bug     : 889450

It was discovered that the webhook validation of Anymail, a Django email
backends for multiple ESPs, is prone to a timing attack. A remote
attacker can take advantage of this flaw to obtain a
WEBHOOK_AUTHORIZATION secret and post arbitrary email tracking events.

For the stable distribution (stretch), this problem has been fixed in
version 0.8-2+deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1385 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 10 February 2018 - 06:35 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4105-2                   security@debian.org
https://www.debian.org/security/                                        
February 08, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mpv
CVE ID         : CVE-2018-6360
Debian Bug     : 889892

A regression was detected in the previously issued fix for CVE-2018-6360.
The patch released with DSA 4105-1 broke the feature of invoking mpv with
raw YouTube ids. This update fixes this functionality issue. For
reference, the relevant part of the original advisory text follows.

It was discovered that mpv, a media player, was vulnerable to remote code
execution attacks. An attacker could craft a malicious web page that,
when used as an argument in mpv, could execute arbitrary code in the host
of the mpv user.

For the stable distribution (stretch), this problem has been fixed in
version 0.23.0-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4108-1                   security@debian.org
https://www.debian.org/security/                          Thijs Kinkhorst
February 09, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mailman
CVE ID         : CVE-2018-5950
Debian Bug     : 888201

Calum Hutton and the Mailman team discovered a cross site scripting and
information leak vulnerability in the user options page. A remote
attacker could use a crafted URL to steal cookie information or to
fish for whether a user is subscribed to a list with a private roster.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.1.18-2+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 2.1.23-1+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4109-1                   security@debian.org
https://www.debian.org/security/                                        
February 09, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ruby-omniauth
CVE ID         : CVE-2017-18076
Debian Bug     : 888523

Lalith Rallabhandi discovered that OmniAuth, a Ruby library for
implementing multi-provider authentication in web applications,
mishandled and leaked sensitive information. An attacker with access to
the callback environment, such as in the case of a crafted web
application, can request authentication services from this module and
access to the CSRF token.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.2.1-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.3.1-1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4110-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 10, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : exim4
CVE ID         : CVE-2018-6789
Debian Bug     : 890000

Meh Chang discovered a buffer overflow flaw in a utility function used
in the SMTP listener of Exim, a mail transport agent. A remote attacker
can take advantage of this flaw to cause a denial of service, or
potentially the execution of arbitrary code via a specially crafted
message.

For the oldstable distribution (jessie), this problem has been fixed
in version 4.84.2-2+deb8u5.

For the stable distribution (stretch), this problem has been fixed in
version 4.89-2+deb9u3.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1386 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 12 February 2018 - 08:29 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4111-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 11, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libreoffice
CVE ID         : CVE-2018-6871

Mikhail Klementev, Ronnie Goodrich and Andrew Krasichkov discovered that
missing restrictions in the implementation of the WEBSERVICE function
in LibreOffice could result in the disclosure of arbitrary files
readable by the user who opens a malformed document.

For the stable distribution (stretch), this problem has been fixed in
version 1:5.2.7-1+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4111-2                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 12, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libreoffice
CVE ID         : CVE-2018-6871

Mikhail Klementev, Ronnie Goodrich and Andrew Krasichkov discovered that
missing restrictions in the implementation of the WEBSERVICE function
in LibreOffice could result in the disclosure of arbitrary files
readable by the user who opens a malformed document.

For the oldstable distribution (jessie), this problem has been fixed in
version 1:4.3.3-2+deb8u10
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1387 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 15 February 2018 - 11:22 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4112-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 14, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xen
CVE ID         : CVE-2017-17563 CVE-2017-17564 CVE-2017-17565
                 CVE-2017-17566

Multiple vulnerabilities have been discovered in the Xen hypervisor:

CVE-2017-17563

    Jan Beulich discovered that an incorrect reference count overflow
    check in x86 shadow mode may result in denial of service or
    privilege escalation.

CVE-2017-17564

    Jan Beulich discovered that improper x86 shadow mode reference count
    error handling may result in denial of service or privilege
    escalation.

CVE-2017-17565

    Jan Beulich discovered that an incomplete bug check in x86 log-dirty
    handling may result in denial of service.

CVE-2017-17566

    Jan Beulich discovered that x86 PV guests may gain access to
    internally used pages which could result in denial of service or
    potential privilege escalation.

In addition this update ships the "Comet" shim to address the Meltdown
class of vulnerabilities for guests with legacy PV kernels. In addition,
the package provides the "Xen PTI stage 1" mitigation which is built-in
and enabled by default on Intel systems, but can be disabled with
`xpti=false' on the hypervisor command line (It does not make sense to
use both xpti and the Comet shim.)

Please refer to the following URL for more details on how to configure
individual mitigation strategies:
https://xenbits.xen....visory-254.html

Additional information can also be found in README.pti and README.comet.

For the stable distribution (stretch), these problems have been fixed in
version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4113-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 14, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libvorbis
CVE ID         : CVE-2017-14632 CVE-2017-14633

Two vulnerabilities were discovered in the libraries of the Vorbis audio
compression codec, which could result in denial of service or the
execution of arbitrary code if a malformed media file is processed.

For the stable distribution (stretch), these problems have been fixed in
version 1.3.5-4+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4114-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
February 15, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : jackson-databind
CVE ID         : CVE-2017-17485 CVE-2018-5968
Debian Bug     : 888316 888318

It was discovered that jackson-databind, a Java library used to parse
JSON and other data formats, did not properly validate user input
before attempting deserialization. This allowed an attacker to perform
code execution by providing maliciously crafted input.

For the oldstable distribution (jessie), these problems have been fixed
in version 2.4.2-2+deb8u3.

For the stable distribution (stretch), these problems have been fixed in
version 2.8.6-1+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4115-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 15, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : quagga
CVE ID         : CVE-2018-5378 CVE-2018-5379 CVE-2018-5380 CVE-2018-5381

Several vulnerabilities have been discovered in Quagga, a routing
daemon. The Common Vulnerabilities and Exposures project identifies the
following issues:

CVE-2018-5378

    It was discovered that the Quagga BGP daemon, bgpd, does not
    properly bounds check data sent with a NOTIFY to a peer, if an
    attribute length is invalid. A configured BGP peer can take
    advantage of this bug to read memory from the bgpd process or cause
    a denial of service (daemon crash).

    https://www.quagga.n...a-2018-0543.txt

CVE-2018-5379

    It was discovered that the Quagga BGP daemon, bgpd, can double-free
    memory when processing certain forms of UPDATE message, containing
    cluster-list and/or unknown attributes, resulting in a denial of
    service (bgpd daemon crash).

    https://www.quagga.n...a-2018-1114.txt

CVE-2018-5380

    It was discovered that the Quagga BGP daemon, bgpd, does not
    properly handle internal BGP code-to-string conversion tables.

    https://www.quagga.n...a-2018-1550.txt

CVE-2018-5381

    It was discovered that the Quagga BGP daemon, bgpd, can enter an
    infinite loop if sent an invalid OPEN message by a configured peer.
    A configured peer can take advantage of this flaw to cause a denial
    of service (bgpd daemon not responding to any other events; BGP
    sessions will drop and not be reestablished; unresponsive CLI
    interface).

    https://www.quagga.n...a-2018-1975.txt

For the oldstable distribution (jessie), these problems have been fixed
in version 0.99.23.1-1+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 1.1.1-3+deb9u2.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1388 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted 17 February 2018 - 05:45 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4116-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 16, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : plasma-workspace
CVE ID         : CVE-2018-6791

Krzysztof Sieluzycki discovered that the notifier for removable devices
in the KDE Plasma workspace performed insufficient sanitisation of
FAT/VFAT volume labels, which could result in the execution of arbitrary
shell commands if a removable device with a malformed disk label is
mounted.

For the stable distribution (stretch), this problem has been fixed in
version 4:5.8.6-2.1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4117-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 17, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gcc-4.9
CVE ID         : not applicable

This update doesn't fix a vulnerability in GCC itself, but instead
provides support for building retpoline-enabled Linux kernel updates.

For the oldstable distribution (jessie), this problem has been fixed
in version 4.9.2-10+deb8u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4118-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 17, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tomcat-native
CVE ID         : CVE-2017-15698

Jonas Klempel reported that tomcat-native, a library giving Tomcat
access to the Apache Portable Runtime (APR) library's network connection
(socket) implementation and random-number generator, does not properly
handle fields longer than 127 bytes when parsing the AIA-Extension field
of a client certificate. If OCSP checks are used, this could result in
client certificates that should have been rejected to be accepted.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.1.32~repack-2+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.2.12-2+deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1389 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,431 posts

Posted Today, 04:58 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4119-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 19, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libav
CVE ID         : CVE-2017-16803

Several security issues have been corrected in multiple demuxers and
decoders of the libav multimedia library. A full list of the changes is
available at
https://git.libav.or...efs/tags/v11.12

For the oldstable distribution (jessie), this problem has been fixed
in version 6:11.12-1~deb8u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.





Also tagged with one or more of these keywords: debian, updates, sunrat, bruno, v.t. eric layton

1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users