Jump to content

Recommended Posts

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4287-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 07, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : firefox-esr

CVE ID : CVE-2018-12376 CVE-2018-12377 CVE-2018-12378

 

Several security issues have been found in the Mozilla Firefox web

browser: Multiple memory safety errors and use-after-frees may lead to

the execution of arbitrary code or denial of service.

 

Debian follows the extended support releases (ESR) of Firefox. Support

for the 52.x series has ended, so starting with this update we're now

following the 60.x releases.

 

Between 52.x and 60.x, Firefox has undergone significant internal

updates, which makes it incompatible with a number of extensions. For

more information please refer to

https://www.mozilla.org/en-US/firefox/60.0esr/releasenotes/

 

In addition, the new Firefox packages require Rust to build. A

compatible Rust toolchain has been backported to Debian stretch, but is

not available for all architectures which previously supported the

purely C++-based Firefox packages. Thus, the new Firefox packages

don't support the armel, armhf, mips, mips64el and mipsel architectures

at this point.

 

For the stable distribution (stretch), these problems have been fixed in

version 60.2.0esr-1~deb9u2.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4288-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 07, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : ghostscript

CVE ID : CVE-2018-15908 CVE-2018-15910 CVE-2018-15911

CVE-2018-16511 CVE-2018-16513 CVE-2018-16539

CVE-2018-16540 CVE-2018-16541 CVE-2018-16542

CVE-2018-16543 CVE-2018-16585

 

Tavis Ormandy discovered multiple vulnerabilites in Ghostscript, an

interpreter for the PostScript language, which could result in denial of

service, the creation of files or the execution of arbitrary code if a

malformed Postscript file is processed (despite the dSAFER sandbox being

enabled).

 

For the stable distribution (stretch), these problems have been fixed in

version 9.20~dfsg-3.2+deb9u4.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4289-1 security@debian.org

https://www.debian.org/security/ Michael Gilbert

September 07, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : chromium-browser

CVE ID : CVE-2018-16065 CVE-2018-16066 CVE-2018-16067 CVE-2018-16068

CVE-2018-16069 CVE-2018-16070 CVE-2018-16071 CVE-2018-16073

CVE-2018-16074 CVE-2018-16075 CVE-2018-16076 CVE-2018-16077

CVE-2018-16078 CVE-2018-16079 CVE-2018-16080 CVE-2018-16081

CVE-2018-16082 CVE-2018-16083 CVE-2018-16084 CVE-2018-16085

 

Several vulnerabilities have been discovered in the chromium web browser.

 

CVE-2018-16065

 

Brendon Tiszka discovered an out-of-bounds write issue in the v8

javascript library.

 

CVE-2018-16066

 

cloudfuzzer discovered an out-of-bounds read issue in blink/webkit.

 

CVE-2018-16067

 

Zhe Jin discovered an out-of-bounds read issue in the WebAudio

implementation.

 

CVE-2018-16068

 

Mark Brand discovered an out-of-bounds write issue in the Mojo

message passing library.

 

CVE-2018-16069

 

Mark Brand discovered an out-of-bounds read issue in the swiftshader

library.

 

CVE-2018-16070

 

Ivan Fratric discovered an integer overflow issue in the skia library.

 

CVE-2018-16071

 

Natalie Silvanovich discovered a use-after-free issue in the WebRTC

implementation.

 

CVE-2018-16073

 

Jun Kokatsu discovered an error in the Site Isolation feature when

restoring browser tabs.

 

CVE-2018-16074

 

Jun Kokatsu discovered an error in the Site Isolation feature when

using a Blob URL.

 

CVE-2018-16075

 

Pepe Vila discovered an error that could allow remote sites to access

local files.

 

CVE-2018-16076

 

Aseksandar Nikolic discovered an out-of-bounds read issue in the pdfium

library.

 

CVE-2018-16077

 

Manuel Caballero discovered a way to bypass the Content Security Policy.

 

CVE-2018-16078

 

Cailan Sacks discovered that the Autofill feature could leak saved

credit card information.

 

CVE-2018-16079

 

Markus Vervier and Michele Orrù discovered a URL spoofing issue.

 

CVE-2018-16080

 

Khalil Zhani discovered a URL spoofing issue.

 

CVE-2018-16081

 

Jann Horn discovered that local files could be accessed in the developer

tools.

 

CVE-2018-16082

 

Omair discovered a buffer overflow issue in the swiftshader library.

 

CVE-2018-16083

 

Natalie Silvanovich discovered an out-of-bounds read issue in the WebRTC

implementation.

 

CVE-2018-16084

 

Jun Kokatsu discovered a way to bypass a user confirmation dialog.

 

CVE-2018-16085

 

Roman Kuksin discovered a use-after-free issue.

 

For the stable distribution (stretch), these problems have been fixed in

version 69.0.3497.81-1~deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4290-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

September 10, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : libextractor

CVE ID : CVE-2018-14346 CVE-2018-14347 CVE-2018-16430

Debian Bug : 904903 904905 907987

 

Several vulnerabilities were discovered in libextractor, a library to

extract arbitrary meta-data from files, which may lead to denial of

service or the execution of arbitrary code if a specially crafted file

is opened.

 

For the stable distribution (stretch), these problems have been fixed in

version 1:1.3-4+deb9u2.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4291-1 security@debian.org

https://www.debian.org/security/ Yves-Alexis Perez

September 11, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : mgetty

CVE ID : CVE-2018-16741

 

Two input sanitization failures have been found in the faxrunq and faxq

binaries in mgetty, a smart modem getty replacement. An attacker could leverage

them to insert commands via shell metacharacters in jobs id and have them

executed with the privilege of the faxrunq/faxq user.

 

For the stable distribution (stretch), this problem has been fixed in

version 1.1.36-3+deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4292-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

September 11, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : kamailio

CVE ID : CVE-2018-16657

Debian Bug : 908324

 

Henning Westerholt discovered a flaw related to the Via header

processing in kamailio, a very fast, dynamic and configurable SIP

server. An unauthenticated attacker can take advantage of this flaw to

mount a denial of service attack via a specially crafted SIP message

with an invalid Via header.

 

For the stable distribution (stretch), this problem has been fixed in

version 4.4.4-2+deb9u3.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4293-1 security@debian.org

https://www.debian.org/security/ Alessandro Ghedini

September 14, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : discount

CVE ID : CVE-2018-11468 CVE-2018-11503 CVE-2018-11504 CVE-2018-12495

Debian Bug : 901912

 

Several heap buffer overflows were found in discount, an implementation

of the Markdown markup language, that could be triggered witth specially

crafted Markdown data and would cause discount to read past the end of

internal buffers.

 

For the stable distribution (stretch), these problems have been fixed in

version 2.2.2-1+deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4273-2 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 16, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : intel-microcode

CVE ID : CVE-2018-3639 CVE-2018-3640

 

This update ships updated CPU microcode for additional models of Intel

CPUs which were not yet covered by the Intel microcode update released

as DSA-4273-1 (and thus provides SSBD support (needed to address

"Spectre v4") and fixes for "Spectre v3a")).

 

For the stable distribution (stretch), these problems have been fixed in

version 3.20180807a.1~deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4294-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 16, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : ghostscript

CVE ID : CVE-2018-16509 CVE-2018-16802

 

Tavis Ormandy discovered multiple vulnerabilites in Ghostscript, an

interpreter for the PostScript language, which could result in the

execution of arbitrary code if a malformed Postscript file is processed

(despite the dSAFER sandbox being enabled).

 

For the stable distribution (stretch), these problems have been fixed in

version 9.20~dfsg-3.2+deb9u5.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4295-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 16, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : thunderbird

CVE ID : CVE-2018-5156 CVE-2018-5187 CVE-2018-12361 CVE-2018-12367

CVE-2018-12371

 

Multiple security issues have been found in Thunderbird: Multiple memory

safety errors and use-after-frees may lead to the execution of arbitrary

code or denial of service.

 

Debian follows the Thunderbird upstream releases. Support for the 52.x

series has ended, so starting with this update we're now following the

60.x releases.

 

Between 52.x and 60.x, Thunderbird has undergone significant internal

updates, which makes it incompatible with a number of extensions. For

more information please refer to

https://support.mozilla.org/en-US/kb/new-thunderbird-60

 

In addition, the new Thunderbird packages require Rust to build. A

compatible Rust toolchain has been backported to Debian stretch, but is

not available for all architectures which previously supported the

purely C++-based Thunderbird packages. Thus, the new Thunderbird packages

don't support the mips, mips64el and mipsel architectures at this point.

 

For the stable distribution (stretch), these problems have been fixed in

version 1:60.0-3~deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4296-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 16, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : mbedtls

CVE ID : CVE-2018-0497 CVE-2018-0498

 

Two vulnerabilities were discovered in mbedtls, a lightweight crypto and

SSL/TLS library which could result in plain text recovery via

side-channel attacks.

 

For the stable distribution (stretch), these problems have been fixed in

version 2.4.2-1+deb9u3.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4297-1 security@debian.org

https://www.debian.org/security/ Michael Gilbert

September 19, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : chromium-browser

 

Two vulnerabilities have been discovered in the chromium web browser.

Kevin Cheung discovered an error in the WebAssembly implementation and

evil1m0 discovered a URL spoofing issue.

 

For the stable distribution (stretch), this problem has been fixed in

version 69.0.3497.92-1~deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4298-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 20, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : hylafax

CVE ID : CVE-2018-17141

 

Luis Merino, Markus Vervier and Eric Sesterhenn discovered that missing

input sanitising in the Hylafax fax software could potentially result in

the execution of arbitrary code via a malformed fax message.

 

For the stable distribution (stretch), this problem has been fixed in

version 3:6.0.6-7+deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4299-1 security@debian.org

https://www.debian.org/security/ Yves-Alexis Perez

September 21, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : texlive-bin

CVE : not yet available

 

Nick Roessler from the University of Pennsylvania has found a buffer overflow

in texlive-bin, the executables for TexLive, the popular distribution of TeX

document production system.

 

This buffer overflow can be used for arbitrary code execution by crafting a

special type1 font (.pfb) and provide it to users running pdf(la)tex, dvips or

luatex in a way that the font is loaded.

 

For the stable distribution (stretch), this problem has been fixed in

version 2016.20160513.41080.dfsg-2+deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4300-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

September 22, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : libarchive-zip-perl

CVE ID : CVE-2018-10860

Debian Bug : 902882

 

It was discovered that Archive::Zip, a perl module for manipulation of

ZIP archives, is prone to a directory traversal vulnerability. An

attacker able to provide a specially crafted archive for processing can

take advantage of this flaw to overwrite arbitrary files during archive

extraction.

 

For the stable distribution (stretch), this problem has been fixed in

version 1.59-1+deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4301-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 22, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : mediawiki

CVE ID : CVE-2018-0503 CVE-2018-0504 CVE-2018-0505

 

Multiple security vulnerabilities have been discovered in MediaWiki, a

website engine for collaborative work, which result in incorrectly

configured rate limits, information disclosure in Special:Redirect/logid

and bypass of an account lock.

 

For the stable distribution (stretch), these problems have been fixed in

version 1:1.27.5-1~deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4302-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

September 23, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : openafs

CVE ID : CVE-2018-16947 CVE-2018-16948 CVE-2018-16949

Debian Bug : 908616

 

Several vulnerabilities were discovered in openafs, an implementation of

the distributed filesystem AFS. The Common Vulnerabilities and Exposures

project identifies the following problems:

 

CVE-2018-16947

 

Jeffrey Altman reported that the backup tape controller (butc)

process does accept incoming RPCs but does not require (or allow

for) authentication of those RPCs, allowing an unauthenticated

attacker to perform volume operations with administrator

credentials.

 

https://openafs.org/pages/security/OPENAFS-SA-2018-001.txt

 

CVE-2018-16948

 

Mark Vitale reported that several RPC server routines do not fully

initialize output variables, leaking memory contents (from both

the stack and the heap) to the remote caller for

otherwise-successful RPCs.

 

https://openafs.org/pages/security/OPENAFS-SA-2018-002.txt

 

CVE-2018-16949

 

Mark Vitale reported that an unauthenticated attacker can consume

large amounts of server memory and network bandwidth via

specially crafted requests, resulting in denial of service to

legitimate clients.

 

https://openafs.org/pages/security/OPENAFS-SA-2018-003.txt

 

For the stable distribution (stretch), these problems have been fixed in

version 1.6.20-2+deb9u2.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4303-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 23, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : okular

CVE ID : CVE-2018-1000801

 

Joran Herve discovered that the Okular document viewer was susceptible

to directory traversal via malformed .okular files (annotated document

archives), which could result in the creation of arbitrary files.

 

For the stable distribution (stretch), this problem has been fixed in

version 4:16.08.2-1+deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4304-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 23, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : firefox-esr

CVE ID : CVE-2018-12383 CVE-2018-12385

 

Two security issues have been found in the Mozilla Firefox web browser,

which could potentially result in the execution of arbitrary code and

local information disclosure.

 

For the stable distribution (stretch), these problems have been fixed in

version 60.2.1esr-1~deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4305-1 security@debian.org

https://www.debian.org/security/ Yves-Alexis Perez

September 24, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : strongswan

CVE ID : CVE-2018-16151 CVE-2018-16152

 

Sze Yiu Chau and his team from Purdue University and The University of Iowa

found several issues in the gmp plugin for strongSwan, an IKE/IPsec suite.

 

Problems in the parsing and verification of RSA signatures could lead to a

Bleichenbacher-style low-exponent signature forgery in certificates and during

IKE authentication.

 

While the gmp plugin doesn't allow arbitrary data after the ASN.1 structure

(the original Bleichenbacher attack), the ASN.1 parser is not strict enough and

allows data in specific fields inside the ASN.1 structure.

 

Only installations using the gmp plugin are affected (on Debian OpenSSL plugin

has priority over GMP one for RSA operations), and only when using keys and

certificates (including ones from CAs) using keys with an exponent e = 3, which

is usually rare in practice.

 

CVE-2018-16151

 

The OID parser in the ASN.1 code in gmp allows any number of random bytes

after a valid OID.

 

CVE-2018-16152

 

The algorithmIdentifier parser in the ASN.1 code in gmp doesn't enforce a

NULL value for the optional parameter which is not used with any PKCS#1

algorithm.

 

For the stable distribution (stretch), these problems have been fixed in

version 5.5.1-4+deb9u3.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4306-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 27, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : python2.7

CVE ID : CVE-2018-1060 CVE-2018-1061 CVE-2018-14647

CVE-2018-1000802

 

Multiple security issues were discovered in Python: ElementTree failed

to initialise Expat's hash salt, two denial of service issues were found

in difflib and poplib and the shutil module was affected by a command

injection vulnerability.

 

For the stable distribution (stretch), these problems have been fixed in

version 2.7.13-2+deb9u3.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4307-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

September 28, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : python3.5

CVE ID : CVE-2017-1000158 CVE-2018-1060 CVE-2018-1061

CVE-2018-14647

 

Multiple security issues were discovered in Python: ElementTree failed

to initialise Expat's hash salt, two denial of service issues were found

in difflib and poplib and a buffer overflow in PyString_DecodeEscape.

 

For the stable distribution (stretch), these problems have been fixed in

version 3.5.3-1+deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4308-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

October 01, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : linux

CVE ID : CVE-2018-6554 CVE-2018-6555 CVE-2018-7755 CVE-2018-9363

CVE-2018-9516 CVE-2018-10902 CVE-2018-10938 CVE-2018-13099

CVE-2018-14609 CVE-2018-14617 CVE-2018-14633 CVE-2018-14678

CVE-2018-14734 CVE-2018-15572 CVE-2018-15594 CVE-2018-16276

CVE-2018-16658 CVE-2018-17182

 

Several vulnerabilities have been discovered in the Linux kernel that

may lead to a privilege escalation, denial of service or information

leaks.

 

CVE-2018-6554

 

A memory leak in the irda_bind function in the irda subsystem was

discovered. A local user can take advantage of this flaw to cause a

denial of service (memory consumption).

 

CVE-2018-6555

 

A flaw was discovered in the irda_setsockopt function in the irda

subsystem, allowing a local user to cause a denial of service

(use-after-free and system crash).

 

CVE-2018-7755

 

Brian Belleville discovered a flaw in the fd_locked_ioctl function

in the floppy driver in the Linux kernel. The floppy driver copies a

kernel pointer to user memory in response to the FDGETPRM ioctl. A

local user with access to a floppy drive device can take advantage

of this flaw to discover the location kernel code and data.

 

CVE-2018-9363

 

It was discovered that the Bluetooth HIDP implementation did not

correctly check the length of received report messages. A paired

HIDP device could use this to cause a buffer overflow, leading to

denial of service (memory corruption or crash) or potentially

remote code execution.

 

CVE-2018-9516

 

It was discovered that the HID events interface in debugfs did not

correctly limit the length of copies to user buffers. A local

user with access to these files could use this to cause a

denial of service (memory corruption or crash) or possibly for

privilege escalation. However, by default debugfs is only

accessible by the root user.

 

CVE-2018-10902

 

It was discovered that the rawmidi kernel driver does not protect

against concurrent access which leads to a double-realloc (double

free) flaw. A local attacker can take advantage of this issue for

privilege escalation.

 

CVE-2018-10938

 

Yves Younan from Cisco reported that the Cipso IPv4 module did not

correctly check the length of IPv4 options. On custom kernels with

CONFIG_NETLABEL enabled, a remote attacker could use this to cause

a denial of service (hang).

 

CVE-2018-13099

 

Wen Xu from SSLab at Gatech reported a use-after-free bug in the

F2FS implementation. An attacker able to mount a crafted F2FS

volume could use this to cause a denial of service (crash or

memory corruption) or possibly for privilege escalation.

 

CVE-2018-14609

 

Wen Xu from SSLab at Gatech reported a potential null pointer

dereference in the F2FS implementation. An attacker able to mount

a crafted F2FS volume could use this to cause a denial of service

(crash).

 

CVE-2018-14617

 

Wen Xu from SSLab at Gatech reported a potential null pointer

dereference in the HFS+ implementation. An attacker able to mount

a crafted HFS+ volume could use this to cause a denial of service

(crash).

 

CVE-2018-14633

 

Vincent Pelletier discovered a stack-based buffer overflow flaw in

the chap_server_compute_md5() function in the iSCSI target code. An

unauthenticated remote attacker can take advantage of this flaw to

cause a denial of service or possibly to get a non-authorized access

to data exported by an iSCSI target.

 

CVE-2018-14678

 

M. Vefa Bicakci and Andy Lutomirski discovered a flaw in the

kernel exit code used on amd64 systems running as Xen PV guests.

A local user could use this to cause a denial of service (crash).

 

CVE-2018-14734

 

A use-after-free bug was discovered in the InfiniBand

communication manager. A local user could use this to cause a

denial of service (crash or memory corruption) or possible for

privilege escalation.

 

CVE-2018-15572

 

Esmaiel Mohammadian Koruyeh, Khaled Khasawneh, Chengyu Song, and

Nael Abu-Ghazaleh, from University of California, Riverside,

reported a variant of Spectre variant 2, dubbed SpectreRSB. A

local user may be able to use this to read sensitive information

from processes owned by other users.

 

CVE-2018-15594

 

Nadav Amit reported that some indirect function calls used in

paravirtualised guests were vulnerable to Spectre variant 2. A

local user may be able to use this to read sensitive information

from the kernel.

 

CVE-2018-16276

 

Jann Horn discovered that the yurex driver did not correctly limit

the length of copies to user buffers. A local user with access to

a yurex device node could use this to cause a denial of service

(memory corruption or crash) or possibly for privilege escalation.

 

CVE-2018-16658

 

It was discovered that the cdrom driver does not correctly

validate the parameter to the CDROM_DRIVE_STATUS ioctl. A user

with access to a cdrom device could use this to read sensitive

information from the kernel or to cause a denial of service

(crash).

 

CVE-2018-17182

 

Jann Horn discovered that the vmacache_flush_all function mishandles

sequence number overflows. A local user can take advantage of this

flaw to trigger a use-after-free, causing a denial of service

(crash or memory corruption) or privilege escalation.

 

For the stable distribution (stretch), these problems have been fixed in

version 4.9.110-3+deb9u5.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4309-1 security@debian.org

https://www.debian.org/security/ Yves-Alexis Perez

October 01, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : strongswan

CVE ID : CVE-2018-17540

 

Google's OSS-Fuzz revealed an exploitable bug in the gmp plugin caused by the

patch that fixes CVE-2018-16151 and CVE-2018-16151 (DSA-4305-1).

 

An attacker could trigger it using crafted certificates with RSA keys with

very small moduli. Verifying signatures with such keys would cause an integer

underflow and subsequent heap buffer overflow resulting in a crash of the

daemon. While arbitrary code execution is not completely ruled out because of

the heap buffer overflow, due to the form of the data written to the buffer

it seems difficult to actually exploit it in such a way.

 

For the stable distribution (stretch), this problem has been fixed in

version 5.5.1-4+deb9u4.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4310-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

October 03, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : firefox-esr

CVE ID : CVE-2018-12386 CVE-2018-12387

 

Two security issues have been found in the Mozilla Firefox web browser,

which could potentially result in the execution of arbitrary code inside

the sandboxed content process.

 

For the stable distribution (stretch), these problems have been fixed in

version 60.2.2esr-1~deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4311-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

October 05, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : git

CVE ID : CVE-2018-17456

 

joernchen of Phenoelit discovered that git, a fast, scalable,

distributed revision control system, is prone to an arbitrary code

execution vulnerability via a specially crafted .gitmodules file in a

project cloned with --recurse-submodules.

 

For the stable distribution (stretch), this problem has been fixed in

version 1:2.11.0-3+deb9u4.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4312-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

October 08, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : tinc

CVE ID : CVE-2018-16738 CVE-2018-16758

 

Several vulnerabilities were discovered in tinc, a Virtual Private

Network (VPN) daemon. The Common Vulnerabilities and Exposures project

identifies the following problems:

 

CVE-2018-16738

 

Michael Yonli discovered a flaw in the implementation of the

authentication protocol that could allow a remote attacker to

establish an authenticated, one-way connection with another node.

 

CVE-2018-16758

 

Michael Yonli discovered that a man-in-the-middle that has

intercepted a TCP connection might be able to disable encryption of

UDP packets sent by a node.

 

For the stable distribution (stretch), these problems have been fixed in

version 1.0.31-1+deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4313-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

October 08, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : linux

CVE ID : CVE-2018-15471 CVE-2018-18021

 

Several vulnerabilities have been discovered in the Linux kernel that

may lead to a privilege escalation, denial of service or information

leaks.

 

CVE-2018-15471 (XSA-270)

 

Felix Wilhelm of Google Project Zero discovered a flaw in the hash

handling of the xen-netback Linux kernel module. A malicious or

buggy frontend may cause the (usually privileged) backend to make

out of bounds memory accesses, potentially resulting in privilege

escalation, denial of service, or information leaks.

 

https://xenbits.xen.org/xsa/advisory-270.html

 

CVE-2018-18021

 

It was discovered that the KVM subsystem on the arm64 platform does

not properly handle the KVM_SET_ON_REG ioctl. An attacker who can

create KVM based virtual machines can take advantage of this flaw

for denial of service (hypervisor panic) or privilege escalation

(arbitrarily redirect the hypervisor flow of control with full

register control).

 

For the stable distribution (stretch), these problems have been fixed in

version 4.9.110-3+deb9u6.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4314-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

October 11, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : net-snmp

CVE ID : CVE-2018-18065

Debian Bug : 910638

 

Magnus Klaaborg Stubman discovered a NULL pointer dereference bug in

net-snmp, a suite of Simple Network Management Protocol applications,

allowing a remote, authenticated attacker to crash the snmpd process

(causing a denial of service).

 

For the stable distribution (stretch), this problem has been fixed in

version 5.7.3+dfsg-1.7+deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4315-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 12, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : wireshark

CVE ID : CVE-2018-16056 CVE-2018-16057 CVE-2018-16058

 

Multiple vulnerabilities have been discovered in Wireshark, a network

protocol analyzer which could result in denial of service or the

execution of arbitrary code.

 

For the stable distribution (stretch), these problems have been fixed in

version 2.6.3-1~deb9u1. This update upgrades Wireshark to the 2.6.x

release branch, future security upgrades will be based on this series.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4316-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 12, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : imagemagick

CVE ID : CVE-2018-16412 CVE-2018-16413 CVE-2018-16642 CVE-2018-16644

CVE-2018-16645

 

This update fixes several vulnerabilities in Imagemagick, a graphical

software suite. Various memory handling problems or incomplete input

sanitising have been found in the coders for BMP, DIB, PICT, DCM, CUT

and PSD.

 

For the stable distribution (stretch), these problems have been fixed in

version 8:6.9.7.4+dfsg-11+deb9u6.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4317-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 14, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : otrs2

CVE ID : CVE-2018-14593 CVE-2018-16586 CVE-2018-16587

 

Three vulnerabilities were discovered in the Open Ticket Request System

which could result in privilege escalation or denial of service.

 

For the stable distribution (stretch), these problems have been fixed in

version 5.0.16-1+deb9u6.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4318-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

October 15, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : moin

CVE ID : CVE-2017-5934

Debian Bug : 910776

 

Nitin Venkatesh discovered a cross-site scripting vulnerability in moin,

a Python clone of WikiWiki. A remote attacker can conduct cross-site

scripting attacks via the GUI editor's link dialogue. This only affects

installations which have set up fckeditor (not enabled by default).

 

For the stable distribution (stretch), this problem has been fixed in

version 1.9.9-1+deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4319-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

October 15, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : spice

CVE ID : CVE-2018-10873

Debian Bug : 906315

 

Frediano Ziglio reported a missing check in the script to generate

demarshalling code in the SPICE protocol client and server library. The

generated demarshalling code is prone to multiple buffer overflows. An

authenticated attacker can take advantage of this flaw to cause a denial

of service (spice server crash), or possibly, execute arbitrary code.

 

For the stable distribution (stretch), this problem has been fixed in

version 0.12.8-2.1+deb9u2.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4320-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 16, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : asterisk

CVE ID : CVE-2018-7284 CVE-2018-7286 CVE-2018-12227 CVE-2018-17281

Debian Bug : 891227 891228 902954 909554

 

Multiple vulnerabilities have been discovered in Asterisk, an open source

PBX and telephony toolkit, which may result in denial of service or

information disclosure.

 

For the stable distribution (stretch), these problems have been fixed in

version 1:13.14.1~dfsg-2+deb9u4.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4321-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 16, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : graphicsmagick

CVE ID : CVE-2017-10794 CVE-2017-10799 CVE-2017-10800 CVE-2017-11102

CVE-2017-11139 CVE-2017-11140 CVE-2017-11403 CVE-2017-11636

CVE-2017-11637 CVE-2017-11638 CVE-2017-11641 CVE-2017-11642

CVE-2017-11643 CVE-2017-11722 CVE-2017-12935 CVE-2017-12936

CVE-2017-12937 CVE-2017-13063 CVE-2017-13064 CVE-2017-13065

CVE-2017-13134 CVE-2017-13737 CVE-2017-13775 CVE-2017-13776

CVE-2017-13777 CVE-2017-14314 CVE-2017-14504 CVE-2017-14733

CVE-2017-14994 CVE-2017-14997 CVE-2017-15238 CVE-2017-15277

CVE-2017-15930 CVE-2017-16352 CVE-2017-16353 CVE-2017-16545

CVE-2017-16547 CVE-2017-16669 CVE-2017-17498 CVE-2017-17500

CVE-2017-17501 CVE-2017-17502 CVE-2017-17503 CVE-2017-17782

CVE-2017-17783 CVE-2017-17912 CVE-2017-17913 CVE-2017-17915

CVE-2017-18219 CVE-2017-18220 CVE-2017-18229 CVE-2017-18230

CVE-2017-18231 CVE-2018-5685 CVE-2018-6799 CVE-2018-9018

 

Several vulnerabilities have been discovered in GraphicsMagick, a set of

command-line applications to manipulate image files, which could result

in denial of service or the execution of arbitrary code if malformed

image files are processed.

 

For the stable distribution (stretch), these problems have been fixed in

version 1.3.30+hg15796-1~deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4322-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

October 17, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : libssh

CVE ID : CVE-2018-10933

Debian Bug : 911149

 

Peter Winter-Smith of NCC Group discovered that libssh, a tiny C SSH

library, contains an authentication bypass vulnerability in the server

code. An attacker can take advantage of this flaw to successfully

authenticate without any credentials by presenting the server an

SSH2_MSG_USERAUTH_SUCCESS message in place of the

SSH2_MSG_USERAUTH_REQUEST message which the server would expect to

initiate authentication.

 

For the stable distribution (stretch), this problem has been fixed in

version 0.7.3-2+deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4323-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 18, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : drupal7

CVE ID : not yet available

 

Two vulnerabilities were found in Drupal, a fully-featured content

management framework, which could result in arbitrary code execution or

an open redirect. For additional information, please refer to the

upstream advisory at https://www.drupal.org/sa-core-2018-006

 

For the stable distribution (stretch), this problem has been fixed in

version 7.52-2+deb9u5.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4324-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 24, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : firefox-esr

CVE ID : CVE-2018-12389 CVE-2018-12390 CVE-2018-12392

CVE-2018-12393 CVE-2018-12395 CVE-2018-12396

CVE-2018-12397

 

Multiple security issues have been found in the Mozilla Firefox web

browser, which could result in the execution of arbitrary code,

privilege escalation or information disclosure.

 

For the stable distribution (stretch), these problems have been fixed in

version 60.3.0esr-1~deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4325-1 security@debian.org

https://www.debian.org/security/ Sebastien Delafond

October 25, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : mosquitto

CVE ID : CVE-2017-7651 CVE-2017-7652 CVE-2017-7653 CVE-2017-7654

Debian Bug : 911265 911266

 

It was discovered that mosquitto, an MQTT broker, was vulnerable to

remote denial-of-service attacks that could be mounted using various

vectors.

 

For the stable distribution (stretch), these problems have been fixed in

version 1.4.10-3+deb9u2

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4326-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 25, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : openjdk-8

CVE ID : CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3169

CVE-2018-3180 CVE-2018-3183 CVE-2018-3214

 

Several vulnerabilities have been discovered in OpenJDK, an

implementation of the Oracle Java platform, resulting in denial of

service, sandbox bypass, incomplete TLS identity verification,

information disclosure or the execution of arbitrary code.

 

For the stable distribution (stretch), these problems have been fixed in

version 8u181-b13-2~deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4327-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 25, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : thunderbird

CVE ID : CVE-2017-16541 CVE-2018-12376 CVE-2018-12377 CVE-2018-12378

CVE-2018-12379 CVE-2018-12383 CVE-2018-12385

 

Multiple security issues have been found in Thunderbird: Multiple memory

safety errors and use-after-frees may lead to the execution of arbitrary

code or denial of service.

 

For the stable distribution (stretch), these problems have been fixed in

version 1:60.2.1-2~deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4328-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 25, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : xorg-server

CVE ID : CVE-2018-14665

 

Narendra Shinde discovered that incorrect command-line parameter

validation in the Xorg X server may result in arbitary file overwrite,

which can result in privilege escalation.

 

For the stable distribution (stretch), this problem has been fixed in

version 2:1.19.2-1+deb9u4.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4321-2 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 28, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : graphicsmagick

 

The update of Graphicsmagick in DSA-4321-1 introduced a change in the

handling of case-sensitivity in an internal API function which could

affect some code built against the GraphicsMagick libraries. This update

restores the previous behaviour.

 

For the stable distribution (stretch), these problems have been fixed in

version 1.3.30+hg15796-1~deb9u2.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4329-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

October 28, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : teeworlds

CVE ID : CVE-2018-18541

 

It was discovered that incorrect connection setup in the server for

Teeworlds, an online multi-player platform 2D shooter, could result in

denial of service via forged connection packets (rendering all game

server slots occupied).

 

For the stable distribution (stretch), this problem has been fixed in

version 0.6.5+dfsg-1~deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4330-1 security@debian.org

https://www.debian.org/security/ Michael Gilbert

November 02, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : chromium-browser

CVE ID : CVE-2018-5179 CVE-2018-17462 CVE-2018-17463 CVE-2018-17464

CVE-2018-17465 CVE-2018-17466 CVE-2018-17467 CVE-2018-17468

CVE-2018-17469 CVE-2018-17470 CVE-2018-17471 CVE-2018-17473

CVE-2018-17474 CVE-2018-17475 CVE-2018-17476 CVE-2018-17477

 

Several vulnerabilities have been discovered in the chromium web browser.

 

CVE-2018-5179

 

Yannic Boneberger discovered an error in the ServiceWorker implementation.

 

CVE-2018-17462

 

Ned Williamson and Niklas Baumstark discovered a way to escape the sandbox.

 

CVE-2018-17463

 

Ned Williamson and Niklas Baumstark discovered a remote code execution

issue in the v8 javascript library.

 

CVE-2018-17464

 

xisigr discovered a URL spoofing issue.

 

CVE-2018-17465

 

Lin Zuojian discovered a use-after-free issue in the v8 javascript

library.

 

CVE-2018-17466

 

Omair discovered a memory corruption issue in the angle library.

 

CVE-2018-17467

 

Khalil Zhani discovered a URL spoofing issue.

 

CVE-2018-17468

 

Jams Lee discovered an information disclosure issue.

 

CVE-2018-17469

 

Zhen Zhou discovered a buffer overflow issue in the pdfium library.

 

CVE-2018-17470

 

Zhe Jin discovered a memory corruption issue in the GPU backend

implementation.

 

CVE-2018-17471

 

Lnyas Zhang discovered an issue with the full screen user interface.

 

CVE-2018-17473

 

Khalil Zhani discovered a URL spoofing issue.

 

CVE-2018-17474

 

Zhe Jin discovered a use-after-free issue.

 

CVE-2018-17475

 

Vladimir Metnew discovered a URL spoofing issue.

 

CVE-2018-17476

 

Khalil Zhani discovered an issue with the full screen user interface.

 

CVE-2018-17477

 

Aaron Muir Hamilton discovered a user interface spoofing issue in the

extensions pane.

 

This update also fixes a buffer overflow in the embedded lcms library included

with chromium.

 

For the stable distribution (stretch), these problems have been fixed in

version 70.0.3538.67-1~deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4331-1 security@debian.org

https://www.debian.org/security/ Alessandro Ghedini

November 02, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : curl

CVE ID : CVE-2018-16839 CVE-2018-16842

 

Two vulnerabilities were discovered in cURL, an URL transfer library.

 

CVE-2018-16839

 

Harry Sintonen discovered that, on systems with a 32 bit size_t, an

integer overflow would be triggered when a SASL user name longer

than 2GB is used. This would in turn cause a very small buffer to be

allocated instead of the intended very huge one, which would trigger

a heap buffer overflow when the buffer is used.

 

CVE-2018-16842

 

Brian Carpenter discovered that the logic in the curl tool to wrap

error messages at 80 columns is flawed, leading to a read buffer

overflow if a single word in the message is itself longer than 80

bytes.

 

For the stable distribution (stretch), these problems have been fixed in

version 7.52.1-5+deb9u8.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4332-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

November 03, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : ruby2.3

CVE ID : CVE-2018-16395 CVE-2018-16396

 

Several vulnerabilities have been discovered in the interpreter for the

Ruby language. The Common Vulnerabilities and Exposures project

identifies the following problems:

 

CVE-2018-16395

 

Tyler Eckstein reported that the equality check of

OpenSSL::X509::Name could return true for non-equal objects. If a

malicious X.509 certificate is passed to compare with an existing

certificate, there is a possibility to be judged incorrectly that

they are equal.

 

CVE-2018-16396

 

Chris Seaton discovered that tainted flags are not propagated in

Array#pack and String#unpack with some directives.

 

For the stable distribution (stretch), these problems have been fixed in

version 2.3.3-1+deb9u4.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4333-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

November 04, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : icecast2

CVE ID : CVE-2018-18820

 

Nick Rolfe discovered multiple buffer overflows in the Icecast multimedia

streaming server which could result in the execution of arbitrary code.

 

For the stable distribution (stretch), this problem has been fixed in

version 2.4.2-1+deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4334-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

November 04, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : mupdf

CVE ID : CVE-2017-17866 CVE-2018-5686 CVE-2018-6187 CVE-2018-6192

CVE-2018-1000037 CVE-2018-1000040

 

Multiple vulnerabilities were discovered in MuPDF, a PDF, XPS, and e-book

viewer which could result in denial of service or the execution of

arbitrary code if malformed documents are opened.

 

For the stable distribution (stretch), these problems have been fixed in

version 1.9a+ds1-4+deb9u4.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4335-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

November 08, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : nginx

CVE ID : CVE-2018-16843 CVE-2018-16844 CVE-2018-16845

 

Three vulnerabilities were discovered in Nginx, a high-performance web

and reverse proxy server, which could in denial of service in processing

HTTP/2 (via excessive memory/CPU usage) or server memory disclosure in

the ngx_http_mp4_module module (used for server-side MP4 streaming).

 

For the stable distribution (stretch), these problems have been fixed in

version 1.10.3-1+deb9u2.

Share this post


Link to post
Share on other sites

------------------------------------------------------------------------

The Debian Project https://www.debian.org/

Updated Debian 9: 9.6 released press@debian.org

November 10th, 2018 https://www.debian.org/News/2018/20181110

------------------------------------------------------------------------

 

 

The Debian project is pleased to announce the sixth update of its stable

distribution Debian 9 (codename "stretch"). This point release mainly

adds corrections for security issues, along with a few adjustments for

serious problems. Security advisories have already been published

separately and are referenced where available.

 

Please note that the point release does not constitute a new version of

Debian 9 but only updates some of the packages included. There is no

need to throw away old "stretch" media. After installation, packages can

be upgraded to the current versions using an up-to-date Debian mirror.

 

Those who frequently install updates from security.debian.org won't have

to update many packages, and most such updates are included in the point

release.

 

New installation images will be available soon at the regular locations.

 

Upgrading an existing installation to this revision can be achieved by

pointing the package management system at one of Debian's many HTTP

mirrors. A comprehensive list of mirrors is available at:

 

https://www.debian.org/mirror/list

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4336-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

November 10, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : ghostscript

CVE ID : CVE-2018-11645 CVE-2018-17961 CVE-2018-18073 CVE-2018-18284

Debian Bug : 910678 910758 911175

 

Several vulnerabilities were discovered in Ghostscript, the GPL

PostScript/PDF interpreter, which may result in denial of service,

disclosure of existence and size of arbitrary files, or the execution of

arbitrary code if a malformed Postscript file is processed (despite the

dSAFER sandbox being enabled).

 

This update rebases ghostscript for stretch to the upstream version 9.25

which includes additional non-security related changes.

 

For the stable distribution (stretch), these problems have been fixed in

version 9.25~dfsg-0+deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4337-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

November 10, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : thunderbird

CVE ID : CVE-2018-12389 CVE-2018-12390 CVE-2018-12392

CVE-2018-12393

 

Multiple security issues have been found in Thunderbird: Multiple memory

safety errors may lead to the execution of arbitrary code or denial of

service.

 

For the stable distribution (stretch), these problems have been fixed in

version 1:60.3.0-1~deb9u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4338-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

November 11, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : qemu

CVE ID : CVE-2018-10839 CVE-2018-17962 CVE-2018-17963

Debian Bug : 908682 910431 911468 911469

 

Integer overflows in the processing of packets in network cards emulated

by QEMU, a fast processor emulator, could result in denial of service.

 

In addition this update backports support to passthrough the new CPU

features added in the intel-microcode update shipped in DSA 4273 to

x86-based guests.

 

For the stable distribution (stretch), these problems have been fixed in

version 1:2.8+dfsg-6+deb9u5.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4339-1 security@debian.org

https://www.debian.org/security/ Moritz Muehlenhoff

November 13, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : ceph

CVE ID : CVE-2017-7519 CVE-2018-1086 CVE-2018-1128 CVE-2018-1129

 

Multiple vulnerabilities were discovered in Ceph, a distributed storage

and file system: The cephx authentication protocol was suspectible to

replay attacks and calculated signatures incorrectly, "ceph mon" did not

validate capabilities for pool operations (resulting in potential

corruption or deletion of snapshot images) and a format string

vulnerability in libradosstriper could result in denial of service.

 

For the stable distribution (stretch), these problems have been fixed in

version 10.2.11-1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4340-1 security@debian.org

https://www.debian.org/security/ Michael Gilbert

November 18, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : chromium-browser

CVE ID : CVE-2018-17478

 

An out-of-bounds bounds memory access issue was discovered in chromium's

v8 javascript library by cloudfuzzer.

 

This update also fixes two problems introduced by the previous security

upload. Support for arm64 has been restored and gconf-service is no longer

a package dependency.

 

For the stable distribution (stretch), this problem has been fixed in

version 70.0.3538.102-1~deb9u1.

Share this post


Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-4341-1 security@debian.org

https://www.debian.org/security/ Salvatore Bonaccorso

November 19, 2018 https://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : mariadb-10.1

CVE ID : CVE-2017-10268 CVE-2017-10378 CVE-2017-15365 CVE-2018-2562

CVE-2018-2612 CVE-2018-2622 CVE-2018-2640 CVE-2018-2665

CVE-2018-2668 CVE-2018-2755 CVE-2018-2761 CVE-2018-2766

CVE-2018-2767 CVE-2018-2771 CVE-2018-2781 CVE-2018-2782

CVE-2018-2784 CVE-2018-2787 CVE-2018-2813 CVE-2018-2817

CVE-2018-2819 CVE-2018-3058 CVE-2018-3063 CVE-2018-3064

CVE-2018-3066 CVE-2018-3081 CVE-2018-3143 CVE-2018-3156

CVE-2018-3174 CVE-2018-3251 CVE-2018-3282

Debian Bug : 885345 898444 898445 912848

 

Several issues have been discovered in the MariaDB database server. The

vulnerabilities are addressed by upgrading MariaDB to the new upstream

version 10.1.37. Please see the MariaDB 10.1 Release Notes for further

details:

 

https://mariadb.com/kb/en/mariadb/mariadb-10127-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10128-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10129-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10130-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10131-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10132-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10133-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10134-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10135-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10136-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10137-release-notes/

 

For the stable distribution (stretch), these problems have been fixed in

version 10.1.37-0+deb9u1.

Share this post


Link to post
Share on other sites

×
×
  • Create New...