[SECURITY] [DSA 4003-1] libvirt security update

2017-10-20 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4003-1   secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 19, 2017  https://www.debian.org/security/faq
- -

Package: libvirt
CVE ID : CVE-2017-1000256
Debian Bug : 878799

Daniel P. Berrange reported that Libvirt, a virtualisation abstraction
library, does not properly handle the default_tls_x509_verify (and
related) parameters in qemu.conf when setting up TLS clients and servers
in QEMU, resulting in TLS clients for character devices and disk devices
having verification turned off and ignoring any errors while validating
the server certificate.

More informations in https://security.libvirt.org/2017/0002.html .

For the stable distribution (stretch), this problem has been fixed in
version 3.0.0-4+deb9u1.

For the unstable distribution (sid), this problem has been fixed in
version 3.8.0-3.

We recommend that you upgrade your libvirt packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
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=A8fk
-END PGP SIGNATURE-



[SECURITY] [DSA 4002-1] mysql-5.5 security update

2017-10-20 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4002-1   secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 19, 2017  https://www.debian.org/security/faq
- -

Package: mysql-5.5
CVE ID : CVE-2017-10268 CVE-2017-10378 CVE-2017-10379 CVE-2017-10384
Debian Bug : 878402

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.58, which includes additional changes, such as performance
improvements, bug fixes, new features, and possibly incompatible
changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
Patch Update advisory for further details:

 https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-58.html
 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

For the oldstable distribution (jessie), these problems have been fixed
in version 5.5.58-0+deb8u1.

We recommend that you upgrade your mysql-5.5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
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=4QVw
-END PGP SIGNATURE-