- -------------------------------------------------------------------------
Debian Security Advisory DSA-4379-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 01, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : golang-1.7
CVE ID : CVE-2018-7187 CVE-2019-6486
A vulnerability was discovered in the implementation of the P-521 and
P-384 elliptic curves, which could result in denial of service and in
some cases key recovery.
In addition this update fixes a vulnerability in "go get", which could
result in the execution of arbitrary shell commands.
For the stable distribution (stretch), these problems have been fixed in
version 1.7.4-2+deb9u1.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4380-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 01, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : golang-1.8
CVE ID : CVE-2018-6574 CVE-2018-7187 CVE-2019-6486
A vulnerability was discovered in the implementation of the P-521 and
P-384 elliptic curves, which could result in denial of service and in
some cases key recovery.
In addition this update fixes two vulnerabilities in "go get", which
could result in the execution of arbitrary shell commands.
For the stable distribution (stretch), these problems have been fixed in
version 1.8.1-1+deb9u1.


NEW UPDATES Debian
Started by
Bruno
, Feb 28 2009 02:13 PM
debian updates sunrat bruno v.t. eric layton
1533 replies to this topic
#1526 OFFLINE
Posted 01 February 2019 - 08:39 PM
registered Linux user number 324659 || The importance of Reading The *Fine* Manual! :D




For the things we have to learn before we can do them, we learn by doing them.




For the things we have to learn before we can do them, we learn by doing them.
#1527 OFFLINE
Posted 03 February 2019 - 06:06 PM
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4381-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 02, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libreoffice
CVE ID : CVE-2018-16858
Alex Infuehr discovered a directory traversal vulnerability which could
result in the execution of Python script code when opening a malformed
document.
For the stable distribution (stretch), this problem has been fixed in
version 1:5.2.7-1+deb9u5. In addition this update fixes a bug in the
validation of signed PDFs; it would display an incomplete status message
when dealing with a partial signature.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4382-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 02, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : rssh
CVE ID : CVE-2019-3463 CVE-2019-3464
Nick Cleaton discovered two vulnerabilities in rssh, a restricted shell
that allows users to perform only scp, sftp, cvs, svnserve (Subversion),
rdist and/or rsync operations. Missing validation in the rsync support
could result in the bypass of this restriction, allowing the execution
of arbitrary shell commands.
For the stable distribution (stretch), these problems have been fixed in
version 2.3.4-5+deb9u2.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4383-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 03, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libvncserver
CVE ID : CVE-2018-6307 CVE-2018-15126 CVE-2018-15127 CVE-2018-20019
CVE-2018-20020 CVE-2018-20021 CVE-2018-20022 CVE-2018-20023
CVE-2018-20024
Debian Bug : 916941
Pavel Cheremushkin discovered several vulnerabilities in libvncserver, a
library to implement VNC server/client functionalities, which might result in
the execution of arbitrary code, denial of service or information disclosure.
For the stable distribution (stretch), these problems have been fixed in
version 0.9.11+dfsg-1.3~deb9u1.
Debian Security Advisory DSA-4381-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 02, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libreoffice
CVE ID : CVE-2018-16858
Alex Infuehr discovered a directory traversal vulnerability which could
result in the execution of Python script code when opening a malformed
document.
For the stable distribution (stretch), this problem has been fixed in
version 1:5.2.7-1+deb9u5. In addition this update fixes a bug in the
validation of signed PDFs; it would display an incomplete status message
when dealing with a partial signature.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4382-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 02, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : rssh
CVE ID : CVE-2019-3463 CVE-2019-3464
Nick Cleaton discovered two vulnerabilities in rssh, a restricted shell
that allows users to perform only scp, sftp, cvs, svnserve (Subversion),
rdist and/or rsync operations. Missing validation in the rsync support
could result in the bypass of this restriction, allowing the execution
of arbitrary shell commands.
For the stable distribution (stretch), these problems have been fixed in
version 2.3.4-5+deb9u2.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4383-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 03, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libvncserver
CVE ID : CVE-2018-6307 CVE-2018-15126 CVE-2018-15127 CVE-2018-20019
CVE-2018-20020 CVE-2018-20021 CVE-2018-20022 CVE-2018-20023
CVE-2018-20024
Debian Bug : 916941
Pavel Cheremushkin discovered several vulnerabilities in libvncserver, a
library to implement VNC server/client functionalities, which might result in
the execution of arbitrary code, denial of service or information disclosure.
For the stable distribution (stretch), these problems have been fixed in
version 0.9.11+dfsg-1.3~deb9u1.
registered Linux user number 324659 || The importance of Reading The *Fine* Manual! :D




For the things we have to learn before we can do them, we learn by doing them.




For the things we have to learn before we can do them, we learn by doing them.
#1528 OFFLINE
Posted 05 February 2019 - 09:01 PM
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4384-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 04, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libgd2
CVE ID : CVE-2019-6977 CVE-2019-6978
Debian Bug : 920645 920728
Multiple vulnerabilities have been discovered in libgd2, a library for
programmatic graphics creation and manipulation, which may result in
denial of service or potentially the execution of arbitrary code if a
malformed file is processed.
For the stable distribution (stretch), these problems have been fixed in
version 2.2.4-2+deb9u4.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4385-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 05, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : dovecot
CVE ID : CVE-2019-3814
halfdog discovered an authentication bypass vulnerability in the Dovecot
email server. Under some configurations Dovecot mistakenly trusts the
username provided via authentication instead of failing. If there is no
additional password verification, this allows the attacker to login as
anyone else in the system. Only installations using:
auth_ssl_require_client_cert = yes
auth_ssl_username_from_cert = yes
are affected by this flaw.
For the stable distribution (stretch), this problem has been fixed in
version 1:2.2.27-3+deb9u3.
Debian Security Advisory DSA-4384-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 04, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libgd2
CVE ID : CVE-2019-6977 CVE-2019-6978
Debian Bug : 920645 920728
Multiple vulnerabilities have been discovered in libgd2, a library for
programmatic graphics creation and manipulation, which may result in
denial of service or potentially the execution of arbitrary code if a
malformed file is processed.
For the stable distribution (stretch), these problems have been fixed in
version 2.2.4-2+deb9u4.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4385-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 05, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : dovecot
CVE ID : CVE-2019-3814
halfdog discovered an authentication bypass vulnerability in the Dovecot
email server. Under some configurations Dovecot mistakenly trusts the
username provided via authentication instead of failing. If there is no
additional password verification, this allows the attacker to login as
anyone else in the system. Only installations using:
auth_ssl_require_client_cert = yes
auth_ssl_username_from_cert = yes
are affected by this flaw.
For the stable distribution (stretch), this problem has been fixed in
version 1:2.2.27-3+deb9u3.
registered Linux user number 324659 || The importance of Reading The *Fine* Manual! :D




For the things we have to learn before we can do them, we learn by doing them.




For the things we have to learn before we can do them, we learn by doing them.
#1529 OFFLINE
Posted 06 February 2019 - 07:20 PM
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4386-1 security@debian.org
https://www.debian.org/security/ Alessandro Ghedini
February 06, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : curl
CVE ID : CVE-2018-16890 CVE-2019-3822 CVE-2019-3823
Multiple vulnerabilities were discovered in cURL, an URL transfer library.
CVE-2018-16890
Wenxiang Qian of Tencent Blade Team discovered that the function
handling incoming NTLM type-2 messages does not validate incoming
data correctly and is subject to an integer overflow vulnerability,
which could lead to an out-of-bounds buffer read.
CVE-2019-3822
Wenxiang Qian of Tencent Blade Team discovered that the function
creating an outgoing NTLM type-3 header is subject to an integer
overflow vulnerability, which could lead to an out-of-bounds write.
CVE-2019-3823
Brian Carpenter of Geeknik Labs discovered that the code handling
the end-of-response for SMTP is subject to an out-of-bounds heap
read.
For the stable distribution (stretch), these problems have been fixed in
version 7.52.1-5+deb9u9.
Debian Security Advisory DSA-4386-1 security@debian.org
https://www.debian.org/security/ Alessandro Ghedini
February 06, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : curl
CVE ID : CVE-2018-16890 CVE-2019-3822 CVE-2019-3823
Multiple vulnerabilities were discovered in cURL, an URL transfer library.
CVE-2018-16890
Wenxiang Qian of Tencent Blade Team discovered that the function
handling incoming NTLM type-2 messages does not validate incoming
data correctly and is subject to an integer overflow vulnerability,
which could lead to an out-of-bounds buffer read.
CVE-2019-3822
Wenxiang Qian of Tencent Blade Team discovered that the function
creating an outgoing NTLM type-3 header is subject to an integer
overflow vulnerability, which could lead to an out-of-bounds write.
CVE-2019-3823
Brian Carpenter of Geeknik Labs discovered that the code handling
the end-of-response for SMTP is subject to an out-of-bounds heap
read.
For the stable distribution (stretch), these problems have been fixed in
version 7.52.1-5+deb9u9.
registered Linux user number 324659 || The importance of Reading The *Fine* Manual! :D




For the things we have to learn before we can do them, we learn by doing them.




For the things we have to learn before we can do them, we learn by doing them.
#1530 OFFLINE
Posted 09 February 2019 - 06:56 PM
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4387-1 security@debian.org
https://www.debian.org/security/ Yves-Alexis Perez
February 09, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openssh
CVE ID : CVE-2018-20685 CVE-2019-6109 CVE-2019-6111
Debian Bug : 793412 919101
Harry Sintonen from F-Secure Corporation discovered multiple vulnerabilities in
OpenSSH, an implementation of the SSH protocol suite. All the vulnerabilities
are in found in the scp client implementing the SCP protocol.
CVE-2018-20685
Due to improper directory name validation, the scp client allows servers to
modify permissions of the target directory by using empty or dot directory
name.
CVE-2019-6109
Due to missing character encoding in the progress display, the object name
can be used to manipulate the client output, for example to employ ANSI
codes to hide additional files being transferred.
CVE-2019-6111
Due to scp client insufficient input validation in path names sent by
server, a malicious server can do arbitrary file overwrites in target
directory. If the recursive (-r) option is provided, the server can also
manipulate subdirectories as well.
.
The check added in this version can lead to regression if the client and
the server have differences in wildcard expansion rules. If the server is
trusted for that purpose, the check can be disabled with a new -T option to
the scp client.
For the stable distribution (stretch), these problems have been fixed in
version 1:7.4p1-10+deb9u5.
Debian Security Advisory DSA-4387-1 security@debian.org
https://www.debian.org/security/ Yves-Alexis Perez
February 09, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openssh
CVE ID : CVE-2018-20685 CVE-2019-6109 CVE-2019-6111
Debian Bug : 793412 919101
Harry Sintonen from F-Secure Corporation discovered multiple vulnerabilities in
OpenSSH, an implementation of the SSH protocol suite. All the vulnerabilities
are in found in the scp client implementing the SCP protocol.
CVE-2018-20685
Due to improper directory name validation, the scp client allows servers to
modify permissions of the target directory by using empty or dot directory
name.
CVE-2019-6109
Due to missing character encoding in the progress display, the object name
can be used to manipulate the client output, for example to employ ANSI
codes to hide additional files being transferred.
CVE-2019-6111
Due to scp client insufficient input validation in path names sent by
server, a malicious server can do arbitrary file overwrites in target
directory. If the recursive (-r) option is provided, the server can also
manipulate subdirectories as well.
.
The check added in this version can lead to regression if the client and
the server have differences in wildcard expansion rules. If the server is
trusted for that purpose, the check can be disabled with a new -T option to
the scp client.
For the stable distribution (stretch), these problems have been fixed in
version 1:7.4p1-10+deb9u5.
registered Linux user number 324659 || The importance of Reading The *Fine* Manual! :D




For the things we have to learn before we can do them, we learn by doing them.




For the things we have to learn before we can do them, we learn by doing them.
#1531 OFFLINE
Posted 11 February 2019 - 08:16 AM
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4388-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 10, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mosquitto
CVE ID : CVE-2018-12546 CVE-2018-12550 CVE-2018-12551
Three vulnerabilities were discovered in the Mosquitto MQTT broker, which
could result in authentication bypass. Please refer to
https://mosquitto.or...1-5-6-released/ for additional
information.
For the stable distribution (stretch), these problems have been fixed in
version 1.4.10-3+deb9u3.
Debian Security Advisory DSA-4388-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 10, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mosquitto
CVE ID : CVE-2018-12546 CVE-2018-12550 CVE-2018-12551
Three vulnerabilities were discovered in the Mosquitto MQTT broker, which
could result in authentication bypass. Please refer to
https://mosquitto.or...1-5-6-released/ for additional
information.
For the stable distribution (stretch), these problems have been fixed in
version 1.4.10-3+deb9u3.
registered Linux user number 324659 || The importance of Reading The *Fine* Manual! :D




For the things we have to learn before we can do them, we learn by doing them.




For the things we have to learn before we can do them, we learn by doing them.
#1532 OFFLINE
Posted 11 February 2019 - 08:48 PM
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4389-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
February 11, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libu2f-host
CVE ID : CVE-2018-20340
Debian Bug : 921725
Christian Reitter discovered that libu2f-host, a library implementing
the host-side of the U2F protocol, failed to properly check for a
buffer overflow. This would allow an attacker with a custom made
malicious USB device masquerading as a security key, and physical
access to a computer where PAM U2F or an application with libu2f-host
integrated, to potentially execute arbitrary code on that computer.
For the stable distribution (stretch), this problem has been fixed in
version 1.1.2-2+deb9u1.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4377-2 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 11, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : rssh
Debian Bug : 921655
The update for rssh issued as DSA 4377-1 introduced a regression that
blocked scp of multiple files from a server using rssh. Updated packages
are now available to correct this issue.
For the stable distribution (stretch), this problem has been fixed in
version 2.3.4-5+deb9u3.
Debian Security Advisory DSA-4389-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
February 11, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libu2f-host
CVE ID : CVE-2018-20340
Debian Bug : 921725
Christian Reitter discovered that libu2f-host, a library implementing
the host-side of the U2F protocol, failed to properly check for a
buffer overflow. This would allow an attacker with a custom made
malicious USB device masquerading as a security key, and physical
access to a computer where PAM U2F or an application with libu2f-host
integrated, to potentially execute arbitrary code on that computer.
For the stable distribution (stretch), this problem has been fixed in
version 1.1.2-2+deb9u1.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4377-2 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 11, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : rssh
Debian Bug : 921655
The update for rssh issued as DSA 4377-1 introduced a regression that
blocked scp of multiple files from a server using rssh. Updated packages
are now available to correct this issue.
For the stable distribution (stretch), this problem has been fixed in
version 2.3.4-5+deb9u3.
registered Linux user number 324659 || The importance of Reading The *Fine* Manual! :D




For the things we have to learn before we can do them, we learn by doing them.




For the things we have to learn before we can do them, we learn by doing them.
#1533 OFFLINE
Posted 12 February 2019 - 08:27 PM
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4390-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 12, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : flatpak
CVE ID : not yet available
Debian Bug : 922059
It was discovered that Flatpak, an application deployment framework for
desktop apps, insufficiently restricted the execution of "apply_extra"
scripts which could potentially result in privilege escalation.
For the stable distribution (stretch), this problem has been fixed in
version 0.8.9-0+deb9u2.
Debian Security Advisory DSA-4390-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 12, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : flatpak
CVE ID : not yet available
Debian Bug : 922059
It was discovered that Flatpak, an application deployment framework for
desktop apps, insufficiently restricted the execution of "apply_extra"
scripts which could potentially result in privilege escalation.
For the stable distribution (stretch), this problem has been fixed in
version 0.8.9-0+deb9u2.
registered Linux user number 324659 || The importance of Reading The *Fine* Manual! :D




For the things we have to learn before we can do them, we learn by doing them.




For the things we have to learn before we can do them, we learn by doing them.
#1534 OFFLINE
Posted Yesterday, 07:12 PM
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4391-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 14, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : firefox-esr
CVE ID : CVE-2018-18356 CVE-2019-5785
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code.
For the stable distribution (stretch), these problems have been fixed in
version 60.5.1esr-1~deb9u1.
Debian Security Advisory DSA-4391-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 14, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : firefox-esr
CVE ID : CVE-2018-18356 CVE-2019-5785
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code.
For the stable distribution (stretch), these problems have been fixed in
version 60.5.1esr-1~deb9u1.
registered Linux user number 324659 || The importance of Reading The *Fine* Manual! :D




For the things we have to learn before we can do them, we learn by doing them.




For the things we have to learn before we can do them, we learn by doing them.
Also tagged with one or more of these keywords: debian, updates, sunrat, bruno, v.t. eric layton
The Highlands →
Bruno's All Things Linux →
Debian point release 9.7 for apt vulnerabilityStarted by sunrat , 23 Jan 2019 ![]() |
|
![]()
|
||
The Highlands →
Bruno's All Things Linux →
Neptune OS installationStarted by sunrat , 22 Jan 2019 ![]() |
|
![]()
|
||
The Highlands →
Bruno's All Things Linux →
MX-18 Continuum Now AvailableStarted by abarbarian , 22 Dec 2018 ![]() |
|
![]()
|
||
The Highlands →
Bruno's All Things Linux →
Debian Linux founder Ian Murdock dies at 42Started by abarbarian , 21 Dec 2018 ![]() |
|
![]()
|
||
The Highlands →
Bruno's All Things Linux →
Happy Birthday Debian!Started by sunrat , 16 Aug 2018 ![]() |
|
![]()
|
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users