Jump to content


NEW UPDATES Debian

debian updates sunrat bruno v.t. eric layton

  • Please log in to reply
1308 replies to this topic

#1301 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,266 posts

Posted 25 July 2017 - 07:14 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3918-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 25, 2017                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : icedove
CVE ID         : CVE-2017-5470 CVE-2017-5472 CVE-2017-7749 CVE-2017-7750
                 CVE-2017-7751 CVE-2017-7752 CVE-2017-7754 CVE-2017-7756
                 CVE-2017-7757 CVE-2017-7758 CVE-2017-7764 CVE-2017-7771
                 CVE-2017-7772 CVE-2017-7773 CVE-2017-7774 CVE-2017-7775
                 CVE-2017-7776 CVE-2017-7777 CVE-2017-7778

Multiple security issues have been found in Thunderbird, which may lead
to the execution of arbitrary code or denial of service.

Debian follows the extended support releases (ESR) of Thunderbird.
Support for the 45.x series has ended, so starting with this update
we're now following the 52.x releases.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:52.2.1-4~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:52.2.1-4~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3919-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 25, 2017                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openjdk-8
CVE ID         : CVE-2017-10053 CVE-2017-10067 CVE-2017-10074
                 CVE-2017-10078 CVE-2017-10081 CVE-2017-10087
CVE-2017-10089 CVE-2017-10090 CVE-2017-10096
CVE-2017-10101 CVE-2017-10102 CVE-2017-10107
                 CVE-2017-10108 CVE-2017-10109 CVE-2017-10110
CVE-2017-10111 CVE-2017-10115 CVE-2017-10116
CVE-2017-10118 CVE-2017-10135 CVE-2017-10176
CVE-2017-10193 CVE-2017-10198

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in sandbox bypass,
use of insecure cryptography, side channel attacks, information
disclosure, the execution of arbitrary code, denial of service or
bypassing Jar verification.

For the stable distribution (stretch), these problems have been fixed in
version 8u141-b15-1~deb9u1.

For the unstable distribution (sid), these problems have been fixed in
version 8u141-b15-1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3920-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 25, 2017                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : qemu
CVE ID         : CVE-2017-9310 CVE-2017-9330 CVE-2017-9373 CVE-2017-9374
                 CVE-2017-9375 CVE-2017-9524 CVE-2017-10664 CVE-2017-10911

Multiple vulnerabilities were found in in qemu, a fast processor
emulator:

CVE-2017-9310

    Denial of service via infinite loop in e1000e NIC emulation.

CVE-2017-9330

    Denial of service via infinite loop in USB OHCI emulation.

CVE-2017-9373

    Denial of service via memory leak in IDE AHCI emulation.

CVE-2017-9374

    Denial of service via memory leak in USB EHCI emulation.

CVE-2017-9375

    Denial of service via memory leak in USB XHCI emulation.

CVE-2017-9524

    Denial of service in qemu-nbd server.

CVE-2017-10664

    Denial of service in qemu-nbd server.

CVE-2017-10911

    Information leak in Xen blkif response handling.

For the oldstable distribution (jessie), a separate DSA will be issued.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u1.

For the unstable distribution (sid), these problems will be fixed soon.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1302 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,266 posts

Posted 28 July 2017 - 09:49 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3921-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 28, 2017                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : enigmail
Debian Bug     : 869774

In DSA 3918 Thunderbird was upgraded to the latest ESR series. This
update upgrades Enigmail, the OpenPGP extention for Thunderbird,
to version 1.9.8.1 to restore full compatibility.

For the oldstable distribution (jessie), this problem has been fixed
in version 2:1.9.8.1-1~deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 2:1.9.8.1-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3922-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
July 28, 2017                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mysql-5.5
CVE ID         : CVE-2017-3635 CVE-2017-3636 CVE-2017-3641 CVE-2017-3648
                 CVE-2017-3651 CVE-2017-3652 CVE-2017-3653
Debian Bug     : 868788

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.57, which includes additional changes, such as performance
improvements, bug fixes, new features, and possibly incompatible
changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
Patch Update advisory for further details:

https://dev.mysql.co...ews-5-5-56.html
https://dev.mysql.co...ews-5-5-57.html
http://www.oracle.co...17-3236622.html

For the oldstable distribution (jessie), these problems have been fixed
in version 5.5.57-0+deb8u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1303 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,266 posts

Posted 05 August 2017 - 08:11 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3923-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
August 01, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : freerdp
CVE ID         : CVE-2017-2834 CVE-2017-2835 CVE-2017-2836 CVE-2017-2837
                 CVE-2017-2838 CVE-2017-2839
Debian Bug     : 869880

Tyler Bohan of Talos discovered that FreeRDP, a free implementation of
the Remote Desktop Protocol (RDP), contained several vulnerabilities
that allowed a malicious remote server or a man-in-the-middle to
either cause a DoS by forcibly terminating the client, or execute
arbitrary code on the client side.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.1.0~git20140921.1.440916e+dfsg1-4+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1.1.0~git20140921.1.440916e+dfsg1-13+deb9u1.

For the unstable distribution (sid), these problems have been fixed in
version 1.1.0~git20140921.1.440916e+dfsg1-14.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3924-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 02, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : varnish
CVE ID         : not yet assigned
Debian Bug     : 870467

A denial of service vulnerability was discovered in Varnish, a state of
the art, high-performance web accelerator. Specially crafted HTTP
requests can cause the Varnish daemon to assert and restart, clearing
the cache in the process.

See https://varnish-cach...y/VSV00001.html for details.

For the oldstable distribution (jessie), this problem has been fixed
in version 4.0.2-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 5.0.0-7+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3925-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 04, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : qemu
CVE ID         : CVE-2017-9524 CVE-2017-10806 CVE-2017-11334
                 CVE-2017-11443
Debian Bug     : 865755 869171 869173 867751 869945

Multiple vulnerabilities were found in qemu, a fast processor emulator:

CVE-2017-9524

    Denial of service in qemu-nbd server

CVE-2017-10806

    Buffer overflow in USB redirector

CVE-2017-11334

    Out-of-band memory access in DMA operations

CVE-2017-11443

    Out-of-band memory access in SLIRP/DHCP

For the stable distribution (stretch), these problems have been fixed in
version 1:2.8+dfsg-6+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3926-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
August 04, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
CVE ID         : CVE-2017-5087 CVE-2017-5088 CVE-2017-5089 CVE-2017-5091
                 CVE-2017-5092 CVE-2017-5093 CVE-2017-5094 CVE-2017-5095
                 CVE-2017-5097 CVE-2017-5098 CVE-2017-5099 CVE-2017-5100
                 CVE-2017-5101 CVE-2017-5102 CVE-2017-5103 CVE-2017-5104
                 CVE-2017-5105 CVE-2017-5106 CVE-2017-5107 CVE-2017-5108
                 CVE-2017-5109 CVE-2017-5110 CVE-2017-7000

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2017-5087

    Ned Williamson discovered a way to escape the sandbox.

CVE-2017-5088

    Xiling Gong discovered an out-of-bounds read issue in the v8 javascript
    library.

CVE-2017-5089

    Michal Bentkowski discovered a spoofing issue.

CVE-2017-5091

    Ned Williamson discovered a use-after-free issue in IndexedDB.

CVE-2017-5092

    Yu Zhou discovered a use-after-free issue in PPAPI.

CVE-2017-5093

    Luan Herrera discovered a user interface spoofing issue.

CVE-2017-5094

    A type confusion issue was discovered in extensions.

CVE-2017-5095

    An out-of-bounds write issue was discovered in the pdfium library.

CVE-2017-5097

    An out-of-bounds read issue was discovered in the skia library.

CVE-2017-5098

    Jihoon Kim discover a use-after-free issue in the v8 javascript library.

CVE-2017-5099

    Yuan Deng discovered an out-of-bounds write issue in PPAPI.

CVE-2017-5100

    A use-after-free issue was discovered in Chrome Apps.

CVE-2017-5101

    Luan Herrera discovered a URL spoofing issue.

CVE-2017-5102

    An uninitialized variable was discovered in the skia library.

CVE-2017-5103

    Another uninitialized variable was discovered in the skia library.

CVE-2017-5104

    Khalil Zhani discovered a user interface spoofing issue.

CVE-2017-5105

    Rayyan Bijoora discovered a URL spoofing issue.

CVE-2017-5106

    Jack Zac discovered a URL spoofing issue.

CVE-2017-5107

    David Kohlbrenner discovered an information leak in SVG file handling.

CVE-2017-5108

    Guang Gong discovered a type confusion issue in the pdfium library.

CVE-2017-5109

    Jose Maria Acuna Morgado discovered a user interface spoofing issue.

CVE-2017-5110

    xisigr discovered a way to spoof the payments dialog.

CVE-2017-7000

    Chaitin Security Research Lab discovered an information disclosure
    issue in the sqlite library.

For the stable distribution (stretch), these problems have been fixed in
version 60.0.3112.78-1~deb9u1.

For the unstable distribution (sid), these problems have been fixed in
version 60.0.3112.78-1 or earlier versions.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1304 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,266 posts

Posted 08 August 2017 - 03:56 AM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3927-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 07, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2017-7346 CVE-2017-7482 CVE-2017-7533 CVE-2017-7541
                 CVE-2017-7542 CVE-2017-9605 CVE-2017-10810 CVE-2017-10911
                 CVE-2017-11176 CVE-2017-1000365

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

CVE-2017-7346

    Li Qiang discovered that the DRM driver for VMware virtual GPUs does
    not properly check user-controlled values in the
    vmw_surface_define_ioctl() functions for upper limits. A local user
    can take advantage of this flaw to cause a denial of service.

CVE-2017-7482

    Shi Lei discovered that RxRPC Kerberos 5 ticket handling code does
    not properly verify metadata, leading to information disclosure,
    denial of service or potentially execution of arbitrary code.

CVE-2017-7533

    Fan Wu and Shixiong Zhao discovered a race condition between inotify
    events and VFS rename operations allowing an unprivileged local
    attacker to cause a denial of service or escalate privileges.

CVE-2017-7541

    A buffer overflow flaw in the Broadcom IEEE802.11n PCIe SoftMAC WLAN
    driver could allow a local user to cause kernel memory corruption,
    leading to a denial of service or potentially privilege escalation.

CVE-2017-7542

    An integer overflow vulnerability in the ip6_find_1stfragopt()
    function was found allowing a local attacker with privileges to open
    raw sockets to cause a denial of service.

CVE-2017-9605

    Murray McAllister discovered that the DRM driver for VMware virtual
    GPUs does not properly initialize memory, potentially allowing a
    local attacker to obtain sensitive information from uninitialized
    kernel memory via a crafted ioctl call.

CVE-2017-10810

    Li Qiang discovered a memory leak flaw within the VirtIO GPU driver
    resulting in denial of service (memory consumption).

CVE-2017-10911 / XSA-216

    Anthony Perard of Citrix discovered an information leak flaw in Xen
    blkif response handling, allowing a malicious unprivileged guest to
    obtain sensitive information from the host or other guests.

CVE-2017-11176

    It was discovered that the mq_notify() function does not set the
    sock pointer to NULL upon entry into the retry logic. An attacker
    can take advantage of this flaw during a user-space close of a
    Netlink socket to cause a denial of service or potentially cause
    other impact.

CVE-2017-1000365

    It was discovered that argument and environment pointers are not
    taken properly into account to the imposed size restrictions on
    arguments and environmental strings passed through
    RLIMIT_STACK/RLIMIT_INFINITY. A local attacker can take advantage of
    this flaw in conjunction with other flaws to execute arbitrary code.

For the oldstable distribution (jessie), these problems will be fixed in
a subsequent DSA.

For the stable distribution (stretch), these problems have been fixed in
version 4.9.30-2+deb9u3.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1305 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,266 posts

Posted 10 August 2017 - 06:39 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3928-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 10, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2017-7753 CVE-2017-7779 CVE-2017-7784 CVE-2017-7785
                 CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792
                 CVE-2017-7798 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802
                 CVE-2017-7803 CVE-2017-7807 CVE-2017-7809

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees, buffer
overflows and other implementation errors may lead to the execution of
arbitrary code, denial of service, bypass of the same-origin policy or
incorrect enforcement of CSP.

For the oldstable distribution (jessie), these problems have been fixed
in version 52.3.0esr-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 52.3.0esr-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3929-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 10, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libsoup2.4
CVE ID         : CVE-2017-2885
Debian Bug     : 871650

Aleksandar Nikolic of Cisco Talos discovered a stack-based buffer
overflow vulnerability in libsoup2.4, a HTTP library implementation in
C. A remote attacker can take advantage of this flaw by sending a
specially crafted HTTP request to cause an application using the
libsoup2.4 library to crash (denial of service), or potentially execute
arbitrary code.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.48.0-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 2.56.0-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3930-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
August 10, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : freeradius
CVE ID         : CVE-2017-10978 CVE-2017-10979 CVE-2017-10980 CVE-2017-10981
                 CVE-2017-10982 CVE-2017-10983 CVE-2017-10984 CVE-2017-10985
                 CVE-2017-10986 CVE-2017-10987
Debian Bug     : 868765

Guido Vranken discovered that FreeRADIUS, an open source
implementation of RADIUS, the IETF protocol for AAA (Authorisation,
Authentication, and Accounting), did not properly handle memory when
processing packets. This would allow a remote attacker to cause a
denial-of-service by application crash, or potentially execute
arbitrary code.

All those issues are covered by this single DSA, but it's worth noting
that not all issues affect all releases:

  - CVE-2017-10978 and CVE-2017-10983 affect both jessie and stretch

  - CVE-2017-10979, CVE-2017-10980, CVE-2017-10981 and CVE-2017-10982
    affect only jessie

  - CVE-2017-10984, CVE-2017-10985, CVE-2017-10986 and CVE-2017-10987
    affect only stretch.

For the oldstable distribution (jessie), these problems have been fixed
in version 2.2.5+dfsg-0.2+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 3.0.12+dfsg-5+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3933-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 10, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : pjproject
CVE ID         : CVE-2017-9359 CVE-2017-9372

Two vulnerabilities were found in the PJSIP/PJProject communication
library, which may result in denial of service.

For the oldstable distribution (jessie), these problems have been fixed
in version 2.1.0.0.ast20130823-1+deb8u1.

For the stable distribution (stretch), these problems had been fixed
prior to the initial release.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3932-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
August 10, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : subversion
CVE ID         : CVE-2016-8734 CVE-2017-9800

Several problems were discovered in Subversion, a centralised version
control system.

CVE-2016-8734 (jessie only)

    Subversion's mod_dontdothat server module and Subversion clients
    using http(s):// were vulnerable to a denial-of-service attack
    caused by exponential XML entity expansion.

CVE-2017-9800

    Joern Schneeweisz discovered that Subversion did not correctly
    handle maliciously constructed svn+ssh:// URLs. This allowed an
    attacker to run an arbitrary shell command, for instance via
    svn:externals properties or when using 'svnsync sync'.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.8.10-6+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 1.9.5-1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3934-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
August 10, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : git
CVE ID         : CVE-2017-1000117

Joern Schneeweisz discovered that git, a distributed revision control
system, did not correctly handle maliciously constructed ssh://
URLs. This allowed an attacker to run an arbitrary shell command, for
instance via git submodules.

For the oldstable distribution (jessie), this problem has been fixed
in version 1:2.1.4-2.1+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 1:2.11.0-3+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3935-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 10, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : postgresql-9.4
CVE ID         : CVE-2017-7546 CVE-2017-7547 CVE-2017-7548

Several vulnerabilities have been found in the PostgreSQL database
system:

CVE-2017-7546

    In some authentication methods empty passwords were accepted.

CVE-2017-7547

    User mappings could leak data to unprivileged users.

CVE-2017-7548

    The lo_put() function ignored ACLs.

For more in-depth descriptions of the security vulnerabilities,
please see https://www.postgres...bout/news/1772/

For the oldstable distribution (jessie), these problems have been fixed
in version 9.4.13-0+deb8u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3936-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 10, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : postgresql-9.6
CVE ID         : CVE-2017-7546 CVE-2017-7547 CVE-2017-7548

Several vulnerabilities have been found in the PostgreSQL database
system:

CVE-2017-7546

    In some authentication methods empty passwords were accepted.

CVE-2017-7547

    User mappings could leak data to unprivileged users.

CVE-2017-7548

    The lo_put() function ignored ACLs.

For more in-depth descriptions of the security vulnerabilities,
please see https://www.postgres...bout/news/1772/

For the stable distribution (stretch), these problems have been fixed in
version 9.6.4-0+deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1306 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,266 posts

Posted 11 August 2017 - 10:22 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3937-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 12, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : zabbix
CVE ID         : CVE-2017-2824 CVE-2017-2825

Lilith Wyatt discovered two vulnerabilities in the Zabbix network
monitoring system which may result in execution of arbitrary code or
database writes by malicious proxies.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:2.2.7+dfsg-2+deb8u3.

For the stable distribution (stretch), these problems have been fixed
prior to the initial release.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1307 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,266 posts

Posted 14 August 2017 - 07:56 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3938-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 12, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libgd2
CVE ID         : CVE-2017-7890
Debian Bug     : 869263

Matviy Kotoniy reported that the gdImageCreateFromGifCtx() function used
to load images from GIF format files in libgd2, a library for
programmatic graphics creation and manipulation, does not zero stack
allocated color map buffers before their use, which may result in
information disclosure if a specially crafted file is processed.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.1.0-5+deb8u10.

For the stable distribution (stretch), this problem has been fixed in
version 2.2.4-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3939-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 12, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : botan1.10
CVE ID         : CVE-2017-2801

Aleksandar Nikolic discovered that an error in the x509 parser of the
Botan crypto library could result in an out-of-bounds memory read,
resulting in denial of service or an information leak if processing
a malformed certificate.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.10.8-2+deb8u2.

For the stable distribution (stretch), this problem has been fixed
prior to the initial release.


- -------------------------------------------------------------------------
Debian Security Advisory DSA-3940-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
August 13, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : cvs
CVE ID         : CVE-2017-12836
Debian Bug     : 871810

It was discovered that CVS, a centralised version control system, did
not correctly handle maliciously constructed repository URLs, which
allowed an attacker to run an arbitrary shell command.

For the oldstable distribution (jessie), this problem has been fixed
in version 2:1.12.13+real-15+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 2:1.12.13+real-22+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3940-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 13, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : iortcw
CVE ID         : CVE-2017-11721

A read buffer overflow was discovered in the idtech3 (Quake III Arena)
family of game engines. This allows remote attackers to cause a denial
of service (application crash) or possibly have unspecified other impact
via a crafted packet.

For the stable distribution (stretch), this problem has been fixed in
version 1.50a+dfsg1-3+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3942-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 13, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : supervisor
CVE ID         : CVE-2017-11610
Debian Bug     : 870187

Calum Hutton reported that the XML-RPC server in supervisor, a system
for controlling process state, does not perform validation on requested
XML-RPC methods, allowing an authenticated client to send a malicious
XML-RPC request to supervisord that will run arbitrary shell commands on
the server as the same user as supervisord.

The vulnerability has been fixed by disabling nested namespace lookup
entirely. supervisord will now only call methods on the object
registered to handle XML-RPC requests and not any child objects it may
contain, possibly breaking existing setups. No publicly available
plugins are currently known that use nested namespaces. Plugins that use
a single namespace will continue to work as before. Details can be found
on the upstream issue at
https://github.com/S...isor/issues/964 .

For the oldstable distribution (jessie), this problem has been fixed
in version 3.0r1-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 3.3.1-1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3943-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 14, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gajim
CVE ID         : CVE-2016-10376
Debian Bug     : 863445

Gajim, a GTK+-based XMPP/Jabber client, unconditionally implements the
"XEP-0146: Remote Controlling Clients" extension, allowing a malicious
XMPP server to trigger commands to leak private conversations from
encrypted sessions. With this update XEP-0146 support has been disabled
by default and made opt-in via the 'remote_commands' option.

For the oldstable distribution (jessie), this problem has been fixed
in version 0.16-1+deb8u2.

For the stable distribution (stretch), this problem has been fixed prior
to the initial release.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1308 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,266 posts

Posted 17 August 2017 - 07:36 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3928-2                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 16, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2017-7753 CVE-2017-7779 CVE-2017-7784 CVE-2017-7785
                 CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792
                 CVE-2017-7798 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802
                 CVE-2017-7803 CVE-2017-7807 CVE-2017-7809

The update shipped in DSA 3928-1 failed to build on the mips, mipsel
and powerpc architectures for the oldstable distribution (jessie).
This has been fixed in 52.3.0esr-1~deb8u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3944-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 17, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mariadb-10.0
CVE ID         : CVE-2017-3308 CVE-2017-3309 CVE-2017-3453 CVE-2017-3456
                 CVE-2017-3464 CVE-2017-3636 CVE-2017-3641 CVE-2017-3653

Several issues have been discovered in the MariaDB database server. The
vulnerabilities are addressed by upgrading MariaDB to the new upstream
version 10.0.32. Please see the MariaDB 10.0 Release Notes for further
details:

https://mariadb.com/...-release-notes/
https://mariadb.com/...-release-notes/

For the oldstable distribution (jessie), these problems have been fixed
in version 10.0.32-0+deb8u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3945-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 17, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2014-9940 CVE-2017-7346 CVE-2017-7482 CVE-2017-7533
                 CVE-2017-7541 CVE-2017-7542 CVE-2017-7889 CVE-2017-9605
                 CVE-2017-10911 CVE-2017-11176 CVE-2017-1000363
                 CVE-2017-1000365

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

CVE-2014-9940

    A use-after-free flaw in the voltage and current regulator driver
    could allow a local user to cause a denial of service or potentially
    escalate privileges.

CVE-2017-7346

    Li Qiang discovered that the DRM driver for VMware virtual GPUs does
    not properly check user-controlled values in the
    vmw_surface_define_ioctl() functions for upper limits. A local user
    can take advantage of this flaw to cause a denial of service.

CVE-2017-7482

    Shi Lei discovered that RxRPC Kerberos 5 ticket handling code does
    not properly verify metadata, leading to information disclosure,
    denial of service or potentially execution of arbitrary code.

CVE-2017-7533

    Fan Wu and Shixiong Zhao discovered a race condition between inotify
    events and VFS rename operations allowing an unprivileged local
    attacker to cause a denial of service or escalate privileges.

CVE-2017-7541

    A buffer overflow flaw in the Broadcom IEEE802.11n PCIe SoftMAC WLAN
    driver could allow a local user to cause kernel memory corruption,
    leading to a denial of service or potentially privilege escalation.

CVE-2017-7542

    An integer overflow vulnerability in the ip6_find_1stfragopt()
    function was found allowing a local attacker with privileges to open
    raw sockets to cause a denial of service.

CVE-2017-7889

    Tommi Rantala and Brad Spengler reported that the mm subsystem does
    not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism,
    allowing a local attacker with access to /dev/mem to obtain
    sensitive information or potentially execute arbitrary code.

CVE-2017-9605

    Murray McAllister discovered that the DRM driver for VMware virtual
    GPUs does not properly initialize memory, potentially allowing a
    local attacker to obtain sensitive information from uninitialized
    kernel memory via a crafted ioctl call.

CVE-2017-10911 / XSA-216

    Anthony Perard of Citrix discovered an information leak flaw in Xen
    blkif response handling, allowing a malicious unprivileged guest to
    obtain sensitive information from the host or other guests.

CVE-2017-11176

    It was discovered that the mq_notify() function does not set the
    sock pointer to NULL upon entry into the retry logic. An attacker
    can take advantage of this flaw during a userspace close of a
    Netlink socket to cause a denial of service or potentially cause
    other impact.

CVE-2017-1000363

    Roee Hay reported that the lp driver does not properly bounds-check
    passed arguments, allowing a local attacker with write access to the
    kernel command line arguments to execute arbitrary code.

CVE-2017-1000365

    It was discovered that argument and environment pointers are not
    taken properly into account to the imposed size restrictions on
    arguments and environmental strings passed through
    RLIMIT_STACK/RLIMIT_INFINITY. A local attacker can take advantage of
    this flaw in conjunction with other flaws to execute arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 3.16.43-2+deb8u3.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.

#1309 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,266 posts

Posted Yesterday, 08:21 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3946-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
August 18, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libmspack
CVE ID         : CVE-2017-6419 CVE-2017-11423
Debian Bug     : 868956 871263

It was discovered that libsmpack, a library used to handle Microsoft
compression formats, did not properly validate its input. A remote
attacker could craft malicious CAB or CHM files and use this flaw to
cause a denial of service via application crash, or potentially
execute arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 0.5-1+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 0.5-1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3947-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
August 18, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : newsbeuter
CVE ID         : CVE-2017-12904

Jeriko One discovered that newsbeuter, a text-mode RSS feed reader,
did not properly escape the title and description of a news article
when bookmarking it. This allowed a remote attacker to run an
arbitrary shell command on the client machine.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.8-2+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 2.9-5+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3948-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 19, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ioquake3
CVE ID         : CVE-2017-11721

A read buffer overflow was discovered in the idtech3 (Quake III Arena)
family of game engines. This allows remote attackers to cause a denial
of service (application crash) or possibly have unspecified other impact
via a crafted packet.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.36+u20140802+gca9eebb-2+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 1.36+u20161101+dfsg1-2+deb9u1.
registered Linux user number 324659  || The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted ImageKXStudio
For the things we have to learn before we can do them, we learn by doing them.





Also tagged with one or more of these keywords: debian, updates, sunrat, bruno, v.t. eric layton

1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users