Debian Security Advisory

  • Package : php7.0

    CVE ID : CVE-2018-7584 CVE-2018-10545 CVE-2018-10546

    CVE-2018-10547 CVE-2018-10548 CVE-2018-10549


    Several vulnerabilities were found in PHP, a widely-used open source

    general purpose scripting language:


    CVE-2018-7584


    Buffer underread in parsing HTTP responses


    CVE-2018-10545


    Dumpable FPM child processes allowed the bypass of opcache access

    controls


    CVE-2018-10546


    Denial of service via infinite loop in convert.iconv stream filter


    CVE-2018-10547


    The fix for CVE-2018-5712 (shipped in DSA 4080) was incomplete


    CVE-2018-10548


    Denial of service via malformed LDAP server responses


    CVE-2018-10549


    Out-of-bounds read when parsing malformed JPEG files


    For the stable distribution (stretch), these problems have been fixed in

    version 7.0.30-0+deb9u1.


    We recommend that you upgrade your php7.0 packages.


    For the detailed security status of php7.0 please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/php7.0


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : libsoup2.4

    CVE ID : CVE-2018-12910


    It was discovered that the Soup HTTP library performed insuffient

    validation of cookie requests which could result in an out-of-bounds

    memory read.


    For the stable distribution (stretch), this problem has been fixed in

    version 2.56.0-2+deb9u2.


    We recommend that you upgrade your libsoup2.4 packages.


    For the detailed security status of libsoup2.4 please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/libsoup2.4


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : ruby-sprockets

    CVE ID : CVE-2018-3760

    Debian Bug : 901913


    Orange Tsai discovered a path traversal flaw in ruby-sprockets, a

    Rack-based asset packaging system. A remote attacker can take advantage

    of this flaw to read arbitrary files outside an application's root

    directory via specially crafted requests, when the Sprockets server is

    used in production.


    For the stable distribution (stretch), this problem has been fixed in

    version 3.7.0-1+deb9u1.


    We recommend that you upgrade your ruby-sprockets packages.


    For the detailed security status of ruby-sprockets please refer to its

    security tracker page at:

    https://security-tracker.debian.org/tracker/ruby-sprockets


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : cups

    CVE ID : CVE-2017-15400 CVE-2018-4180 CVE-2018-4181 CVE-2018-4182

    CVE-2018-4183 CVE-2018-6553


    Several vulnerabilities were discovered in CUPS, the Common UNIX Printing

    System. These issues have been identified with the following CVE ids:


    CVE-2017-15400


    Rory McNamara discovered that an attacker is able to execute arbitrary

    commands (with the privilege of the CUPS daemon) by setting a

    malicious IPP server with a crafted PPD file.


    CVE-2018-4180


    Dan Bastone of Gotham Digital Science discovered that a local

    attacker with access to cupsctl could escalate privileges by setting

    an environment variable.


    CVE-2018-4181


    Eric Rafaloff and John Dunlap of Gotham Digital Science discovered

    that a local attacker can perform limited reads of arbitrary files

    as root by manipulating cupsd.conf.


    CVE-2018-4182


    Dan Bastone of Gotham Digital Science discovered that an attacker

    with sandboxed root access can execute backends without a sandbox

    profile by provoking an error in CUPS' profile creation.


    CVE-2018-4183


    Dan Bastone and Eric Rafaloff of Gotham Digital Science discovered

    that an attacker with sandboxed root access can execute arbitrary

    commands as unsandboxed root by modifying /etc/cups/cups-files.conf


    CVE-2018-6553


    Dan Bastone of Gotham Digital Science discovered that an attacker

    can bypass the AppArmor cupsd sandbox by invoking the dnssd backend

    using an alternate name that has been hard linked to dnssd.



    For the stable distribution (stretch), these problems have been fixed in

    version 2.2.1-8+deb9u2.


    We recommend that you upgrade your cups packages.


    For the detailed security status of cups please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/cups


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : thunderbird

    CVE ID : CVE-2017-17689 CVE-2018-5188 CVE-2018-12359 CVE-2018-12360

    CVE-2018-12362 CVE-2018-12363 CVE-2018-12364 CVE-2018-12365

    CVE-2018-12366 CVE-2018-12372 CVE-2018-12373 CVE-2018-12374


    Multiple security issues have been found in Thunderbird, which may lead

    to the execution of arbitrary code, denial of service or attacks on

    encrypted emails.


    For the stable distribution (stretch), these problems have been fixed in

    version 1:52.9.1-1~deb9u1.


    We recommend that you upgrade your thunderbird packages.


    For the detailed security status of thunderbird please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/thunderbird


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : imagemagick

    CVE ID : CVE-2018-5248 CVE-2018-11251 CVE-2018-12599 CVE-2018-12600


    This update fixes several vulnerabilities in Imagemagick, a graphical

    software suite. Various memory handling problems or incomplete input

    sanitising could result in denial of service or the execution of

    arbitrary code.


    For the stable distribution (stretch), these problems have been fixed in

    version 8:6.9.7.4+dfsg-11+deb9u5.


    We recommend that you upgrade your imagemagick packages.


    For the detailed security status of imagemagick please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/imagemagick


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : mailman

    CVE ID : CVE-2018-0618


    Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. discovered

    that mailman, a web-based mailing list manager, is prone to a cross-site

    scripting flaw allowing a malicious listowner to inject scripts into the

    listinfo page, due to not validated input in the host_name field.


    For the stable distribution (stretch), this problem has been fixed in

    version 1:2.1.23-1+deb9u3.


    We recommend that you upgrade your mailman packages.


    For the detailed security status of mailman please refer to its security

    tracker page at:

    https://security-tracker.debian.org/tracker/mailman


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : ruby-rack-protection

    CVE ID : CVE-2018-1000119


    A timing attack was discovered in the function for CSRF token validation

    of the "Ruby rack protection" framework.


    For the stable distribution (stretch), this problem has been fixed in

    version 1.5.3-2+deb9u1.


    We recommend that you upgrade your ruby-rack-protection packages.


    For the detailed security status of ruby-rack-protection please refer to

    its security tracker page at:

    https://security-tracker.debia…cker/ruby-rack-protection


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : blender

    CVE ID : CVE-2017-2899 CVE-2017-2900 CVE-2017-2901 CVE-2017-2902

    CVE-2017-2903 CVE-2017-2904 CVE-2017-2905 CVE-2017-2906

    CVE-2017-2907 CVE-2017-2908 CVE-2017-2918 CVE-2017-12081

    CVE-2017-12082 CVE-2017-12086 CVE-2017-12099 CVE-2017-12100

    CVE-2017-12101 CVE-2017-12102 CVE-2017-12103 CVE-2017-12104

    CVE-2017-12105


    Multiple vulnerabilities have been discovered in various parsers of

    Blender, a 3D modeller/ renderer. Malformed .blend model files and

    malformed multimedia files (AVI, BMP, HDR, CIN, IRIS, PNG, TIFF) may

    result in the execution of arbitrary code.


    For the stable distribution (stretch), these problems have been fixed in

    version 2.79.b+dfsg0-1~deb9u1.


    We recommend that you upgrade your blender packages.


    For the detailed security status of blender please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/blender


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : ffmpeg

    CVE ID : CVE-2018-6392 CVE-2018-6621 CVE-2018-7557 CVE-2018-10001

    CVE-2018-12458 CVE-2018-13300 CVE-2018-13302


    Several vulnerabilities have been discovered in the FFmpeg multimedia

    framework, which could result in denial of service or potentially the

    execution of arbitrary code if malformed files/streams are processed.


    For the stable distribution (stretch), these problems have been fixed in

    version 7:3.2.11-1~deb9u1.


    We recommend that you upgrade your ffmpeg packages.


    For the detailed security status of ffmpeg please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/ffmpeg


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : wordpress

    CVE ID : CVE-2018-12895

    Debian Bug : 902876


    A vulnerability was discovered in Wordpress, a web blogging tool. It

    allowed remote attackers with specific roles to execute arbitrary

    code.


    For the stable distribution (stretch), this problem has been fixed in

    version 4.7.5+dfsg-2+deb9u4.


    We recommend that you upgrade your wordpress packages.


    For the detailed security status of wordpress please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/wordpress


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : vlc

    CVE ID : CVE-2018-11529


    A use-after-free was discovered in the MP4 demuxer of the VLC media

    player, which could result in the execution of arbitrary code if a

    malformed media file is played.


    For the stable distribution (stretch), this problem has been fixed in

    version 3.0.3-1-0+deb9u1.


    We recommend that you upgrade your vlc packages.


    For the detailed security status of vlc please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/vlc


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

  • Package : znc

    CVE ID : CVE-2018-14055 CVE-2018-14056


    Jeriko One discovered two vulnerabilities in the ZNC IRC bouncer which

    could result in privilege escalation or denial of service.


    For the stable distribution (stretch), these problems have been fixed in

    version 1.6.5-1+deb9u1.


    We recommend that you upgrade your znc packages.


    For the detailed security status of znc please refer to

    its security tracker page at:

    https://security-tracker.debian.org/tracker/znc


    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/