Jump to content
Bruno

NEW UPDATES Debian

Recommended Posts

sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4590-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 19, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : cyrus-imapd
CVE ID         : CVE-2019-19783

It was discovered that the lmtpd component of the Cyrus IMAP server
created mailboxes with administrator privileges if the "fileinto" was
used, bypassing ACL checks.

For the oldstable distribution (stretch), this problem has been fixed
in version 2.5.10-3+deb9u2.

For the stable distribution (buster), this problem has been fixed in
version 3.0.8-6+deb10u3.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4591-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
December 20, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : cyrus-sasl2
CVE ID         : CVE-2019-19906
Debian Bug     : 947043

Stephan Zeisberg reported an out-of-bounds write vulnerability in the
_sasl_add_string() function in cyrus-sasl2, a library implementing the
Simple Authentication and Security Layer. A remote attacker can take
advantage of this issue to cause denial-of-service conditions for
applications using the library.

For the oldstable distribution (stretch), this problem has been fixed
in version 2.1.27~101-g0780600+dfsg-3+deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 2.1.27+dfsg-1+deb10u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4592-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 26, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mediawiki
CVE ID         : CVE-2019-19709

It was discovered that the Title blacklist functionality in MediaWiki,
a website engine for collaborative work, could by bypassed.

For the oldstable distribution (stretch), this problem has been fixed
in version 1:1.27.7-1~deb9u3.

For the stable distribution (buster), this problem has been fixed in
version 1:1.31.6-1~deb10u1.

 

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4593-1                   security@debian.org
https://www.debian.org/security/                            Hugo Lefeuvre
December 27, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : freeimage
CVE ID         : CVE-2019-12211 CVE-2019-12213
Debian Bug     : 929597

It was found that freeimage, a graphics library, was affected by the
following two security issues:

CVE-2019-12211

    Heap buffer overflow caused by invalid memcpy in PluginTIFF. This
    flaw might be leveraged by remote attackers to trigger denial of
    service or any other unspecified impact via crafted TIFF data.

CVE-2019-12213

    Stack exhaustion caused by unwanted recursion in PluginTIFF. This
    flaw might be leveraged by remote attackers to trigger denial of
    service via crafted TIFF data.

For the oldstable distribution (stretch), these problems have been fixed
in version 3.17.0+ds1-5+deb9u1.

For the stable distribution (buster), these problems have been fixed in
version 3.18.0+ds2-1+deb10u1.

 

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4594-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 27, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openssl1.0
CVE ID         : CVE-2019-1551

Guido Vranken discovered an overflow bug in the x64_64 Montgomery
squaring procedure used in exponentiation with 512-bit moduli.

For the oldstable distribution (stretch), this problem has been fixed
in version 1.0.2u-1~deb9u1.

 

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4595-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 27, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : debian-lan-config
CVE ID         : CVE-2019-3467
Debian Bug     : 947459

It was discovered that debian-lan-config, a FAI config space for the
Debian-LAN system, configured too permissive ACLs for the Kerberos admin
server, which allowed password changes for other user principals.

This update provides a fixed configuration for new deployments, for
existing setups, the NEWS file shipped in this update provides advice
to fix the configuration.

For the oldstable distribution (stretch), this problem has been fixed
in version 0.23+deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 0.25+deb10u1.

 

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4596-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 27, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tomcat8
CVE ID         : CVE-2018-8014 CVE-2018-11784 CVE-2019-0199 CVE-2019-0221 
                 CVE-2019-12418 CVE-2019-17563

Several issues were discovered in the Tomcat servlet and JSP engine, which
could result in session fixation attacks, information disclosure, cross-
site scripting, denial of service via resource exhaustion and insecure
redirects.

For the oldstable distribution (stretch), these problems have been fixed
in version 8.5.50-0+deb9u1. This update also requires an updated version
of tomcat-native which has been updated to 1.2.21-1~deb9u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4597-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 03, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : netty
CVE ID         : CVE-2019-16869
Debian Bug     : 941266

It was reported that Netty, a Java NIO client/server framework, is prone
to a HTTP request smuggling vulnerability due to mishandling whitespace
before the colon in HTTP headers.

For the oldstable distribution (stretch), this problem has been fixed
in version 1:4.1.7-2+deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 1:4.1.33-1+deb10u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4598-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 07, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : python-django
CVE ID         : CVE-2019-19844
Debian Bug     : 946937

Simon Charette reported that the password reset functionality in Django,
a high-level Python web development framework, uses a Unicode
case-insensitive query to retrieve accounts matching the email address
requesting the password reset. An attacker can take advantage of this
flaw to potentially retrieve password reset tokens and hijack accounts.

For details please refer to
https://www.djangoproject.com/weblog/2019/dec/18/security-releases/

For the oldstable distribution (stretch), this problem has been fixed
in version 1:1.10.7-2+deb9u7.

For the stable distribution (buster), this problem has been fixed in
version 1:1.11.27-1~deb10u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4599-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
January 08, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wordpress
CVE ID         : CVE-2019-16217 CVE-2019-16218 CVE-2019-16219 CVE-2019-16220 
                 CVE-2019-16221 CVE-2019-16222 CVE-2019-16223 CVE-2019-16780 
                 CVE-2019-16781 CVE-2019-17669 CVE-2019-17671 CVE-2019-17672 
                 CVE-2019-17673 CVE-2019-17674 CVE-2019-17675 CVE-2019-20041 
                 CVE-2019-20042 CVE-2019-20043
Debian Bug     : 939543 942459 946905

Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform various Cross-Side
Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create
open redirects, poison cache, and bypass authorization access and
input sanitation.

For the stable distribution (buster), these problems have been fixed in
version 5.0.4+dfsg1-1+deb10u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4600-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 09, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2019-17026 CVE-2019-17024 CVE-2019-17022
                 CVE-2019-17017 CVE-2019-17016

Multiple security issues have been found in the Mozilla Firefox
web browser, which could potentially result in the execution
of arbitrary code, data exfiltration or cross-site scripting.
	
For the oldstable distribution (stretch), this problem has been fixed
in version 68.4.1esr-1~deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 68.4.1esr-1~deb10u1

 

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4601-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 09, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ldm
CVE ID         : not yet available

It was discovered that a hook script of ldm, the display manager for the
Linux Terminal Server Project incorrectly parsed responses from an SSH
server which could result in local root privilege escalation.

For the oldstable distribution (stretch), this problem has been fixed
in version 2:2.2.18-2+deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 2:2.18.06-1+deb10u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4602-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 13, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xen
CVE ID         : CVE-2019-17349 CVE-2019-17350 CVE-2019-18420 CVE-2019-18421 
                 CVE-2019-18422 CVE-2019-18423 CVE-2019-18424 CVE-2019-18425 
                 CVE-2019-19577 CVE-2019-19578 CVE-2019-19579 CVE-2019-19580 
                 CVE-2019-19581 CVE-2019-19582 CVE-2019-19583 CVE-2018-12207
                 CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091
                 CVE-2019-11135 CVE-2019-17348 CVE-2019-17347 CVE-2019-17346
                 CVE-2019-17345 CVE-2019-17344 CVE-2019-17343 CVE-2019-17342
                 CVE-2019-17341 CVE-2019-17340

Multiple vulnerabilities have been discovered in the Xen hypervisor, which
could result in denial of service, guest-to-host privilege escalation or
information leaks.

In addition this update provides mitigations for the "TSX Asynchronous Abort"
speculative side channel attack. For additional information please refer to
https://xenbits.xen.org/xsa/advisory-305.html

For the oldstable distribution (stretch), these problems have been fixed
in version 4.8.5.final+shim4.10.4-1+deb9u12. Note that this will be the
last security update for Xen in the oldstable distribution; upstream
support for the 4.8.x branch ended by the end of December 2019. If you
rely on security support for your Xen installation an update to the
stable distribution (buster) is recommended.

For the stable distribution (buster), these problems have been fixed in
version 4.11.3+24-g14b62ab3e5-1~deb10u1.
  • Like 1

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4603-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 17, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : thunderbird
CVE ID         : CVE-2019-17016 CVE-2019-17017 CVE-2019-17022
                 CVE-2019-17024 CVE-2019-17026

Multiple security issues have been found in Thunderbird which could
potentially result in the execution of arbitrary code or information
disclosure.

For the oldstable distribution (stretch), these problems have been fixed
in version 1:68.4.1-1~deb9u1.

For the stable distribution (buster), these problems have been fixed in
version 1:68.4.1-1~deb10u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4604-1                   security@debian.org
https://www.debian.org/security/                            Hugo Lefeuvre
January 19, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : cacti
CVE ID         : CVE-2019-16723 CVE-2019-17357 CVE-2019-17358
Debian Bug     : 947374 947375 941036

Multiple issues have been found in cacti, a server monitoring system,
potentially resulting in SQL code execution or information disclosure by
authenticated users.

CVE-2019-16723

    Authenticated users may bypass authorization checks for viewing a graph
    by submitting requests with modified local_graph_id parameters.

CVE-2019-17357

    The graph administration interface insufficiently sanitizes the
    template_id parameter, potentially resulting in SQL injection. This
    vulnerability might be leveraged by authenticated attackers to perform
    unauthorized SQL code execution on the database.

CVE-2019-17358

    The sanitize_unserialize_selected_items function (lib/functions.php)
    insufficiently sanitizes user input before deserializing it,
    potentially resulting in unsafe deserialization of user-controlled
    data. This vulnerability might be leveraged by authenticated attackers
    to influence the program control flow or cause memory corruption.

For the oldstable distribution (stretch), these problems have been fixed
in version 0.8.8h+ds1-10+deb9u1. Note that stretch was only affected by
CVE-2018-17358.

For the stable distribution (buster), these problems have been fixed in
version 1.2.2+ds1-2+deb10u2.

 

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4605-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 19, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openjdk-11
CVE ID         : CVE-2020-2583 CVE-2020-2590 CVE-2020-2593 CVE-2020-2601 
                 CVE-2020-2604 CVE-2020-2654 CVE-2020-2655

Several vulnerabilities have been discovered in the OpenJDK Java
runtime, resulting in denial of service, incorrect implementation of
Kerberos GSSAPI and TGS requests or incorrect TLS handshakes.
	    
For the stable distribution (buster), these problems have been fixed in
version 11.0.6+10-1~deb10u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4606-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
January 20, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium
CVE ID         : CVE-2019-13725 CVE-2019-13726 CVE-2019-13727 CVE-2019-13728
                 CVE-2019-13729 CVE-2019-13730 CVE-2019-13732 CVE-2019-13734
                 CVE-2019-13735 CVE-2019-13736 CVE-2019-13737 CVE-2019-13738
                 CVE-2019-13739 CVE-2019-13740 CVE-2019-13741 CVE-2019-13742
                 CVE-2019-13743 CVE-2019-13744 CVE-2019-13745 CVE-2019-13746
                 CVE-2019-13747 CVE-2019-13748 CVE-2019-13749 CVE-2019-13750
                 CVE-2019-13751 CVE-2019-13752 CVE-2019-13753 CVE-2019-13754
                 CVE-2019-13755 CVE-2019-13756 CVE-2019-13757 CVE-2019-13758
                 CVE-2019-13759 CVE-2019-13761 CVE-2019-13762 CVE-2019-13763
                 CVE-2019-13764 CVE-2019-13767 CVE-2020-6377 CVE-2020-6378
                 CVE-2020-6379 CVE-2020-6380

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2019-13725

    Gengming Liu and Jianyu Chen discovered a use-after-free issue in the
    bluetooth implementation.

CVE-2019-13726

    Sergei Lazunov discovered a buffer overflow issue.

CVE-2019-13727

    @piochu discovered a policy enforcement error.

CVE-2019-13728

    Rong Jian and Guang Gong discovered an out-of-bounds write error in the
    v8 javascript library.

CVE-2019-13729

    Zhe Jin discovered a use-after-free issue.

CVE-2019-13730

    Soyeon Park and Wen Xu discovered the use of a wrong type in the v8
    javascript library.

CVE-2019-13732

    Sergei Glazunov discovered a use-after-free issue in the WebAudio
    implementation.

CVE-2019-13734

    Wenxiang Qian discovered an out-of-bounds write issue in the sqlite
    library.

CVE-2019-13735

    Gengming Liu and Zhen Feng discovered an out-of-bounds write issue in the
    v8 javascript library.

CVE-2019-13736

    An integer overflow issue was discovered in the pdfium library.

CVE-2019-13737

    Mark Amery discovered a policy enforcement error.

CVE-2019-13738

    Johnathan Norman and Daniel Clark discovered a policy enforcement error.

CVE-2019-13739

    xisigr discovered a user interface error.

CVE-2019-13740

    Khalil Zhani discovered a user interface error.

CVE-2019-13741

    Michał Bentkowski discovered that user input could be incompletely
    validated.

CVE-2019-13742

    Khalil Zhani discovered a user interface error.

CVE-2019-13743

    Zhiyang Zeng discovered a user interface error.

CVE-2019-13744

    Prakash discovered a policy enforcement error.

CVE-2019-13745

    Luan Herrera discovered a policy enforcement error.

CVE-2019-13746

    David Erceg discovered a policy enforcement error.

CVE-2019-13747

    Ivan Popelyshev and André Bonatti discovered an uninitialized value.

CVE-2019-13748

    David Erceg discovered a policy enforcement error.

CVE-2019-13749

    Khalil Zhani discovered a user interface error.

CVE-2019-13750

    Wenxiang Qian discovered insufficient validation of data in the sqlite
    library.

CVE-2019-13751

    Wenxiang Qian discovered an uninitialized value in the sqlite library.

CVE-2019-13752

    Wenxiang Qian discovered an out-of-bounds read issue in the sqlite
    library.

CVE-2019-13753

    Wenxiang Qian discovered an out-of-bounds read issue in the sqlite
    library.

CVE-2019-13754

    Cody Crews discovered a policy enforcement error.

CVE-2019-13755

    Masato Kinugawa discovered a policy enforcement error.

CVE-2019-13756

    Khalil Zhani discovered a user interface error.

CVE-2019-13757

    Khalil Zhani discovered a user interface error.

CVE-2019-13758

    Khalil Zhani discovered a policy enforecement error.

CVE-2019-13759

    Wenxu Wu discovered a user interface error.

CVE-2019-13761

    Khalil Zhani discovered a user interface error.

CVE-2019-13762

    csanuragjain discovered a policy enforecement error.

CVE-2019-13763

    weiwangpp93 discovered a policy enforecement error.

CVE-2019-13764

    Soyeon Park and Wen Xu discovered the use of a wrong type in the v8
    javascript library.

CVE-2019-13767

    Sergei Glazunov discovered a use-after-free issue.

CVE-2020-6377

    Zhe Jin discovered a use-after-free issue.

CVE-2020-6378

    Antti Levomäki and Christian Jalio discovered a use-after-free issue.

CVE-2020-6379

    Guang Gong discovered a use-after-free issue.

CVE-2020-6380

    Sergei Glazunov discovered an error verifying extension messages.

For the oldstable distribution (stretch), security support for chromium has
been discontinued.

For the stable distribution (buster), these problems have been fixed in
version 79.0.3945.130-1~deb10u1.

 

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4607-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 20, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openconnect
CVE ID         : CVE-2019-16239
Debian Bug     : 940871

Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP
in openconnect, an open client for Cisco AnyConnect, Pulse and
GlobalProtect VPN. A malicious HTTP server (after having accepted its
identity certificate), can provide bogus chunk lengths for chunked HTTP
encoding and cause a heap-based buffer overflow.

For the oldstable distribution (stretch), this problem has been fixed
in version 7.08-1+deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 8.02-1+deb10u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4608-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 21, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tiff
CVE ID         : CVE-2019-14973 CVE-2019-17546

Multiple integer overflows have been discovered in the libtiff library
and the included tools.

For the stable distribution (buster), these problems have been fixed in
version 4.1.0+git191117-2~deb10u1.

Share this post


Link to post
Share on other sites
sunrat
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4609-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 23, 2020                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : python-apt
CVE ID         : CVE-2019-15795 CVE-2019-15796
Debian Bug     : 944696

Two security issues were found in the Python interface to the apt
package manager; package downloads from unsigned repositories were
incorrectly rejected and the hash validation relied on MD5.

For the oldstable distribution (stretch), these problems have been fixed
in version 1.4.1.

For the stable distribution (buster), these problems have been fixed in
version 1.8.4.1.

Share this post


Link to post
Share on other sites

×
×
  • Create New...