Debian Security Advisory

    • Offizieller Beitrag

    Package: mbedtls

    CVE ID: CVE-2017-14032

    Debian Bug: 873557

    An authentication bypass vulnerability was discovered in mbed TLS, a

    lightweight crypto and SSL/TLS library, when the authentication mode is

    configured as 'optional'. A remote attacker can take advantage of this

    flaw to mount a man-in-the-middle attack and impersonate an intended

    peer via an X.509 certificate chain with many intermediates.

    For the stable distribution (stretch), this problem has been fixed in

    version 2.4.2-1+deb9u1.

    For the testing distribution (buster), this problem has been fixed

    in version 2.6.0-1.

    For the unstable distribution (sid), this problem has been fixed in

    version 2.6.0-1.

    We recommend that you upgrade your mbedtls packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: icedove

    CVE ID: CVE-2017-7753 CVE-2017-7779 CVE-2017-7784 CVE-2017-7785

    CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792

    CVE-2017-7800 CVE-2017-7801 CVE-2017-7802 CVE-2017-7803

    CVE-2017-7807 CVE-2017-7809

    Multiple security issues have been found in Thunderbird, which may lead

    to the execution of arbitrary code or denial of service.

    For the oldstable distribution (jessie), these problems have been fixed

    in version 52.3.0-4~deb8u2.

    For the stable distribution (stretch), these problems have been fixed in

    version 52.3.0-4~deb9u1.

    We recommend that you upgrade your icedove packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: xen

    CVE ID: CVE-2017-10912 CVE-2017-10913 CVE-2017-10914

    CVE-2017-10915 CVE-2017-10916 CVE-2017-10917

    CVE-2017-10918 CVE-2017-10919 CVE-2017-10920

    CVE-2017-10921 CVE-2017-10922 CVE-2017-12135

    CVE-2017-12136 CVE-2017-12137 CVE-2017-12855

    Multiple vulnerabilities have been discovered in the Xen hypervisor:

    CVE-2017-10912

    Jann Horn discovered that incorrectly handling of page transfers might

    result in privilege escalation.

    CVE-2017-10913 / CVE-2017-10914

    Jann Horn discovered that race conditions in grant handling might

    result in information leaks or privilege escalation.

    CVE-2017-10915

    Andrew Cooper discovered that incorrect reference counting with

    shadow paging might result in privilege escalation.

    CVE-2017-10916

    Andrew Cooper discovered an information leak in the handling

    of the the Memory Protection Extensions (MPX) and Protection

    Key (PKU) CPU features. This only affects Debian stretch.

    CVE-2017-10917

    Ankur Arora discovered a NULL pointer dereference in event

    polling, resulting in denial of service.

    CVE-2017-10918

    Julien Grall discovered that incorrect error handling in

    physical-to-machine memory mappings may result in privilege

    escalation, denial of service or an information leak.

    CVE-2017-10919

    Julien Grall discovered that that incorrect handling of

    virtual interrupt injection on ARM systems may result in

    denial of service.

    CVE-2017-10920 / CVE-2017-10921 / CVE-2017-10922

    Jan Beulich discovered multiple places where reference

    counting on grant table operations was incorrect, resulting

    in potential privilege escalation

    CVE-2017-12135

    Jan Beulich found multiple problems in the handling of

    transitive grants which could result in denial of service

    and potentially privilege escalation.

    CVE-2017-12136

    Ian Jackson discovered that race conditions in the allocator

    for grant mappings may result in denial of service or privilege

    escalation. This only affects Debian stretch.

    CVE-2017-12137

    Andrew Cooper discovered that incorrect validation of

    grants may result in privilege escalation.

    CVE-2017-12855

    Jan Beulich discovered that incorrect grant status handling, thus

    incorrectly informing the guest that the grant is no longer in use.

    XSA-235 (no CVE yet)

    Wei Liu discovered that incorrect locking of add-to-physmap

    operations on ARM may result in denial of service.

    For the oldstable distribution (jessie), these problems have been fixed

    in version 4.4.1-9+deb8u10.

    For the stable distribution (stretch), these problems have been fixed in

    version 4.8.1-1+deb9u3.

    We recommend that you upgrade your xen packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: emacs24

    CVE ID: not yet available

    Charles A. Roelli discovered that Emacs is vulnerable to arbitrary code

    execution when rendering text/enriched MIME data (e.g. when using

    Emacs-based mail clients).

    For the oldstable distribution (jessie), this problem has been fixed

    in version 24.4+1-5+deb8u1.

    For the stable distribution (stretch), this problem has been fixed in

    version 24.5+1-11+deb9u1.

    We recommend that you upgrade your emacs24 packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: tcpdump

    CVE ID: CVE-2017-11108 CVE-2017-11541 CVE-2017-11542 CVE-2017-11543

    CVE-2017-12893 CVE-2017-12894 CVE-2017-12895 CVE-2017-12896

    CVE-2017-12897 CVE-2017-12898 CVE-2017-12899 CVE-2017-12900

    CVE-2017-12901 CVE-2017-12902 CVE-2017-12985 CVE-2017-12986

    CVE-2017-12987 CVE-2017-12988 CVE-2017-12989 CVE-2017-12990

    CVE-2017-12991 CVE-2017-12992 CVE-2017-12993 CVE-2017-12994

    CVE-2017-12995 CVE-2017-12996 CVE-2017-12997 CVE-2017-12998

    CVE-2017-12999 CVE-2017-13000 CVE-2017-13001 CVE-2017-13002

    CVE-2017-13003 CVE-2017-13004 CVE-2017-13005 CVE-2017-13006

    CVE-2017-13007 CVE-2017-13008 CVE-2017-13009 CVE-2017-13010

    CVE-2017-13011 CVE-2017-13012 CVE-2017-13013 CVE-2017-13014

    CVE-2017-13015 CVE-2017-13016 CVE-2017-13017 CVE-2017-13018

    CVE-2017-13019 CVE-2017-13020 CVE-2017-13021 CVE-2017-13022

    CVE-2017-13023 CVE-2017-13024 CVE-2017-13025 CVE-2017-13026

    CVE-2017-13027 CVE-2017-13028 CVE-2017-13029 CVE-2017-13030

    CVE-2017-13031 CVE-2017-13032 CVE-2017-13033 CVE-2017-13034

    CVE-2017-13035 CVE-2017-13036 CVE-2017-13037 CVE-2017-13038

    CVE-2017-13039 CVE-2017-13040 CVE-2017-13041 CVE-2017-13042

    CVE-2017-13043 CVE-2017-13044 CVE-2017-13045 CVE-2017-13046

    CVE-2017-13047 CVE-2017-13048 CVE-2017-13049 CVE-2017-13050

    CVE-2017-13051 CVE-2017-13052 CVE-2017-13053 CVE-2017-13054

    CVE-2017-13055 CVE-2017-13687 CVE-2017-13688 CVE-2017-13689

    CVE-2017-13690 CVE-2017-13725

    Debian Bug: 867718 873804 873805 873806

    Several vulnerabilities have been discovered in tcpdump, a command-line

    network traffic analyzer. These vulnerabilities might result in denial

    of service or, potentially, execution of arbitrary code.

    For the oldstable distribution (jessie), these problems have been fixed

    in version 4.9.2-1~deb8u1.

    For the stable distribution (stretch), these problems have been fixed in

    version 4.9.2-1~deb9u1.

    For the testing distribution (buster), these problems have been fixed

    in version 4.9.2-1 or earlier versions.

    For the unstable distribution (sid), these problems have been fixed in

    version 4.9.2-1 or earlier versions.

    We recommend that you upgrade your tcpdump packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: bluez

    CVE ID: CVE-2017-1000250

    Debian Bug: 875633

    An information disclosure vulnerability was discovered in the Service

    Discovery Protocol (SDP) in bluetoothd, allowing a proximate attacker to

    obtain sensitive information from bluetoothd process memory, including

    Bluetooth encryption keys.

    For the oldstable distribution (jessie), this problem has been fixed

    in version 5.23-2+deb8u1.

    For the stable distribution (stretch), this problem has been fixed in

    version 5.43-2+deb9u1.

    We recommend that you upgrade your bluez packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: wordpress-shibboleth

    CVE ID: CVE-2017-14313

    Debian Bug: 874416

    A cross-site-scripting vulnerability has been discovered in the login

    form of the Shibboleth identity provider module for Wordpress.

    For the oldstable distribution (jessie), this problem has been fixed

    in version 1.4-2+deb8u1.

    For the stable distribution (stretch), this problem has been fixed in

    version 1.4-2+deb9u1.

    We recommend that you upgrade your wordpress-shibboleth packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: tomcat8

    CVE ID: CVE-2017-7674 CVE-2017-7675

    Debian Bug: 802312

    Two issues were discovered in the Tomcat servlet and JSP engine.

    CVE-2017-7674

    Rick Riemer discovered that the Cross-Origin Resource Sharing

    filter did not add a Vary header indicating possible different

    responses, which could lead to cache poisoning.

    CVE-2017-7675 (stretch only)

    Markus Dörschmidt found that the HTTP/2 implementation bypassed

    some security checks, thus allowing an attacker to conduct

    directory traversal attacks by using specially crafted URLs.

    For the oldstable distribution (jessie), these problems have been fixed

    in version 8.0.14-1+deb8u11.

    For the stable distribution (stretch), these problems have been fixed in

    version 8.5.14-1+deb9u2.

    We recommend that you upgrade your tomcat8 packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: emacs25

    CVE ID: CVE-2017-14482

    Charles A. Roelli discovered that Emacs is vulnerable to arbitrary code

    execution when rendering text/enriched MIME data (e.g. when using

    Emacs-based mail clients).

    For the stable distribution (stretch), this problem has been fixed in

    version 25.1+1-4+deb9u1.

    We recommend that you upgrade your emacs25 packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: freexl

    CVE ID : CVE-2017-2923 CVE-2017-2924

    Debian Bug: 875690 875691

    Marcin 'Icewall' Noga of Cisco Talos discovered two vulnerabilities in

    freexl, a library to read Microsoft Excel spreadsheets, which might

    result in denial of service or the execution of arbitrary code if a

    malformed Excel file is opened.

    For the oldstable distribution (jessie), these problems have been fixed

    in version 1.0.0g-1+deb8u4.

    For the stable distribution (stretch), these problems have been fixed in

    version 1.0.2-2+deb9u1.

    For the unstable distribution (sid), these problems have been fixed in

    version 1.0.4-1.

    We recommend that you upgrade your freexl packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: newsbeuter

    CVE ID: CVE-2017-14500

    Debian Bug: 876004

    It was discovered that podbeuter, the podcast fetcher in newsbeuter, a

    text-mode RSS feed reader, did not properly escape the name of the media

    enclosure (the podcast file), allowing a remote attacker to run an

    arbitrary shell command on the client machine. This is only exploitable

    if the file is also played in podbeuter.

    For the oldstable distribution (jessie), this problem has been fixed

    in version 2.8-2+deb8u2.

    For the stable distribution (stretch), this problem has been fixed in

    version 2.9-5+deb9u2.

    For the unstable distribution (sid), this problem has been fixed in

    version 2.9-7.

    We recommend that you upgrade your newsbeuter packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: gdk-pixbuf

    CVE ID: CVE-2017-2862

    Debian Bug: 874552

    Marcin Noga discovered a buffer overflow in the JPEG loader of the GDK

    Pixbuf library, which may result in the execution of arbitrary code if

    a malformed file is opened.

    For the oldstable distribution (jessie), this problem has been fixed

    in version 2.31.1-2+deb8u6.

    For the stable distribution (stretch), this problem has been fixed in

    version 2.36.5-2+deb9u1.

    We recommend that you upgrade your gdk-pixbuf packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: pyjwt

    CVE ID: CVE-2017-11424

    It was discovered that PyJWT, a Python implementation of JSON Web Token

    performed insufficient validation of some public key types, which could

    allow a remote attacker to craft JWTs from scratch.

    For the oldstable distribution (jessie), this problem has been fixed

    in version 0.2.1-1+deb8u2.

    For the stable distribution (stretch), this problem has been fixed in

    version 1.4.2-1+deb9u1.

    We recommend that you upgrade your pyjwt packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: apache2

    CVE ID: CVE-2017-9798

    Debian Bug: 876109

    Hanno Boeck discovered that incorrect parsing of Limit directives of

    .htaccess files by the Apache HTTP Server could result in memory

    disclosure.

    For the oldstable distribution (jessie), this problem has been fixed

    in version 2.4.10-10+deb8u11.

    For the stable distribution (stretch), this problem has been fixed in

    version 2.4.25-3+deb9u3.

    We recommend that you upgrade your apache2 packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: linux

    CVE ID: CVE-2017-7518 CVE-2017-7558 CVE-2017-10661 CVE-2017-11600

    CVE-2017-12134 CVE-2017-12146 CVE-2017-12153 CVE-2017-12154

    CVE-2017-14106 CVE-2017-14140 CVE-2017-14156 CVE-2017-14340

    CVE-2017-14489 CVE-2017-14497 CVE-2017-1000111 CVE-2017-1000112

    CVE-2017-1000251 CVE-2017-1000252 CVE-2017-1000370 CVE-2017-1000371

    CVE-2017-1000380

    Debian Bug: 866511 875881

    Several vulnerabilities have been discovered in the Linux kernel that

    may lead to privilege escalation, denial of service or information

    leaks.

    CVE-2017-7518

    Andy Lutomirski discovered that KVM is prone to an incorrect debug

    exception (#DB) error occurring while emulating a syscall

    instruction. A process inside a guest can take advantage of this

    flaw for privilege escalation inside a guest.

    CVE-2017-7558 (stretch only)

    Stefano Brivio of Red Hat discovered that the SCTP subsystem is

    prone to a data leak vulnerability due to an out-of-bounds read

    flaw, allowing to leak up to 100 uninitialized bytes to userspace.

    CVE-2017-10661 (jessie only)

    Dmitry Vyukov of Google reported that the timerfd facility does

    not properly handle certain concurrent operations on a single file

    descriptor.This allows a local attacker to cause a denial of

    service or potentially execute arbitrary code.

    CVE-2017-11600

    Bo Zhang reported that the xfrm subsystem does not properly

    validate one of the parameters to a netlink message. Local users

    with the CAP_NET_ADMIN capability can use this to cause a denial

    of service or potentially to execute arbitrary code.

    CVE-2017-12134 / #866511 / XSA-229

    Jan H. Schoenherr of Amazon discovered that when Linux is running

    in a Xen PV domain on an x86 system, it may incorrectly merge

    block I/O requests.A buggy or malicious guest may trigger this

    bug in dom0 or a PV driver domain, causing a denial of service or

    potentially execution of arbitrary code.

    This issue can be mitigated by disabling merges on the underlying

    back-end block devices, e.g.:

    echo 2 > /sys/block/nvme0n1/queue/nomerges

    CVE-2017-12146 (stretch only)

    Adrian Salido of Google reported a race condition in access to the

    "driver_override" attribute for platform devices in sysfs. If

    unprivileged users are permitted to access this attribute, this

    might allow them to gain privileges.

    CVE-2017-12153

    bo Zhang reported that the cfg80211 (wifi) subsystem does not

    properly validate the parameters to a netlink message. Local users

    with the CAP_NET_ADMIN capability (in any user namespace with a

    wifi device) can use this to cause a denial of service.

    CVE-2017-12154

    Jim Mattson of Google reported that the KVM implementation for

    Intel x86 processors did not correctly handle certain nested

    hypervisor configurations. A malicious guest (or nested guest in a

    suitable L1 hypervisor) could use this for denial of service.

    CVE-2017-14106

    Andrey Konovalov discovered that a user-triggerable division by

    zero in the tcp_disconnect() function could result in local denial

    of service.

    CVE-2017-14140

    Otto Ebeling reported that the move_pages() system call performed

    insufficient validation of the UIDs of the calling and target

    processes, resulting in a partial ASLR bypass. This made it easier

    for local users to exploit vulnerabilities in programs installed

    with the set-UID permission bit set.

    CVE-2017-14156

    "sohu0106" reported an information leak in the atyfb video driver.

    A local user with access to a framebuffer device handled by this

    driver could use this to obtain sensitive information.

    CVE-2017-14340

    Richard Wareing discovered that the XFS implementation allows the

    creation of files with the "realtime" flag on a filesystem with no

    realtime device, which can result in a crash (oops). A local user

    with access to an XFS filesystem that does not have a realtime

    device can use this for denial of service.

    CVE-2017-14489

    ChunYu Wang of Red Hat discovered that the iSCSI subsystem does not

    properly validate the length of a netlink message, leading to

    memory corruption. A local user with permission to manage iSCSI

    devices can use this for denial of service or possibly to execute

    arbitrary code.

    CVE-2017-14497 (stretch only)

    Benjamin Poirier of SUSE reported that vnet headers are not

    properly handled within the tpacket_rcv() function in the raw

    packet (af_packet) feature. A local user with the CAP_NET_RAW

    capability can take advantage of this flaw to cause a denial of

    service (buffer overflow, and disk and memory corruption) or have

    other impact.

    CVE-2017-1000111

    Andrey Konovalov of Google reported a race condition in the raw

    packet (af_packet) feature. Local users with the CAP_NET_RAW

    capability can use this for denial of service or possibly to

    execute arbitrary code.

    CVE-2017-1000112

    Andrey Konovalov of Google reported a race condition flaw in the

    UDP Fragmentation Offload (UFO) code. A local user can use this

    flaw for denial of service or possibly to execute arbitrary code.

    CVE-2017-1000251 / #875881

    Armis Labs discovered that the Bluetooth subsystem does not

    properly validate L2CAP configuration responses, leading to a

    stack buffer overflow. This is one of several vulnerabilities

    dubbed "Blueborne". A nearby attacker can use this to cause a

    denial of service or possibly to execute arbitrary code on a

    system with Bluetooth enabled.

    CVE-2017-1000252 (stretch only)

    Jan H. Schoenherr of Amazon reported that the KVM implementation

    for Intel x86 processors did not correctly validate interrupt

    injection requests. A local user with permission to use KVM could

    use this for denial of service.

    CVE-2017-1000370

    The Qualys Research Labs reported that a large argument or

    environment list can result in ASLR bypass for 32-bit PIE binaries.

    CVE-2017-1000371

    The Qualys Research Labs reported that a large argument

    orenvironment list can result in a stack/heap clash for 32-bit

    PIE binaries.

    CVE-2017-1000380

    Alexander Potapenko of Google reported a race condition in the ALSA

    (sound) timer driver, leading to an information leak. A local user

    with permission to access sound devices could use this to obtain

    sensitive information.

    Debian disables unprivileged user namespaces by default, but if they

    are enabled (via the kernel.unprivileged_userns_clone sysctl) then

    CVE-2017-11600, CVE-2017-14497 and CVE-2017-1000111 can be exploited

    by any local user.

    For the oldstable distribution (jessie), these problems have been fixed

    in version 3.16.43-2+deb8u5.

    For the stable distribution (stretch), these problems have been fixed in

    version 4.9.30-2+deb9u5.

    We recommend that you upgrade your linux packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: perl

    CVE ID: CVE-2017-12837 CVE-2017-12883

    Debian Bug: 875596 875597

    Multiple vulnerabilities were discovered in the implementation of the

    Perl programming language. The Common Vulnerabilities and Exposures

    project identifies the following problems:

    CVE-2017-12837

    Jakub Wilk reported a heap buffer overflow flaw in the regular

    expression compiler, allowing a remote attacker to cause a denial of

    service via a specially crafted regular expression with the

    case-insensitive modifier.

    CVE-2017-12883

    Jakub Wilk reported a buffer over-read flaw in the regular

    expression parser, allowing a remote attacker to cause a denial of

    service or information leak.

    For the oldstable distribution (jessie), these problems have been fixed

    in version 5.20.2-3+deb8u9.

    For the stable distribution (stretch), these problems have been fixed in

    version 5.24.1-3+deb9u2.

    For the testing distribution (buster), these problems have been fixed

    in version 5.26.0-8.

    For the unstable distribution (sid), these problems have been fixed in

    version 5.26.0-8.

    We recommend that you upgrade your perl packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: samba

    CVE ID: CVE-2017-12150 CVE-2017-12151 CVE-2017-12163

    Multiple security issues have been discoverd in Samba, a SMB/CIFS file,

    print, and login server for Unix:

    CVE-2017-12150

    Stefan Metzmacher discovered multiple code paths where SMB signing

    was not enforced.

    CVE-2017-12151

    Stefan Metzmacher discovered that tools using libsmbclient did not

    enforce encryption when following DFS redirects, which could allow a

    man-in-the-middle attacker to read or modify connections which were

    meant to be encrypted.

    CVE-2017-12163

    Yihan Lian and Zhibin Hu discovered that insufficient range checks

    in the processing of SMB1 write requests could result in disclosure

    of server memory.

    For the oldstable distribution (jessie), these problems have been fixed

    in version 2:4.2.14+dfsg-0+deb8u8.

    For the stable distribution (stretch), these problems have been fixed in

    version 2:4.5.8+dfsg-2+deb9u2.

    We recommend that you upgrade your samba packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: git

    Debian Bug: 876854

    joernchen discovered that the git-cvsserver subcommand of Git, a

    distributed version control system, suffers from a shell command

    injection vulnerability due to unsafe use of the Perl backtick

    operator.The git-cvsserver subcommand is reachable from the

    git-shell subcommand even if CVS support has not been configured

    (however, the git-cvs package needs to be installed).

    In addition to fixing the actual bug, this update removes the

    cvsserver subcommand from git-shell by default.Refer to the updated

    documentation for instructions how to reenable in case this CVS

    functionality is still needed.

    For the oldstable distribution (jessie), this problem has been fixed

    in version 1:2.1.4-2.1+deb8u5.

    For the stable distribution (stretch), this problem has been fixed in

    version 1:2.11.0-3+deb9u2.

    For the unstable distribution (sid), this problem has been fixed in

    version 1:2.14.2-1.

    We recommend that you upgrade your git packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: chromium-browser

    CVE ID: CVE-2017-5111 CVE-2017-5112 CVE-2017-5113 CVE-2017-5114

    CVE-2017-5115 CVE-2017-5116 CVE-2017-5117 CVE-2017-5118

    CVE-2017-5119 CVE-2017-5120 CVE-2017-5121 CVE-2017-5122

    Several vulnerabilities have been discovered in the chromium web browser.

    CVE-2017-5111

    Luat Nguyen discovered a use-after-free issue in the pdfium library.

    CVE-2017-5112

    Tobias Klein discovered a buffer overflow issue in the webgl

    library.

    CVE-2017-5113

    A buffer overflow issue was discovered in the skia library.

    CVE-2017-5114

    Ke Liu discovered a memory issue in the pdfium library.

    CVE-2017-5115

    Marco Giovannini discovered a type confusion issue in the v8

    javascript library.

    CVE-2017-5116

    Guang Gong discovered a type confusion issue in the v8 javascript

    library.

    CVE-2017-5117

    Tobias Klein discovered an uninitialized value in the skia library.

    CVE-2017-5118

    WenXu Wu discovered a way to bypass the Content Security Policy.

    CVE-2017-5119

    Another uninitialized value was discovered in the skia library.

    CVE-2017-5120

    Xiaoyin Liu discovered a way downgrade HTTPS connections during

    redirection.

    CVE-2017-5121

    Jordan Rabet discovered an out-of-bounds memory access in the v8

    javascript library.

    CVE-2017-5122

    Choongwoo Han discovered an out-of-bounds memory access in the v8

    javascript library.

    For the stable distribution (stretch), these problems have been fixed in

    version 61.0.3163.100-1~deb9u1.

    For the testing distribution (buster), these problems will be fixed soon.

    For the unstable distribution (sid), these problems have been fixed in

    version 61.0.3163.100-1.

    We recommend that you upgrade your chromium-browser packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/

    • Offizieller Beitrag

    Package: ghostscript

    CVE ID: CVE-2017-9611 CVE-2017-9612 CVE-2017-9726 CVE-2017-9727

    CVE-2017-9739 CVE-2017-9835 CVE-2017-11714

    Debian Bug: 869907 869910 869913 869915 869916 869917 869977

    Several vulnerabilities were discovered in Ghostscript, the GPL

    PostScript/PDF interpreter, which may result in denial of service if a

    specially crafted Postscript file is processed.

    For the oldstable distribution (jessie), these problems have been fixed

    in version 9.06~dfsg-2+deb8u6.

    For the stable distribution (stretch), these problems have been fixed in

    version 9.20~dfsg-3.2+deb9u1.

    We recommend that you upgrade your ghostscript packages.

    Further information about Debian Security Advisories, how to apply

    these updates to your system and frequently asked questions can be

    found at: https://www.debian.org/security/