[SECURITY] [DSA 4538-1] wpa security update

2019-09-29 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4538-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
September 29, 2019https://www.debian.org/security/faq
- -

Package: wpa
CVE ID : CVE-2019-13377 CVE-2019-16275
Debian Bug : 934180 940080

Two vulnerabilities were found in the WPA protocol implementation found in
wpa_supplication (station) and hostapd (access point).

CVE-2019-13377

A timing-based side-channel attack against WPA3's Dragonfly handshake when
using Brainpool curves could be used by an attacker to retrieve the
password.

CVE-2019-16275

Insufficient source address validation for some received Management frames
in hostapd could lead to a denial of service for stations associated to an
access point. An attacker in radio range of the access point could inject a
specially constructed unauthenticated IEEE 802.11 frame to the access point
to cause associated stations to be disconnected and require a reconnection
to the network.

For the oldstable distribution (stretch), these problems have been fixed
in version $stretch_VERSION.

For the stable distribution (buster), these problems have been fixed in
version 2:2.7+git20190128+0c1e29f-6+deb10u1.

We recommend that you upgrade your wpa packages.

For the detailed security status of wpa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpa

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAl2QuGQACgkQ3rYcyPpX
RFtKAAf9Fv7lhUQD2TC7HjEavULALsOuku5mFLQTUygj1IwsTjWkhC4cGFNgrOho
xWqxSE1YP4LdtSLAo9btfSXPYPHhdlNthxHSu4HSkSasoXgFgrF0xQSxhRHABdMZ
MVH3+xpMKrwMk1UEIxtcYXpesN8N9+3wVv7I1tk3L+yL25EBxHHijt1SXpeBF6dw
ps7q5HaAxpwC9S2PtILvwsEs0ocHupbMTsJtkr0bsvOvg+gx40yQDZLQxZyR+xQZ
HZmMbH87ElCG9JuXlCSGdmdLIEH08i7Yy9JKTpPHg20jAo/KsOIygRF2B0rTmn9O
JdR8hkAiqGQ2lZiAcSJZio7ojLD5MQ==
=Agz+
-END PGP SIGNATURE-



[SECURITY] [DSA 4450-1] wpa security update

2019-05-27 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4450-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
May 24, 2019  https://www.debian.org/security/faq
- -

Package: wpa
CVE ID : CVE-2019-11555
Debian Bug : 927463

A vulnerability was found in the WPA protocol implementation found in
wpa_supplication (station) and hostapd (access point).

The EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP
peer) doesn't properly validate fragmentation reassembly state when receiving
an unexpected fragment. This could lead to a process crash due to a NULL
pointer derefrence.

An attacker in radio range of a station or access point with EAP-pwd support
could cause a crash of the relevant process (wpa_supplicant or hostapd),
ensuring a denial of service.

For the stable distribution (stretch), this problem has been fixed in
version 2:2.4-1+deb9u4.

We recommend that you upgrade your wpa packages.

For the detailed security status of wpa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpa

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlzn/TEACgkQ3rYcyPpX
RFspSAf/YMVZvCbELRqK4sZ42zqtP5UCpTx2usFHGakULukrdYOv4Jh9uHjME/VX
WAzY9sNIBGIlTpCW/P3qnIbwQaZLcVlZ9fF4JrepuArBC+Cr8Q3sYmUVoiPUTvTv
Sm9nj0M3A9yDukRSw8gPWPSjk8z1r4J2LMnCwyxNxug3Iqphr7CMdhTvOzowaEk6
hP18tVx4MHhemzag5zKCo7pLCuVxWyJYL9ndEpFuSl1si7EDUIeWkX9gWeLouIAN
zfExE2zUwfgdAzPdH3k4JvYABn7azTp1NgMSlzTTtT9r4yUkg80ilHi5mpeV0oLj
5G4VKNeNRoBOPjNOmOIa1tq6C2rS7g==
=hAb9
-END PGP SIGNATURE-



[SECURITY] [DSA 4430-1] wpa security update

2019-04-11 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4430-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
April 10, 2019https://www.debian.org/security/faq
- -

Package: wpa
CVE ID : CVE-2019-9495 CVE-2019-9497 CVE-2019-9498 CVE-2019-9499
Debian Bug : 926801

Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found
multiple vulnerabilities in the WPA implementation found in wpa_supplication
(station) and hostapd (access point). These vulnerability are also collectively
known as "Dragonblood".

CVE-2019-9495

Cache-based side-channel attack against the EAP-pwd implementation: an
attacker able to run unprivileged code on the target machine (including for
example javascript code in a browser on a smartphone) during the handshake
could deduce enough information to discover the password in a dictionary
attack.

CVE-2019-9497

Reflection attack against EAP-pwd server implementation: a lack of
validation of received scalar and elements value in the EAP-pwd-Commit
messages could result in attacks that would be able to complete EAP-pwd
authentication exchange without the attacker having to know the password.
This does not result in the attacker being able to derive the session key,
complete the following key exchange and access the network.

CVE-2019-9498

EAP-pwd server missing commit validation for scalar/element: hostapd
doesn't validate values received in the EAP-pwd-Commit message, so an
attacker could use a specially crafted commit message to manipulate the
exchange in order for hostapd to derive a session key from a limited set of
possible values. This could result in an attacker being able to complete
authentication and gain access to the network.

CVE-2019-9499

EAP-pwd peer missing commit validation for scalar/element: wpa_supplicant
doesn't validate values received in the EAP-pwd-Commit message, so an
attacker could use a specially crafted commit message to manipulate the
exchange in order for wpa_supplicant to derive a session key from a limited
set of possible values. This could result in an attacker being able to
complete authentication and operate as a rogue AP.

Note that the Dragonblood moniker also applies to CVE-2019-9494 and
CVE-2014-9496 which are vulnerabilities in the SAE protocol in WPA3. SAE is not
enabled in Debian stretch builds of wpa, which is thus not vulnerable by 
default.

Due to the complexity of the backporting process, the fix for these
vulnerabilities are partial. Users are advised to use strong passwords to
prevent dictionary attacks or use a 2.7-based version from stretch-backports
(version above 2:2.7+git20190128+0c1e29f-4).

For the stable distribution (stretch), these problems have been fixed in
version 2:2.4-1+deb9u3.

We recommend that you upgrade your wpa packages.

For the detailed security status of wpa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpa

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlyu2lQACgkQ3rYcyPpX
RFtamggAlq8telLPhKzD1+Ns+Pci+Y+WkOAmUpn4XQ0TOmG18sDU1iS2xNHF+buA
lXVKLp7zgE4VFJsclHAJXtp8anyo7YU99NzUcSF6vboRm3msifL4eE3S7IS9fAaH
0WWCHwlHMf9IGHqBn9mkwiYySwlId8ps3lvoVV2EOB4wJqa4Y6d4YrqPyFzWop56
jKTlTcJqvQBUFo/y9In/sx8QgONhNwnNAKcrBfiVwn8QHuMRA4c4UJz+NN38ctyt
djA/zqT/uXwWhr8Mfl7J+rfdsC5TFPl45qr/gbmB7GRlU2la0dGJv/l0afbINrrG
NoAgpOeMrwijIdDJ9vG6O3YVV6bIkg==
=OkO5
-END PGP SIGNATURE-



[SECURITY] [DSA 4387-2] openssh security update

2019-03-03 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4387-2   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
March 02, 2019https://www.debian.org/security/faq
- -

Package: openssh
CVE ID : CVE-2019-6111
Debian Bug : 923486

It was found that a security update (DSA-4387-1) of OpenSSH, an implementation
of the SSH protocol suite, was incomplete. This update did not completely fix
CVE-2019-6111, an arbitrary file overwrite vulnerability in the scp client
implementing the SCP protocol.

For the stable distribution (stretch), this problem has been fixed in
version 1:7.4p1-10+deb9u6.

We recommend that you upgrade your openssh packages.

For the detailed security status of openssh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssh

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlx6gTYACgkQ3rYcyPpX
RFvzzggAhGG3BeLCP8rhn4LRHh7yHURoWFGJEy0AKKNE0s158TXnsIaEcAysHTnE
V4U7dDYailQym2Q9E6Unehi83hxLdoIX9z4D8yhauIxSNGGgXq9mEC0SOQ/3rKbY
SMNPd9gNwy5hTQq7OhSCmF0hD2+HHjCLtI++0YuzeDO2/8I6aNfq/VSeH7a5hcnO
4ELbxuFWSvglZX93ygcQ126wpm9nGRzxNhGHVeBPXKzWVoq5jqC/lImv97zMale3
7t1fu+FQegNFvHNSPy2c8O0hJrEsOauaa/nvshtozwaNLaXIIU0bJBwGmusnDaaH
EhYvPok/CcxM1D9JivaJ63Jev0UKYw==
=kbp6
-END PGP SIGNATURE-



[SECURITY] [DSA 4387-1] openssh security update

2019-02-10 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4387-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
February 09, 2019 https://www.debian.org/security/faq
- -

Package: openssh
CVE ID : CVE-2018-20685 CVE-2019-6109 CVE-2019-6111
Debian Bug : 793412 919101

Harry Sintonen from F-Secure Corporation discovered multiple vulnerabilities in
OpenSSH, an implementation of the SSH protocol suite. All the vulnerabilities
are in found in the scp client implementing the SCP protocol.

CVE-2018-20685

Due to improper directory name validation, the scp client allows servers to
modify permissions of the target directory by using empty or dot directory
name.

CVE-2019-6109

Due to missing character encoding in the progress display, the object name
can be used to manipulate the client output, for example to employ ANSI
codes to hide additional files being transferred.

CVE-2019-6111

Due to scp client insufficient input validation in path names sent by
server, a malicious server can do arbitrary file overwrites in target
directory. If the recursive (-r) option is provided, the server can also
manipulate subdirectories as well.
.
The check added in this version can lead to regression if the client and
the server have differences in wildcard expansion rules. If the server is
trusted for that purpose, the check can be disabled with a new -T option to
the scp client.

For the stable distribution (stretch), these problems have been fixed in
version 1:7.4p1-10+deb9u5.

We recommend that you upgrade your openssh packages.

For the detailed security status of openssh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssh

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlxe0w0ACgkQ3rYcyPpX
RFs85AgA0GrSHO4Qf5FVsE3oXa+nMkZ4U6pbOA9dHotX54DEyNuIJrOsOv01cFxQ
t2Z6uDkZptmHZT4uSWg2xIgMvpkGo9906ziZfHc0LTuHl8j++7cCDIDGZBm/iZaX
ueQfl85gHDpte41JvUtpSBAwk1Bic7ltLUPDIGEiq6nQboxHIzsU7ULVb1l0wNxF
sEFDPWGBS01HTa+QWgQaG/wbEhMRDcVz1Ck7dqpT2soQRohDWxU01j14q1EKe9O9
GHiWECvFSHBkkI/v8lNfSWnOWYa/+Aknri0CpjPc/bqh2Yx9rgp/Q5+FJ/FxJjmC
bHFd+tbxB1LxEO96zKguYpPIzw7Kcw==
=5Fd8
-END PGP SIGNATURE-



[SECURITY] [DSA 4373-1] coturn security update

2019-01-28 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4373-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
January 28, 2019  https://www.debian.org/security/faq
- -

Package: coturn
CVE ID : CVE-2018-4056 CVE-2018-4058 CVE-2018-4059

Multiple vulnerabilities were discovered in coTURN, a TURN and STUN server for
VoIP.

CVE-2018-4056

An SQL injection vulnerability was discovered in the coTURN administrator
web portal. As the administration web interface is shared with the
production, it is unfortunately not possible to easily filter outside
access and this security update completely disable the web interface. Users
should use the local, command line interface instead.

CVE-2018-4058

Default configuration enables unsafe loopback forwarding. A remote attacker
with access to the TURN interface can use this vulnerability to gain access
to services that should be local only.

CVE-2018-4059

Default configuration uses an empty password for the local command line
administration interface. An attacker with access to the local console
(either a local attacker or a remote attacker taking advantage of
CVE-2018-4058) could escalade privileges to administrator of the coTURN
server.

For the stable distribution (stretch), these problems have been fixed in
version 4.5.0.5-1+deb9u1.

We recommend that you upgrade your coturn packages.

For the detailed security status of coturn please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/coturn

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlxOsDoACgkQ3rYcyPpX
RFtMMggAwiUy/jxys1Zk6WRtk34AYckq0KxS/v0UK46X1mjIXJ3E1/HhwG0cz3tF
/kVY7328a/rRO5frjWnCt2aHzieYWRA1HuxMBgialHvm45J0HTVxT6eGvzOAQNay
evp3ibDXPQuBieYITkUwYevU/Piqf8FQ3ntmY0z8CK0gDFwICA5Z6LZ+/2mX/QNq
0lrOLWE6sk6hxdSRMTsShM9Ec4QOblVqDD6g4+G3RBSozy9BzpaoPrsKut/ipg4m
8tkrxLB0N1OrOim1cbuV7QK1P+yHxpWY0btYTInHZrNPuELoCjbdOXu4AC6zxuWK
5HEkYgq/fzboD9Q3fyiokZq7jOBxmA==
=JvPB
-END PGP SIGNATURE-



[SECURITY] [DSA 4371-1] apt security update

2019-01-22 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4371-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
January 22, 2019  https://www.debian.org/security/faq
- -

Package: apt
CVE ID : CVE-2019-3462

Max Justicz discovered a vulnerability in APT, the high level package manager.
The code handling HTTP redirects in the HTTP transport method doesn't properly
sanitize fields transmitted over the wire. This vulnerability could be used by
an attacker located as a man-in-the-middle between APT and a mirror to inject
malicous content in the HTTP connection. This content could then be recognized
as a valid package by APT and used later for code execution with root
privileges on the target machine.

Since the vulnerability is present in the package manager itself, it is
recommended to disable redirects in order to prevent exploitation during this
upgrade only, using:

 apt -o Acquire::http::AllowRedirect=false update
 apt -o Acquire::http::AllowRedirect=false upgrade

This is known to break some proxies when used against security.debian.org. If
that happens, people can switch their security APT source to use:

 deb http://cdn-fastly.deb.debian.org/debian-security stable/updates main

For the stable distribution (stretch), this problem has been fixed in
version 1.4.9.

We recommend that you upgrade your apt packages.

Specific upgrade instructions:

If upgrading using APT without redirect is not possible in your situation, you
can manually download the files (using wget/curl) for your architecture using
the URL provided below, verifying that the hashes match. Then you can install
them using dpkg -i.

Source archives:

http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9.dsc
Size/SHA256 checksum:   2549
986d98b00caac809341f65acb3d14321d645ce8e87e411c26c66bf149a10dfea
http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9.tar.xz
Size/SHA256 checksum:   2079572 
d4d65e7c84da86f3e6dcc933bba46a08db429c9d933b667c864f5c0e880bac0d

Architecture independent files:

http://security.debian.org/pool/updates/main/a/apt/apt-doc_1.4.9_all.deb
Size/SHA256 checksum:   365094  
8880640591f64ab7b798f0421d18cba618512ca61ed7c44f6140423551d5
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-doc_1.4.9_all.deb
Size/SHA256 checksum:   1004234 
42f4c5945c4c471c3985db1cec7adcac516cc21a497a438f3ea0a2bfa7ffe036

amd64 architecture:

http://security.debian.org/pool/updates/main/a/apt/apt-dbgsym_1.4.9_amd64.deb
Size/SHA256 checksum:   4450936 
1da507155c7b1ad140739c62fdacceaf5b5ee3765b1a00c3a3527d9d82a8d533
http://security.debian.org/pool/updates/main/a/apt/apt-transport-https-dbgsym_1.4.9_amd64.deb
Size/SHA256 checksum:   292612  
59f3e1c91664fe3b47048794560ebe9c41f1eeccbdd95f7715282f8cbe449060
http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_1.4.9_amd64.deb
Size/SHA256 checksum:   170820  
c8c4366d1912ff8223615891397a78b44f313b0a2f15a970a82abe48460490cb
http://security.debian.org/pool/updates/main/a/apt/apt-utils-dbgsym_1.4.9_amd64.deb
Size/SHA256 checksum:   1289344 
e3e157c291b05b2899a545331c7597ab36ca04e02cd9010562b9985b76af60db
http://security.debian.org/pool/updates/main/a/apt/apt-utils_1.4.9_amd64.deb
Size/SHA256 checksum:   409958  
fb227d1c4615197a6263e7312851ac3601d946221cfd85f20427a15ab9658d15
http://security.debian.org/pool/updates/main/a/apt/apt_1.4.9_amd64.deb
Size/SHA256 checksum:   1231594 
dddf4ff686845b82c6c778a70f1f607d0bb9f8aa43f2fb7983db4ff1a55f5fae
http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0-dbgsym_1.4.9_amd64.deb
Size/SHA256 checksum:   221646  
0e66db1f74827f06c55ac36cc961e932cd0a9a6efab91b7d1159658bab5f533e
http://security.debian.org/pool/updates/main/a/apt/libapt-inst2.0_1.4.9_amd64.deb
Size/SHA256 checksum:   192382  
a099c57d20b3e55d224433b7a1ee972f6fdb79911322882d6e6f6a383862a57d
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_1.4.9_amd64.deb
Size/SHA256 checksum:   235220  
cfb0a03ecd22aba066d97e75d4d00d791c7a3aceb2e5ec4fbee7176389717404
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0-dbgsym_1.4.9_amd64.deb
Size/SHA256 checksum:   6076102 
cdb03ddd57934e773a579a89f32f11567710a39d6ac289e73efb20e8825874d1
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg5.0_1.4.9_amd64.deb
Size/SHA256 checksum:   916448  
03281e3d1382826d5989c12c77a9b27f5f752b0f6aa28b524a2df193f7296e0b

arm64 architecture:

http://security.debian.org/pool/updates/main/a/apt/apt-dbgsym_1.4.9_arm64.deb
Size/SHA256 checksum:   4420208 
c20e28d760cf99005ef16851f3f0c25b576ceaf6e6658a233066800a98c00025
http://security.debian.org/pool

[SECURITY] [DSA 4309-1] strongswan security update

2018-10-02 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4309-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
October 01, 2018  https://www.debian.org/security/faq
- -

Package: strongswan
CVE ID : CVE-2018-17540

Google's OSS-Fuzz revealed an exploitable bug in the gmp plugin caused by the
patch that fixes CVE-2018-16151 and CVE-2018-16151 (DSA-4305-1).

An attacker could trigger it using crafted certificates with RSA keys with
very small moduli. Verifying signatures with such keys would cause an integer
underflow and subsequent heap buffer overflow resulting in a crash of the
daemon. While arbitrary code execution is not completely ruled out because of
the heap buffer overflow, due to the form of the data written to the buffer
it seems difficult to actually exploit it in such a way.

For the stable distribution (stretch), this problem has been fixed in
version 5.5.1-4+deb9u4.

We recommend that you upgrade your strongswan packages.

For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/strongswan

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAluzH80ACgkQ3rYcyPpX
RFvI5wf8DILbxELj4t7YjgZyT0pKzqSm2fDVO/Xjl6hj0Fnf6XidEvNx764NFoCo
x6MBILJohIAbzZo/3sT41vAuKKMfiasuUY0KSz4hHgRlwLqiNBOOTuKrR1PhrtmS
BKJg9PRfi0a+dwb2J0+UkKcaZQYMItqEBCjsZkF46lBFSx+dgs6spbSy3MmiY0ve
szxg/JyRLS6WLE87R8AUrBskPwcYu3jhjg53E02VnpKB+UXXb6NWC9D2zlpWRilx
9RQPofwjWNYoM7pM1QITPuUeFR5ia+7X7BA9SL7McMV6BWGimVCDEMZshTpqRTME
dOx9vpXrO5JZwMFk2hkxhFoA6ewo2g==
=L68k
-END PGP SIGNATURE-



[SECURITY] [DSA 4305-1] strongswan security update

2018-09-24 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4305-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
September 24, 2018https://www.debian.org/security/faq
- -

Package: strongswan
CVE ID : CVE-2018-16151 CVE-2018-16152

Sze Yiu Chau and his team from Purdue University and The University of Iowa
found several issues in the gmp plugin for strongSwan, an IKE/IPsec suite.

Problems in the parsing and verification of RSA signatures could lead to a
Bleichenbacher-style low-exponent signature forgery in certificates and during
IKE authentication.

While the gmp plugin doesn't allow arbitrary data after the ASN.1 structure
(the original Bleichenbacher attack), the ASN.1 parser is not strict enough and
allows data in specific fields inside the ASN.1 structure.

Only installations using the gmp plugin are affected (on Debian OpenSSL plugin
has priority over GMP one for RSA operations), and only when using keys and
certificates (including ones from CAs) using keys with an exponent e = 3, which
is usually rare in practice.

CVE-2018-16151

The OID parser in the ASN.1 code in gmp allows any number of random bytes
after a valid OID.

CVE-2018-16152

The algorithmIdentifier parser in the ASN.1 code in gmp doesn't enforce a
NULL value for the optional parameter which is not used with any PKCS#1
algorithm.

For the stable distribution (stretch), these problems have been fixed in
version 5.5.1-4+deb9u3.

We recommend that you upgrade your strongswan packages.

For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/strongswan

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAluo4U0ACgkQ3rYcyPpX
RFv1HQf9Fn8JyDrflvxIsTb0vkgyTPMn6d1QKsO58I00HNh+AWL3RvK1k7uFCHgr
C+pZDxbE5LdEypZ8hHdhxRH1hrnWlYCZjLrm8RojuPo7E6N9w9AnXdztSpqHR3G/
PFm/u4FC+l/Qh9imKZoUjGGItDOT5WGvKNeS+cZNIVmz1uoOwdJuEaDSBlv4pSeh
tDi3GtXdLjPzLk/sw0o732zpyPd9RCQqABryamK6dco4EI9BmFHwwhaepXV0pH7W
JEk7Cqow1XYUnPAZg1CqHE/vYdWu2SCEBetvAyhchTp+ZmG1icHy6zQA48pOQ7VP
8ezE8lP9+j/2ZGmORCsyyua5FYaLbA==
=4jkg
-END PGP SIGNATURE-



[SECURITY] [DSA 4299-1] texlive-bin security update

2018-09-24 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4299-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
September 21, 2018https://www.debian.org/security/faq
- -

Package: texlive-bin
CVE: not yet available

Nick Roessler from the University of Pennsylvania has found a buffer overflow
in texlive-bin, the executables for TexLive, the popular distribution of TeX
document production system.

This buffer overflow can be used for arbitrary code execution by crafting a
special type1 font (.pfb) and provide it to users running pdf(la)tex, dvips or
luatex in a way that the font is loaded.

For the stable distribution (stretch), this problem has been fixed in
version 2016.20160513.41080.dfsg-2+deb9u1.

We recommend that you upgrade your texlive-bin packages.

For the detailed security status of texlive-bin please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/texlive-bin

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAluk64kACgkQ3rYcyPpX
RFtpsAf+MmGxNM/qTfNTuIKqdIN6CIZ5MVao9QT8rR/O3gMJFlohigKMLNNBcAgF
6mHjZ/MicWmDttkSM8Vf664UFayqHlvtCqD5syVm0ddBpJ6qvmx0rId3Ni0m3Y4N
z5JfbcNqhFVu91H9+hs+CMa2r5U9LgRxmOA1K+SfX7rKm4oUZ2BJXNLh4kvt4zEm
u0bzGl00mFhbB7N0EDJqvx3bxtsU269cwwpR6nMFjwBPOtgo1spKhaMIIKoRDeJX
ppIHrZhsiYG+OVKKVFrBkgIcABltVXH+7bmR/+OA0gJ7ebX8VE62LBXEsgoglhbv
idDtwMdhynNUy4NAtdJFHQVPzLphUg==
=vc7q
-END PGP SIGNATURE-



[SECURITY] [DSA 4291-1] mgetty security update

2018-09-11 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4291-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
September 11, 2018https://www.debian.org/security/faq
- -

Package: mgetty
CVE ID : CVE-2018-16741

Two input sanitization failures have been found in the faxrunq and faxq
binaries in mgetty, a smart modem getty replacement. An attacker could leverage
them  to insert commands via shell metacharacters in jobs id and have them
executed with the privilege of the faxrunq/faxq user.

For the stable distribution (stretch), this problem has been fixed in
version 1.1.36-3+deb9u1.

We recommend that you upgrade your mgetty packages.

For the detailed security status of mgetty please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mgetty

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAluYHA0ACgkQ3rYcyPpX
RFsyTQf/Q45bXa/UwHC3bEaDlSEdEqkK2IlT0LUFnbd6wNllIf+Ja9pEsJRYK1u2
fUiBr1qalQUSC77Ayzb6cAIH8aAzSumkwdoeBzIAJhSjMTHIyaO6q27QSd/VBXmO
Ul5zZbzS03BIGQdj5uyG7/OWjXerfqzdXM5peFfOeofkRCVxMrCgWtXiVz/NtA9p
9+dMVuZmCl/DN76Fl658RU3Dnp2Bzv7Via3pARAzbX+NORkolvSYmaRRlwOihzmL
7I2yU6y6vOmPK0uzas12HXDccajt06gMH/6pMdcNLtDmZN1cPLzvUzvkKoMbS/FR
+vB8dEZEQJE6MHLigBNaeS+Pwk6fxw==
=ZMxH
-END PGP SIGNATURE-



[SECURITY] [DSA 4229-1] strongswan security update

2018-06-17 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4229-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
June 14, 2018 https://www.debian.org/security/faq
- -

Package: strongswan
CVE ID : CVE-2018-5388 CVE-2018-10811

Two vulnerabilities were discovered in strongSwan, an IKE/IPsec suite.

CVE-2018-5388

The stroke plugin did not verify the message length when reading from its
control socket. This vulnerability could lead to denial of service. On
Debian write access to the socket requires root permission on default
configuration.

CVE-2018-10811

A missing variable initialization in IKEv2 key derivation could lead to a
denial of service (crash of the charon IKE daemon) if the openssl plugin is
used in FIPS mode and the negotiated PRF is HMAC-MD5.

For the oldstable distribution (jessie), these problems have been fixed
in version 5.2.1-6+deb8u6.

For the stable distribution (stretch), these problems have been fixed in
version 5.5.1-4+deb9u2.

We recommend that you upgrade your strongswan packages.

For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/strongswan

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlsk0n4ACgkQ3rYcyPpX
RFsjxQf/fduO/tPZxJEza4JBLLCzPCTgMGAZwOjUWhHAQ/qYQuooMmo4OZIT5Tf1
mMsSDJ0H9AmDTyP4mvmb40St0T4ZpZK+OmPfHUoZMlS2mCN/032qXVYbTA1C/z0N
YdAHp75dDNVHh5Z8LQfJknYOZVIw74GUjsPZg9u+VYNIlnGKbyeC3EMgJry8frZe
gxXCf8pKW2aDOVxrzRVitgbIMCFT0kCQYLb2qf/SvUp/IxAyjeDy6hnfVfvWFkxW
5tNRSTrW1Xcl0Eeh30LfN2FgZAYmfT+8BCgjszSVz3xh5dYaqFv+LMTMZu2n2D3n
/HvX/mDRrmN+UsRrpZfJyx8snvFaKQ==
=sH3t
-END PGP SIGNATURE-



[SECURITY] [DSA 4169-1] pcs security update

2018-04-11 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4169-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
April 11, 2018https://www.debian.org/security/faq
- -

Package: pcs
CVE ID : CVE-2018-1086
Debian Bug : 895313

Cédric Buissart from Red Hat discovered an information disclosure bug in pcs, a
pacemaker command line interface and GUI. The REST interface normally doesn't
allow passing --debug parameter to prevent information leak, but the check
wasn't sufficient.

For the stable distribution (stretch), this problem has been fixed in
version 0.9.155+dfsg-2+deb9u1.

We recommend that you upgrade your pcs packages.

For the detailed security status of pcs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pcs

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlrNxsYACgkQ3rYcyPpX
RFsDlggAy2SHmo+lw4mEkodTH6bISba9cSLBBkalg4bhPmWLHnDw9PFIrUKV6HzB
RoNzoMrsJsi4NDutw0aV9YjyuLYd/OmX8rMP/4zaI/bA4wMkz2EBQ6TkTGIlbYl7
ljTZWSBflfAqU18zIf1gH7jkDN+M3EkWfyJJVCj3KRRwMOCJtgL0GLAJLDB3jn41
Np56spr5F2i+iscpPYVDpJLrPp7A0d+HaVTMLhdlpTK09iUiLiH42MdvYgfdU3z3
LV77zWBR4VgUkqbYcfx2GHupstwC5toYDg771Ukaj69T2N/45wOthlUcSY4dQZlH
8g9WbQwWVJBR4P01nKeUuN/FWgpHtA==
=oRuL
-END PGP SIGNATURE-



[SECURITY] [DSA 4120-1] linux security update

2018-02-22 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4120-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
February 22, 2018 https://www.debian.org/security/faq
- -

Package: linux
CVE ID : CVE-2017-5715 CVE-2017-5754 CVE-2017-13166 CVE-2018-5750

Several vulnerabilities have been discovered in the Linux kernel that may
lead to a privilege escalation, denial of service or information leaks.

CVE-2017-5715

Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes running on
the system.

This specific attack has been named Spectre variant 2 (branch target
injection) and is mitigated in the Linux kernel for the Intel x86-64
architecture by using the 'retpoline' compiler feature which allows
indirect branches to be isolated from speculative execution.

CVE-2017-5754

Multiple researchers have discovered a vulnerability in Intel
processors, enabling an attacker controlling an unprivileged process to
read memory from arbitrary addresses, including from the kernel and all
other processes running on the system.

This specific attack has been named Meltdown and is addressed in the
Linux kernel on the powerpc/ppc64el architectures by flushing the L1
data cache on exit from kernel mode to user mode (or from hypervisor to
kernel).

This works on Power7, Power8 and Power9 processors.

CVE-2017-13166

A bug in the 32-bit compatibility layer of the v4l2 IOCTL handling code
has been found. Memory protections ensuring user-provided buffers always
point to userland memory were disabled, allowing . This bug could be
exploited by an attacker to overwrite kernel memory from an unprivileged
userland process, leading to privilege escalation.

CVE-2018-5750

An information leak has been found in the Linux kernel. The
acpi_smbus_hc_add() prints a kernel address in the kernel log at every
boot, which could be used by an attacker on the system to defeat kernel
ASLR.

Additionnaly to those vulnerability, some mitigations for CVE-2017-5753 are
included in this release.

CVE-2017-5753

Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes running on
the system.

This specific attack has been named Spectre variant 1 (bounds-check
bypass) and is mitigated in the Linux kernel architecture by identifying
vulnerable code sections (array bounds checking followed by array
access) and replacing the array access with the speculation-safe
array_index_nospec() function.

More use sites will be added over time.

For the stable distribution (stretch), these problems have been fixed in
version 4.9.82-1+deb9u2.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlqO5kYACgkQ3rYcyPpX
RFtjkgf9HK7sq/xNOFjZsc3iaVNdzDhDEth8ql/Q9WsbDP9JmlrwmlTsD/QAgXgx
m9zIIJzyI9Dry60bVvYZHFrtYhQXX5zp9DYa89oinHv+1UxzaYHTHsNoh326k86n
QUcDLYe2+JJgi/2KjLqfFfa5zgMqUNj3C6iBDezs0tCfE/QZAmAX7aA7A3mTJYLB
3v2tSoEeW0fb9M5Ic2QHJD1TW6NU+j6zaUeJRyhj7lthmyOcNxwTIrt2CswDnLUI
tCMtzdce6OWAW5xXQxHwzzf5+vRvmm/f+wM2V3WTcA1Q0tfA5cZGFe2SMOhyGKtf
KG1ziLYIY0OdCtdxj0K/wEzpe6cikg==
=B81o
-END PGP SIGNATURE-



[SECURITY] [DSA 4078-1] linux security update

2018-01-04 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4078-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
January 04, 2018  https://www.debian.org/security/faq
- -

Package: linux
CVE ID : CVE-2017-5754

Multiple researchers have discovered a vulnerability in Intel processors,
enabling an attacker controlling an unprivileged process to read memory from
arbitrary addresses, including from the kernel and all other processes running
on the system.

This specific attack has been named Meltdown and is addressed in the Linux
kernel for the Intel x86-64 architecture by a patch set named Kernel Page Table
Isolation, enforcing a near complete separation of the kernel and userspace
address maps and preventing the attack. This solution might have a performance
impact, and can be disabled at boot time by passing `pti=off' to the kernel
command line.

We also identified a regression for ancient userspaces using the vsyscall
interface, for example chroot and containers using (e)glibc 2.13 and older,
including those based on Debian 7 or RHEL/CentOS 6. This regression will be
fixed in a later update.

The other vulnerabilities (named Spectre) published at the same time are not
addressed in this update and will be fixed in a later update.

For the oldstable distribution (jessie), this problem will be fixed in a
separate update.

For the stable distribution (stretch), this problem has been fixed in
version 4.9.65-3+deb9u2.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlpOqZMACgkQ3rYcyPpX
RFuTTQf/btBqg9/I3XlnJFyGAmd4eQolTcU5cfDJqNhD4TZoyMocghvw1kYtu7z9
bYVhwCRukJym8O8AXJOxvlcsP7g0ANXqVDHpzCN8byKYgzigVP9brfOu/zDa4uYY
EYf8V3pc2QzNo5OV4G+sK5ZklkDnNIde+OxUfU0Otl9fUG2rS5JTFvaRgvGazlbb
cN5wltoHD6DBeSRnfadwYPHQR5U+KAJNImh34Y6T73i7n5dGTnNhs6E7n0wlJL9O
SQLwoqQeiDpcE7C4TZ1pb4AbFCZXaic+1ONbWy8D7erKNA7kV1U2LQDmPDw9kmua
Lc5heEX026Xfdy83v6NAPwR+NU8stg==
=GGyG
-END PGP SIGNATURE-



[SECURITY] [DSA 4051-1] curl security update

2017-11-30 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4051-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
November 29, 2017 https://www.debian.org/security/faq
- -

Package: curl
CVE ID : CVE-2017-8816 CVE-2017-8817

Two vulnerabilities were discovered in cURL, an URL transfer library.

CVE-2017-8816

Alex Nichols discovered a buffer overrun flaw in the NTLM authentication
code which can be triggered on 32bit systems where an integer overflow
might occur when calculating the size of a memory allocation.

CVE-2017-8817

Fuzzing by the OSS-Fuzz project led to the discovery of a read out of
bounds flaw in the FTP wildcard function in libcurl. A malicious server
could redirect a libcurl-based client to an URL using a wildcard pattern,
triggering the out-of-bound read.

For the oldstable distribution (jessie), these problems have been fixed
in version 7.38.0-4+deb8u8.

For the stable distribution (stretch), these problems have been fixed in
version 7.52.1-5+deb9u3.

We recommend that you upgrade your curl packages.

For the detailed security status of curl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/curl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAloekh0ACgkQ3rYcyPpX
RFvPYQf+Mm7HZwKKv7g7s6UV0vmD6/EfKJwGeLgBgs2QKdUjqJOXjtKYRBjHNSFt
ye555SeTlD7wLWYXgJmPSAJxacKVTBo9wMW1gM/KOUELmPCrAQTBcvYiupg01oak
L5M69d/Z+w2uzBoH55Jl/jQ9mDgrzsCUuuyRKBmBHlFRZt9VCd5uCbK1+I7bl2HG
uhFJIn7FSq7q+E1HJ8JTzfnOuuzbJjBYsO/DaJCfdYI9Uh0GVcmxwuVwA3ommLif
pycyVvF7MidbtwV9vzcd20jx40nje8rl6Pkfxw6yI3W567Qv+cJCwTuGrgZLQXJQ
uPsZWlarqHnLb3Wd2h7HuIWC8u/SUA==
=DvR1
-END PGP SIGNATURE-



[SECURITY] [DSA 4044-1] swauth security update

2017-11-21 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4044-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
November 21, 2017 https://www.debian.org/security/faq
- -

Package: swauth
CVE ID : CVE-2017-16613
Debian Bug : 882314

A vulnerability has been discovered in swauth, an authentication system for
Swift, a distributed virtual object store used in Openstack.

The authentication token for an user is saved in clear text to the log file,
which could enable an attacker with access to the logs to bypass the
authentication provided by swauth.

For the stable distribution (stretch), this problem has been fixed in
version 1.2.0-2+deb9u1.

We recommend that you upgrade your swauth packages.

For the detailed security status of swauth please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/swauth

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAloUSQoACgkQ3rYcyPpX
RFutNAf/aMZwvT4w6JFji9JIMFrmhyFVqcoRy7F4lTkW3X+87RDUgDUEJafzYg88
FGoVX78jVAFIM9f0tRAtlJjHBpclX8nGxsG8OYYf5Gruaz5bpR9HD6ZOf0YIAFnq
k7afT4WAx1qg41KH5IVNDMGvYF434Emf9AnYga7VlI+PURMrqczHeuNsLBzgP/RF
TeLVgN4AF7Vx4lygT1cL8ypWjeow0mkSstDzafjfB0pKF+ZTivfxmf6Xf1000WHn
gbGHveZvTCUfeSIZBd2zL+S7j/GtkyN6q09tO2MwqTQxtFy/oXm2AaaVRLVSJzlC
imWRg0pOOJc5rt02ofjveM+EFc1lGg==
=Td0m
-END PGP SIGNATURE-



[SECURITY] [DSA 3999-1] wpa security update

2017-10-16 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3999-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
October 16, 2017  https://www.debian.org/security/faq
- -

Package: wpa
CVE ID : CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 
 CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 
 CVE-2017-13088

Mathy Vanhoef of the imec-DistriNet research group of KU Leuven discovered
multiple vulnerabilities in the WPA protocol, used for authentication in
wireless networks. Those vulnerabilities applies to both the access point
(implemented in hostapd) and the station (implemented in wpa_supplicant).

An attacker exploiting the vulnerabilities could force the vulnerable system to
reuse cryptographic session keys, enabling a range of cryptographic attacks
against the ciphers used in WPA1 and WPA2. 

More information can be found in the researchers's paper, Key Reinstallation
Attacks: Forcing Nonce Reuse in WPA2.

CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake
CVE-2017-13078: reinstallation of the group key in the Four-way handshake
CVE-2017-13079: reinstallation of the integrity group key in the Four-way
handshake
CVE-2017-13080: reinstallation of the group key in the Group Key handshake
CVE-2017-13081: reinstallation of the integrity group key in the Group Key
handshake
CVE-2017-13082: accepting a retransmitted Fast BSS Transition Reassociation
Request and reinstalling the pairwise key while processing it
CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey
(TPK) key in the TDLS handshake
CVE-2017-13087: reinstallation of the group key (GTK) when processing a
Wireless Network Management (WNM) Sleep Mode Response frame
CVE-2017-13088: reinstallation of the integrity group key (IGTK) when
processing a Wireless Network Management (WNM) Sleep Mode
Response frame

For the oldstable distribution (jessie), these problems have been fixed
in version 2.3-1+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 2:2.4-1+deb9u1.

For the testing distribution (buster), these problems have been fixed
in version 2:2.4-1.1.

For the unstable distribution (sid), these problems have been fixed in
version 2:2.4-1.1.

We recommend that you upgrade your wpa packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlnkeBwACgkQ3rYcyPpX
RFtQLAgAv5ntBMhlw9vrNGPxIrnFZiqI6rOCeiu9fw1ijrGKDmuIdewuIO8IY+KA
lYbxd5f+4X6nV2kwG6NwLzxV/Tl16hs8vRC9OGWEPPn9eW8XJE8jNU/m4Ca9cBGF
JaNT2ntdCHrSlORaMf2wv8AaV799Dh3ZRiO0+IyAtQQucfEndwmUHEGO+igTElJ3
aBrfRRs+SFjYsSSw+JOM7jwk9XPX/0Isg05JNMYYUbo5vjidjiCLkSIYQp7ssMlj
8ObfHdQzxGiyDHCeA0SJv34X4LYEOs2PT7krRCaFms+6A3o8AJx9Tw6K8iO24cYs
ttgxTMQRvkOyYBaV4h2rI7IOW2ViAA==
=/khK
-END PGP SIGNATURE-



[SECURITY] [DSA 3994-1] nautilus security update

2017-10-09 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3994-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
October 07, 2017  https://www.debian.org/security/faq
- -

Package: nautilus
CVE ID : CVE-2017-14604
Debian Bug : 860268

Christian Boxdörfer discovered a vulnerability in the handling of
FreeDesktop.org .desktop files in Nautilus, a file manager for the GNOME
desktop environment. An attacker can craft a .desktop file intended to run
malicious commands but displayed as a innocuous document file in Nautilus. An
user would then trust it and open the file, and Nautilus would in turn execute
the malicious content. Nautilus protection of only trusting .desktop files with
executable permission can be bypassed by shipping the .desktop file inside a
tarball.

For the oldstable distribution (jessie), this problem has not been fixed yet.

For the stable distribution (stretch), this problem has been fixed in
version 3.22.3-1+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 3.26.0-1.

For the unstable distribution (sid), this problem has been fixed in
version 3.26.0-1.

We recommend that you upgrade your nautilus packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlnZ2WoACgkQ3rYcyPpX
RFuGGQgAhAXOUOKT1Tv++ii3vJ79UoCDoxZT1E/JJKDBwae45hjG2bzAU6QqY93x
cOUTah0iS8h8PYbkilQMzkjuDDxaItu7hsQV0AukyrOx0y2h0QycEctVnfxtGwY1
Cje5ItKVYmzFdygGM9F0WIMnNodSDnaBlSHUOG8NwF9Kl6Ym0sThTh7Gls4Sz1+L
NKyEC1IrUwFzlAogvfU1++2+pZhAv4gtCQ6gcuAHVDHN6AcNUbVzXBVIdDl5F3Av
eqp7lTO3B+kOYiwj+WCCt+dFsEiuDYUVE2HJ9NkL+e/mSpCv40RxzJbBp5YTseXg
NpZRCYwDru2FDr2v3N0SszC2SjvkPQ==
=1Ew3
-END PGP SIGNATURE-



[SECURITY] [DSA 3962-1] strongswan security update

2017-09-04 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3962-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
September 03, 2017https://www.debian.org/security/faq
- -

Package: strongswan
CVE ID : CVE-2017-11185
Debian Bug : 872155

A denial of service vulnerability was identified in strongSwan, an IKE/IPsec
suite, using Google's OSS-Fuzz fuzzing project.

The gmp plugin in strongSwan had insufficient input validation when verifying
RSA signatures. This coding error could lead to a null pointer dereference,
leading to process crash.

For the oldstable distribution (jessie), this problem has been fixed
in version 5.2.1-6+deb8u5.

For the stable distribution (stretch), this problem has been fixed in
version 5.5.1-4+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 5.6.0-1.

For the unstable distribution (sid), this problem has been fixed in
version 5.6.0-1.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEl0WwInMjgf6efq/1bdtT8qZ1wKUFAlmr/jQACgkQbdtT8qZ1
wKVE7Qf8Coj8LA6YWjPOyOxCrevipzaH9Az/BXLHF6lNkN+oyfaGjcSpSwha5Uw0
ItGWc4aIlQjiICZp8LMPEcQSajZwgJN6EvumQb/sxR88laQLUP28sEr+ADziE0Bl
qsitCUf8J0YVhZ+xOEu+HF15MI/oDsbYNlMhyw1ZBimcMqsAMpDC7nvsIzf5l2Xp
qiF+VVs+TxVQto4GHlQGm9V5DCDXA2QujnzGsOcdutgeHG0p6Eb9mnXN5TF0UqfO
WTILsRFesEy3RZsUvzboqjtD/gn0NVJlxI6k/eFjrxSaLYVXDvgOWLlX+yK6hiOu
+x/JYiOkOsKfRfRHi5ZnBI2WXMN5OA==
=rYat
-END PGP SIGNATURE-



[SECURITY] [DSA 3904-1] bind9 security update

2017-07-10 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3904-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
July 08, 2017 https://www.debian.org/security/faq
- -

Package: bind9
CVE ID : CVE-2017-3142 CVE-2017-3143
Debian Bug : 866564

Clément Berthaux from Synaktiv discovered two vulnerabilities in BIND, a DNS
server implementation. They allow an attacker to bypass TSIG authentication by
sending crafted DNS packets to a server.

CVE-2017-3142

An attacker who is able to send and receive messages to an authoritative
DNS server and who has knowledge of a valid TSIG key name may be able to
circumvent TSIG authentication of AXFR requests via a carefully constructed
request packet. A server that relies solely on TSIG keys for protection
with no other ACL protection could be manipulated into:
- providing an AXFR of a zone to an unauthorized recipient
- accepting bogus NOTIFY packets

CVE-2017-3143

An attacker who is able to send and receive messages to an authoritative
DNS server and who has knowledge of a valid TSIG key name for the zone and
service being targeted may be able to manipulate BIND into accepting an
unauthorized dynamic update. 

For the oldstable distribution (jessie), these problems have been fixed
in version 1:9.9.5.dfsg-9+deb8u12.

For the stable distribution (stretch), these problems have been fixed in
version 1:9.10.3.dfsg.P4-12.4.

We recommend that you upgrade your bind9 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEl0WwInMjgf6efq/1bdtT8qZ1wKUFAllg1V0ACgkQbdtT8qZ1
wKXMiQgAkvKV919VTYzDG2Sa9qMF8zbHhbjwF2VwBl9M+IK/lPoQK407465ZWEmd
N3xaaKkbtNEZELrz5tkFy3ZRJq2lWIwxF38hegp2+nCll0K+giTRckW/oh0l592h
pkchKlGBcpwNrDGEAYQRjUzY6J3MwMZkn4EaoC2S2kmF30HSJcx9W93Q5GdnOf7m
MA301faXKc5zicbiu05iPtqqP/i6+EmlHIYSW+Hu0nYEYPIvVQcrdsjnpZLaqxGS
58Ge5/hy0qqvIV+fyqlyQBPwyT3DvtAQVChKtFojvZ/JRIvx+hwKj3CKa3uihU9A
w2agXaZd3BobRVdUmjndYcrHrZTDBA==
=20aK
-END PGP SIGNATURE-



[SECURITY] [DSA 3866-1] strongswan security update

2017-05-30 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3866-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
May 30, 2017  https://www.debian.org/security/faq
- -

Package: strongswan
CVE ID : CVE-2017-9022 CVE-2017-9023

Two denial of service vulnerabilities were identified in strongSwan, an
IKE/IPsec suite, using Google's OSS-Fuzz fuzzing project.

CVE-2017-9022

RSA public keys passed to the gmp plugin aren't validated sufficiently
before attempting signature verification, so that invalid input might
lead to a floating point exception and crash of the process.
A certificate with an appropriately prepared public key sent by a peer
could be used for a denial-of-service attack.

CVE-2017-9023

ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
parsing X.509 certificates with extensions that use such types. This could
lead to infinite looping of the thread parsing a specifically crafted
certificate.

A fix for a build failure was additionally included in the 5.2.1-6+deb8u4
revision of the strongSwan package.

For the stable distribution (jessie), these problems have been fixed in
version 5.2.1-6+deb8u3.

For the upcoming stable distribution (stretch), these problems have been
fixed in version 5.5.1-4

For the unstable distribution (sid), these problems have been fixed in
version 5.5.1-4.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEl0WwInMjgf6efq/1bdtT8qZ1wKUFAlktX04ACgkQbdtT8qZ1
wKWTFQf+MMdSFvrdeXksFRmtKWWtTaQew4NwDU0EOK8yYAKqpiCGICnP7+6cCAQf
UqpD8ZD67gdqLA4E+sAhM3HDuuC+kIx3r+7Qk65zim8RpdRBViZIGCAi46gWoIAU
4w7M+VKWbMZGLzNlde6OApEorQYCBQSpRIi8wTBs9PN/n2UaDlESrc+plGBI/mn2
/ShzEDc6MJxhAuFv+Pvq4OGrHpd2s0FrSn83jkkFm9MIGxEOIyy6ohsfHVlbapyi
9gg/qxNwv2mpUq5KRM4fOvpFTJ5wFO0k/eD1fV0L88dgBZYk+wQJ+ofRK/CNf3of
jMgsv9QBKV3kmHdvzJAYaTIii3N/8Q==
=/Us5
-END PGP SIGNATURE-



[SECURITY] [DSA 3502-1] roundup security update

2016-03-03 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3502-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
March 03, 2016https://www.debian.org/security/faq
- -

Package: roundup
CVE ID : CVE-2014-6276

Ralf Schlatterbeck discovered an information leak in roundup, a
web-based issue tracking system. An authenticated attacker could use it
to see sensitive details about other users, including their hashed
password.

After applying the update, which will fix the shipped templates, the
site administrator should ensure the instanced versions (in
/var/lib/roundup usually) are also updated, either by patching them
manually or by recreating them.

More info can be found in the upstream documentation at
http://www.roundup-tracker.org/docs/upgrading.html#user-data-visibility

For the oldstable distribution (wheezy), this problem has been fixed
in version 1.4.20-1.1+deb7u1.

For the stable distribution (jessie), this problem has been fixed in
version 1.4.20-1.1+deb8u1.

For the testing (stretch) and unstable (sid) distribution, this problem has not
yet been fixed.

We recommend that you upgrade your roundup packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJW2F1uAAoJEG3bU/KmdcClyAYH/1U/zjrSq7UzdhBwHtyBYbs1
Phs0MbLGCUQShVyDt7mSfGszDTljob8nUMXpgtzeDzFM7QZItVepHNYDaQo6PB6A
aX4FaQwdkw5LDRQ8b9VsgEHRa0qSpHrQ/blJSGfy671hnWECxcpd7p9N1HvNnYDI
cClJyHuYjaVX0lDgN/qGEPGP9QPnnazHDaL45QGGD0FozeXafeseYa9e2tlVjVSJ
xjljSH5AWNQj+CHBffUiSJlAwxnp497nuChvDrB//SfM3XqWGCJ6lRUQU6fX7lyB
5iZ7/ZhogqV3kvsEu+zabCDZINkRmrrTxg/qwImvjDQkWX1InM0GNqZfLzfBdPs=
=cDuA
-END PGP SIGNATURE-



[SECURITY] [DSA 3492-1] gajim security update

2016-02-25 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3492-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
February 25, 2016 https://www.debian.org/security/faq
- -

Package: gajim
CVE ID : CVE-2015-8688
Debian Bug : 809900

Daniel Gultsch discovered in Gajim, an XMPP/jabber client. Gajim didn't
verify the origin of roster update, allowing an attacker to spoof them
and potentially allowing her to intercept messages.

For the oldstable distribution (wheezy), this problem has been fixed
in version 0.15.1-4.1+deb7u1.

For the stable distribution (jessie), this problem has been fixed in
version 0.16-1+deb8u1.

For the testing distribution (stretch), this problem has been fixed
in version 0.16.5-0.1.

For the unstable distribution (sid), this problem has been fixed in
version 0.16.5-0.1.

We recommend that you upgrade your gajim packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJWzytoAAoJEG3bU/KmdcClehYIAKTfjnwq/3iN53yVR6qwAoxQ
ZFbMlkiHFelDcIurbpo/wQH/R20FA0rHj6DcdmbaOJLTw2Kb6+feH5Ko5LGLC/1O
9/BEQLop6h8FdsW/pHr+e1RdEoioDWbKj8lBgqihl/ILt/9AQ7W+W/GmecBdQTge
N9Ha2P8IpLoeN5b8KIL8o3Kb1uT0zBlexR04L7zxJOWY2pizFr4FCxOToZ/IIoYB
m6wX0uP+ooP+KWXQ2UgZzPznbLNZeJ0pkaa1lXIgGu182IDCz3u3EEaE1zoQTxon
AtuUjlAOeGC6ByjbpGMkSc/mNI+WkxOrjqJmRBdJY07TmfCk3z4l4B+wab/Jew4=
=53BS
-END PGP SIGNATURE-



[SECURITY] [DSA 3462-1] radicale security update

2016-02-01 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3462-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
January 30, 2016  https://www.debian.org/security/faq
- -

Package: radicale
CVE ID : CVE-2015-8747 CVE-2015-8748
Debian Bug : 809920

Two vulnerabilities were fixed in radicale, a CardDAV/CalDAV server.

CVE-2015-8747

The (not configured by default and not available on Wheezy)
multifilesystem storage backend allows read and write access to
arbitrary files (still subject to the DAC permissions of the user
the radicale server is running as).

CVE-2015-8748

If an attacker is able to authenticate with a user name like `.*',
he can bypass read/write limitations imposed by regex-based rules,
including the built-in rules `owner_write' (read for everybody,
write for the calendar owner) and `owner_only' (read and write for
the the calendar owner).

For the oldstable distribution (wheezy), these problems have been fixed
in version 0.7-1.1+deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 0.9-1+deb8u1.

For the testing distribution (stretch), these problems have been fixed
in version 1.1.1-1.

For the unstable distribution (sid), these problems have been fixed in
version 1.1.1-1.

We recommend that you upgrade your radicale packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJWrQV8AAoJEG3bU/KmdcClIB0H/0uqWEvEk9dBBqoW8+y5lA4X
MTyDUVUH0n/XjVSvuGf28v5854OhtdayjnG3iKjGD1JNUh31AibPUxRSbUcKIjA8
39JGXpizHkrY3FOiH/Wp4wCsO30+cgkWn+sJxQ64/G1AWKGY2oIoOB60gz/Dnrs2
0Vu476NVo+rC2wbhFhTOiS57c/a8n/NOmKNnd6d1nRJjJfxf/9sZL7l5qnXHQLk1
la5gy14OOMjwVuYXx1Eo4V1HnJyC4gc86bnbK8gPDPNMJyH0ZN6K0I8Z0n5vese7
D7WatwEdukJEjO426id5vSAMg+jokspL+btRP7lUTYKTtUVxk/zjcNXWVbmlMog=
=po9r
-END PGP SIGNATURE-



[SECURITY] [DSA 3451-1] fuse security update

2016-01-21 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3451-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
January 20, 2016  https://www.debian.org/security/faq
- -

Package: fuse
CVE ID : CVE-2016-1233

Jann Horn discovered a vulnerability in the fuse (Filesystem in
Userspace) package in Debian. The fuse package ships an udev rules
adjusting permissions on the related /dev/cuse character device, making
it world writable.

This permits a local, unprivileged attacker to create an
arbitrarily-named character device in /dev and modify the memory of any
process that opens it and performs an ioctl on it.

This in turn might allow a local, unprivileged attacker to escalate to
root privileges.

For the oldstable distribution (wheezy), the fuse package is not affected.

For the stable distribution (jessie), this problem has been fixed in
version 2.9.3-15+deb8u2.

For the testing distribution (stretch), this problem has been fixed
in version 2.9.5-1.

For the unstable distribution (sid), this problem has been fixed in
version 2.9.5-1.

We recommend that you upgrade your fuse packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJWoT/VAAoJEG3bU/KmdcCluUoH/AjfCNv4FhljD2bfLGFWAeIi
T5frYjGUdUJH9e88t+onHDk37dwN3W00NjXIdU7viV442hFBzNUjn1FAgAfQGEgD
a5COswLK639PbpI/fUekx6mVVu7u3f4i5iq4YGSj6pyfQtHAcpw3XSNwEovBj/xn
P4ool1/VcYc0ywJ9RfGo5i8G+gSYoUmEWPUU17BTl7jFD/BukAZ9ddGC5D3Q/M+p
yMA/IIZPzSc4+SGcXekN8YFP442xBiLywaSw4sajhBfaZnxMm/wqh3rH91cXMSD9
ohVUrc0fXGFRWaczTg/lnCc+VwoHkwKRJHpY8qWPhh0ec8uP+X/qiQ4qpjB+Sq0=
=iB9s
-END PGP SIGNATURE-



[SECURITY] [DSA 3446-1] openssh security update

2016-01-14 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3446-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
January 14, 2016  https://www.debian.org/security/faq
- -

Package: openssh
CVE ID : CVE-2016-0777 CVE-2016-0778
Debian bug : 810984

The Qualys Security team discovered two vulnerabilities in the roaming
code of the OpenSSH client (an implementation of the SSH protocol
suite).

SSH roaming enables a client, in case an SSH connection breaks
unexpectedly, to resume it at a later time, provided the server also
supports it.

The OpenSSH server doesn't support roaming, but the OpenSSH client
supports it (even though it's not documented) and it's enabled by
default.

CVE-2016-0777

An information leak (memory disclosure) can be exploited by a rogue
SSH server to trick a client into leaking sensitive data from the
client memory, including for example private keys.

CVE-2016-0778

A buffer overflow (leading to file descriptor leak), can also be
exploited by a rogue SSH server, but due to another bug in the code
is possibly not exploitable, and only under certain conditions (not
the default configuration), when using ProxyCommand, ForwardAgent or
ForwardX11.

This security update completely disables the roaming code in the OpenSSH
client.

It is also possible to disable roaming by adding the (undocumented)
option 'UseRoaming no' to the global /etc/ssh/ssh_config file, or to the
user configuration in ~/.ssh/config, or by passing -oUseRoaming=no on
the command line.

Users with passphrase-less privates keys, especially in non interactive
setups (automated jobs using ssh, scp, rsync+ssh etc.) are advised to
update their keys if they have connected to an SSH server they don't
trust.

More details about identifying an attack and mitigations will be
available in the Qualys Security Advisory.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1:6.0p1-4+deb7u3.

For the stable distribution (jessie), these problems have been fixed in
version 1:6.7p1-5+deb8u1.

For the testing distribution (stretch) and unstable distribution (sid), these
problems will be fixed in a later version.

We recommend that you upgrade your openssh packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJWl8KkAAoJEG3bU/KmdcClRNwH/0VVHlie4NzyktneCUYnPuU2
WpeiJLScW+Sgn9ZfaL4LD+RlvmH19YLaKirIula1Wp+f6poAAMrE+Zh2ZO6wH1XY
C3VG9mA3sZDkrgctKVqQ0jO9oY0kFsN8FbNduFH/qBycLZdsH6nQ1KyWRDuKfVql
4qJCoErmsc9w/Avlh/+WE7JFDRA+2TcGuXeHbmuSaxHAbR8+2PZ+4Z5xgUG/i7P2
KeQkFTHBewn0fBQsQxIAgkwvV58eKNScGcgEMBrwKcwxcXDmWg4ST8KQLLZ+oQct
mF1xWkNAnGNk6yfiGScv6TlY2JtVgfTTNN3gYjpbe/W4Wbqwp7xML90DRPzG7WQ=
=MOdR
-END PGP SIGNATURE-



[SECURITY] [DSA 3398-1] strongswan security update

2015-11-16 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3398-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
November 16, 2015 https://www.debian.org/security/faq
- -

Package: strongswan
CVE ID : CVE-2015-8023

Tobias Brunner found an authentication bypass vulnerability in
strongSwan, an IKE/IPsec suite.

Due to insufficient validation of its local state the server
implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin
can be tricked into successfully concluding the authentication without
providing valid credentials.

It's possible to recognize such attacks by looking at the server logs.
The following log message would be seen during the client
authentication:

  EAP method EAP_MSCHAPV2 succeeded, no MSK established

For the oldstable distribution (wheezy), this problem has been fixed
in version 4.5.2-1.5+deb7u8.

For the stable distribution (jessie), this problem has been fixed in
version 5.2.1-6+deb8u2.

For the testing distribution (stretch), this problem has been fixed
in version 5.3.3-3.

For the unstable distribution (sid), this problem has been fixed in
version 5.3.3-3.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJWSdZXAAoJEG3bU/KmdcClzmwIAKSxdiqejnrNE0GrLBxiuG9h
dTn/aRw0OaOrXUs/Gmi7fMy0ce0ZqoTm5tExVAh9PsuRGqgxMfjuPQs+jt8XEAGf
ZW7PeRQoej5XgIiMpoMM+Z1jNjgY2aTgccqS1kGWvRXdWycMKTHEFFVk5vHopuqv
iR5+kVX0OxLn043Iu77EmpBYqxIbVG8acHEOCgIfef80rNPaDksvwqV3I7swnAWx
t0ezoNZglHTCfOefcj7RRgEpcPL/7UIv3CVBmtw60E6P+//jXE6fmhjkf6B5BEjx
QZAMUiEqRtkjXil8xdDoJTVHJQ9UKXSGrTimZyrF7M0+JlpUvNzeB5ynaMh+OtQ=
=8xMJ
-END PGP SIGNATURE-



[SECURITY] [DSA 3375-1] wordpress security update

2015-10-20 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3375-1   secur...@debian.org
https://www.debian.org/security/Yves-Alexis Perez
October 19, 2015  https://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2015-5714 CVE-2015-5715
Debian Bug : 799140

Several vulnerabilities have been fixed in Wordpress, the popular
blogging engine.

CVE-2015-5714

A cross-site scripting vulnerability when processing shortcode tags
has been discovered.

The issue has been fixed by not allowing unclosed HTML elements in
attributes.

CVE-2015-5715

A vulnerability has been discovered, allowing users without proper
permissions to publish private posts and make them sticky.

The issue has been fixed in the XMLRPC code of Wordpress by not
allowing private posts to be sticky.

Other issue(s)

   A cross-site scripting vulnerability in user list tables has been
   discovered.

   The issue has been fixed by URL-escaping email addresses in those
   user lists.

For the oldstable distribution (wheezy), these problems will be fixed
in later update.

For the stable distribution (jessie), these problems have been fixed in
version 4.1+dfsg-1+deb8u5.

For the testing distribution (stretch), these problems have been fixed
in version 4.3.1+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 4.3.1+dfsg-1.

We recommend that you upgrade your wordpress packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJWJU/4AAoJEG3bU/KmdcClwJkH+wbyIKtik3ASrpO/TqULYail
PYwhsEcb58PjFLn5IEqvXXaAi6FANhcllNwennROd5rqNvSZjPNXjkHge+PV64RO
T1rsT4G1MnM2e9CQvRzT3HQP0JC3u/79IvDkGsUfJjMbG/juBcZH4F69VHD/hN8x
rg9ChCEkKjAKAgJIfVU95H4N64iYEsbuRA9d6gJTGqfOw6KcSdNgpeQVRUSn1pjV
ZxabKmG6NFdFaKjo6Ql1FN9yg5bY0u2rNVH7exR+ce19H5N4QY22yqdF5iMNmYb+
3F6UgfTjYXV3PYoyPkoYTbdpcopoWQpCjh/dasjyX0yD06O9F2fW4Ht6UUOxbw8=
=sToZ
-END PGP SIGNATURE-



[SECURITY] [DSA 3282-1] strongswan security update

2015-06-08 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3282-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
June 08, 2015  http://www.debian.org/security/faq
- -

Package: strongswan
CVE ID : CVE-2015-4171

Alexander E. Patrakov discovered an issue in strongSwan, an IKE/IPsec
suite used to establish IPsec protected links.

When an IKEv2 client authenticates the server with certificates and the
client authenticates itself to the server using pre-shared key or EAP,
the constraints on the server certificate are only enforced by the
client after all authentication steps are completed successfully. A
rogue server which can authenticate using a valid certificate issued by
any CA trusted by the client could trick the user into continuing the
authentication, revealing the username and password digest (for EAP) or
even the cleartext password (if EAP-GTC is accepted).

For the oldstable distribution (wheezy), this problem has been fixed
in version 4.5.2-1.5+deb7u7.

For the stable distribution (jessie), this problem has been fixed in
version 5.2.1-6+deb8u1.

For the testing distribution (stretch), this problem has been fixed
in version 5.3.1-1.

For the unstable distribution (sid), this problem has been fixed in
version 5.3.1-1.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org

- -- 
Yves-Alexis Perez
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJVdao4AAoJEG3bU/KmdcCluZAH/0KIDlKhVrU58yZ2uqThY8IZ
+rYZDO1Liz4X5Ycx+vo+tM85DsqUYNQeTeBSKxpQX57XKF2KY09tVF08C1oXo8u6
JA3h9B4zsSBMm3210IQ4XQBQZSA5XnqRg4mTANihtdCZNhwrtskAcEiHwDqKtzkW
FNHNzLtduM9q7w8rApLYAYROKGjO2rR0YyEQ6iu55fnMoyhL8Qy9t5uwTOx+fGDS
8ai8lKMIGTtVXVYw/HrsYJA5hl88ndbbBAZzoJrPcxFiFFjBpawpWdhgPlf4kYRr
3GrsqJcwQvPSbQcOyxzGIFa08JJOGPwRx1M1HfkmZHI8RQQ8f/jp9ZsibXaFXPs=
=HOGE
-END PGP SIGNATURE-



[SECURITY] [DSA 3212-1] icedove security update

2015-04-03 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3212-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
April 02, 2015 http://www.debian.org/security/faq
- -

Package: icedove
CVE ID : CVE-2015-0801 CVE-2015-0807 CVE-2015-0813 CVE-2015-0815
 CVE-2015-0816

Multiple security issues have been found in Icedove, Debian's version of
the Mozilla Thunderbird mail client: Multiple memory safety errors,
use-after-frees and other implementation errors may lead to the
execution of arbitrary code, the bypass of security restrictions or
denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 31.6.0-1~deb7u1.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 31.6.0-1.

For the unstable distribution (sid), these problems have been fixed in
version 31.6.0-1.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJVHaf6AAoJEG3bU/KmdcCl/XMH/3vTJkdPu2v0zU4l+W/dlEE9
PrDOleWLq2QL2mufCiF2oJCoaECRa0gocFaZifwQ3OImlL9DRhsZAoS75x91CtI/
ex05xpJ4R65S3raRm4FG90kyrdhxk6XUo+QL1KYRxvs31aVCQ9q/iIanw/vMfywO
W3WHD0EltImB2H+Ux/Hv5JVvOZvhEdJphj2hmnaHoAok+6vKwx41nyM0mph9lPgk
ENhmjwSVTFKJP4c53upucuDM9QTp800GspLb0PujyUTxIwmwl+1/a6sQ0muiKZqH
XYru+G+FHff02LGRMVj2N05gkXThMPpiRZhJWQ+1Oao2+znLgq6hwZKGQcdNhLc=
=Jfv5
-END PGP SIGNATURE-



[SECURITY] [DSA 3209-1] openldap security update

2015-03-31 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3209-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 30, 2015 http://www.debian.org/security/faq
- -

Package: openldap
CVE ID : CVE-2013-4449 CVE-2014-9713 CVE-2015-1545
Debian Bug : 729367 761406 776988

Multiple vulnerabilities were found in OpenLDAP, a free implementation
of the Lightweight Directory Access Protocol.

CVE-2013-4449

Michael Vishchers from Seven Principles AG discovered a denial of
service vulnerability in slapd, the directory server implementation.
When the server is configured to used the RWM overlay, an attacker
can make it crash by unbinding just after connecting, because of an
issue with reference counting.

CVE-2014-9713

The default Debian configuration of the directory database allows
every users to edit their own attributes. When LDAP directories are
used for access control, and this is done using user attributes, an
authenticated user can leverage this to gain access to unauthorized
resources.
.
Please note this is a Debian specific vulnerability.
.
The new package won't use the unsafe access control rule for new
databases, but existing configurations won't be automatically
modified. Administrators are incited to look at the README.Debian
file provided by the updated package if they need to fix the access
control rule.

CVE-2015-1545

 Ryan Tandy discovered a denial of service vulnerability in slapd.
 When using the deref overlay, providing an empty attribute list in
 a query makes the daemon crashes.

For the stable distribution (wheezy), these problems have been fixed in
version 2.4.31-2.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 2.4.40-4.

For the unstable distribution (sid), these problems have been fixed in
version 2.4.40-4.

We recommend that you upgrade your openldap packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJVGbpWAAoJEG3bU/KmdcCl7AMH/Aw2b5XLEULZTFxMbqWCq/Rm
zgNe+Rf8OK/0jIiohtUh0ZmpFb74zw8AluV8fRK6V/4Pk+/JStOkcI01fCjrr5mT
R30BNzy/sH9GBdlRxFEWtlFi6/8g+rxuq5MHBhrAXDre34ZMk4gAUsbGaeF6NQKM
hLaqqG1dmhEGg3X/7TzfXR4fJm4SKyy/ZOBslmrXzW1cM6ttu7FmQlywaTgHvUfr
cL+vo99jYDl7dg8Ne74WLXsepTEsnm4x2yT9c6u28UJ9eDrNybeaux6WEu6eMh4x
PnU+4lbgLE/lFDplBOxYTykDPwRbaZIV9xE21UgtSXSqaCQ+jkRg8qOu9P4u13A=
=lYTz
-END PGP SIGNATURE-



[SECURITY] [DSA 3207-1] shibboleth-sp2 security update

2015-03-30 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3207-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 28, 2015 http://www.debian.org/security/faq
- -

Package: shibboleth-sp2
CVE ID : CVE-2015-2684

A denial of service vulnerability was found in the Shibboleth (an
federated identity framework) Service Provider. When processing certain
malformed SAML message generated by an authenticated attacker, the
daemon could crash.

For the stable distribution (wheezy), this problem has been fixed in
version 2.4.3+dfsg-5+deb7u1.

For the upcoming stable distribution (jessie), this problem has been
fixed in version 2.5.3+dfsg-2.

For the unstable distribution (sid), this problem has been fixed in
version 2.5.3+dfsg-2.

We recommend that you upgrade your shibboleth-sp2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJVFqmOAAoJEG3bU/KmdcClj2UH/iUoRWVjf7xGbRpyvgL8QdTR
H0MxQHyNXiNRmPi/xtyCj3zLcoI14h8fm3Hggam1qfTY36yFnTi4DPnRIliYWb01
+r3dJua3YN5mALoLgJfCupQ2skktHRGlTImhEfLaSfnvmss8byAvT5CAoJiCySXz
ILvO/xurlnFzIuWklBttBurvcBKe1HZth3Caa0rZ+kqWdf/QVKiS1vFL1V/Pivop
hCt9i/qLQi5HCALYPF4y0ftpKKWErixYNmNG826pr6tWDVDtG82PuQlvtdPYpKmx
s9z6dpQGZwpXErkkMBVsVzQ3JXKPCrWzY3orUANkcGKo0dJqG3rNP5eXAtLXMjw=
=xA5Y
-END PGP SIGNATURE-



[SECURITY] [DSA 3118-1] strongswan security update

2015-01-05 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3118-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
January 05, 2015   http://www.debian.org/security/faq
- -

Package: strongswan
CVE ID : CVE-2014-9221

Mike Daskalakis reported a denial of service vulnerability in charon,
the IKEv2 daemon for strongSwan, an IKE/IPsec suite used to establish
IPsec protected links.

The bug can be triggered by an IKEv2 Key Exchange (KE) payload that
contains the Diffie-Hellman (DH) group 1025. This identifier is from the
private-use range and only used internally by libtls for DH groups with
custom generator and prime (MODP_CUSTOM). As such the instantiated
method expects that these two values are passed to the constructor. This
is not the case when a DH object is created based on the group in the KE
payload. Therefore, an invalid pointer is dereferenced later, which
causes a segmentation fault.

This means that the charon daemon can be crashed with a single
IKE_SA_INIT message containing such a KE payload. The starter process
should restart the daemon after that, but this might increase load on
the system. Remote code execution is not possible due to this issue, nor
is IKEv1 affected in charon or pluto.

For the stable distribution (wheezy), this problem has been fixed in
version 4.5.2-1.5+deb7u6.

For the upcoming stable distribution (jessie), this problem has been
fixed in version 5.2.1-5.

For the unstable distribution (sid), this problem has been fixed in
version 5.2.1-5.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJUqn9mAAoJEG3bU/KmdcClS64H/29//IeNgo/Qeo9zGo/GsCaO
A4Y6SgOYj25KIpIPQd0qcPAFID0oJrLNusnW8QTKNSwgw5ntNyY+EYfGmKu57/rH
VKFSXp6sJ9N6LtIEZ6jYMNl/M0jw6TfNOW6RoUBq9J+0JBTmlQ61ef5Z+qsoHpjB
mgGax4oeujTF8DMbMli5Pntja5NdYTjlLKOEyeiZTfc7JlFju5ehGk9xIRx03Mtr
LcLokqknLavI4nPZZV+t4kEeMb9RTWy71Fkfvd0NCmDOkK7W2Der6Ko3kciED1b5
8prp7f0zVkJ29ULisPwbZtaxk9+ETehUdBUoL/76xiMtcu0y1HGqHk8R4U/NIak=
=0Vd7
-END PGP SIGNATURE-



[SECURITY] [DSA 3097-1] unbound security update

2014-12-11 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3097-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
December 10, 2014  http://www.debian.org/security/faq
- -

Package: unbound
CVE ID : CVE-2014-8602
Debian Bug : 772622

Florian Maury from ANSSI discovered that unbound, a validating,
recursive, and caching DNS resolver, was prone to a denial of service
vulnerability. An attacker crafting a malicious zone and able to emit
(or make emit) queries to the server can trick the resolver into
following an endless series of delegations, leading to ressource
exhaustion and huge network usage.

For the stable distribution (wheezy), this problem has been fixed in
version 1.4.17-3+deb7u2.

For the upcoming stable distribution (jessie), this problem has been
fixed in version 1.4.22-3.

For the unstable distribution (sid), this problem has been fixed in
version 1.4.22-3.

We recommend that you upgrade your unbound packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJUiLynAAoJEG3bU/KmdcCluqQH/1nE0LBSQXkUd3psC/TkbE7W
WhvnSRT/JYCapY29xR4zZvgVUzv4ey6/xNypB9V1jgrnR+7AURVJCeDk4JZb69dU
av7b2rRQt5hyUjs3OqYhY9Z5kUWTjYjsS8APlBCOheBY9yLSYpXSYvW+F60oS9c+
opWvTVvCdDkeI7abrqsQu/sxjdBzgJscfjdNZhdtAeKYRITpPEeeTa/NX8evKDzw
9LwfC5qDY1GN/+CHLnIgkZFgZ9XTMOLEv9DjzC3Cpfdqs5JphhC2VRn7upZSAu90
Wws7Mzp76ioAyRiZh5+nxCsExqWDsVZEAVyBGkhYnZaEm5fehbE5aVsacvmierA=
=wkqI
-END PGP SIGNATURE-



[SECURITY] [DSA 3085-1] wordpress security update

2014-12-03 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3085-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
December 03, 2014  http://www.debian.org/security/faq
- -

Package: wordpress
CVE ID : CVE-2014-9031 CVE-2014-9033 CVE-2014-9034 CVE-2014-9035 
 CVE-2014-9036 CVE-2014-9037 CVE-2014-9038 CVE-2014-9039
Debian Bug : 770425

Multiple security issues have been discovered in Wordpress, a web
blogging tool, resulting in denial of service or information disclosure.
More information can be found in the upstream advisory at
https://wordpress.org/news/2014/11/wordpress-4-0-1/

CVE-2014-9031

Jouko Pynnonen discovered an unauthenticated cross site scripting
vulnerability (XSS) in wptexturize(), exploitable via comments or
posts.

CVE-2014-9033

Cross site request forgery (CSRF) vulnerability in the password
changing process, which could be used by an attacker to trick an
user into changing her password.

CVE-2014-9034

Javier Nieto Arevalo and Andres Rojas Guerrero reported a potential
denial of service in the way the phpass library is used to handle
passwords, since no maximum password length was set.

CVE-2014-9035

John Blackbourn reported an XSS in the Press This function (used
for quick publishing using a browser bookmarklet).

CVE-2014-9036

Robert Chapin reported an XSS in the HTML filtering of CSS in posts.

CVE-2014-9037

David Anderson reported a hash comparison vulnerability for
passwords stored using the old-style MD5 scheme. While unlikely,
this could be exploited to compromise an account, if the user had
not logged in after a Wordpress 2.5 update (uploaded to Debian on 2
Apr, 2008) and the password MD5 hash could be collided with due to
PHP dynamic comparison.

CVE-2014-9038

Ben Bidner reported a server side request forgery (SSRF) in the core
HTTP layer which unsufficiently blocked the loopback IP address
space.

CVE-2014-9039

Momen Bassel, Tanoy Bose, and Bojan Slavkovic reported a
vulnerability in the password reset process: an email address change
would not invalidate a previous password reset email.

For the stable distribution (wheezy), these problems have been fixed in
version 3.6.1+dfsg-1~deb7u5.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 4.0.1+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 4.0.1+dfsg-1.

We recommend that you upgrade your wordpress packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJUfswVAAoJEG3bU/KmdcClQrsIAJDl/JfGi7LWL2wk4QGuFg23
FtWl0bjFYAMxR/97MGHWMxnk0tafu9tFOfKLopnhVY73TyzmfsrWKjvkRhqCs083
MO1BJkzVi7pG8JbLq0o1GrPj72bzaBh9eTnVWRtzIjk1ACCXOXa+6O8GfPLyAwOm
37VrThtxzBAyJ5AvE+vKfOI8u2n2CoiCAqeUpcLGH35dMbjxG7MaMmEvYjKnXNCn
1rBepPlBMBFY5Z2QQJF4C4c1Foca5pOl01OsybycZ/zXvIcb8o6besPo2OdNvLQp
2K4RcrnD7r8LgjY1lTOxhzVXp77Mp9QH9MdqHyDLV6vyrnu1O2/YDKRdsj0hIv8=
=pOFB
-END PGP SIGNATURE-



[SECURITY] [DSA 3074-2] php5 regression update

2014-11-19 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3074-2   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 19, 2014  http://www.debian.org/security/faq
- -

Package: php5

The previous update for php5, DSA-3074-1, introduced regression in the
sessionclean cron script. The change was intended to fix a potential
symlink attack using filenames including the NULL character (Debian bug
#766147), but depended on sed package version too recent, not in Wheezy.

This update reverts the fix, so people are advised to keep kernel
symlink protection (sysctl fs.protected_symlinks=1) enabled as it is by
default on Wheezy, which is enough to prevent successful exploitation.

For the stable distribution (wheezy), this problem has been fixed in
version 5.4.35-0+deb7u2.

We recommend that you upgrade your php5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJUbHXDAAoJEG3bU/KmdcClQksIALHORGkFY4jBHkqu8zhU2jJT
cwsgTfzcjqGOsIHVPTN3vS7ynB9qvFP9miYgFCn87pV2aZo66Nztgsrw6rt6tkBm
vhUg18sxDkc46M/Wtlh5m9tk+2nuEVROlnxQXTuid5ipn79N59uUtVHGyvkVfboc
m2noyg1zFK43g4pDovAQYZDXVd0uwHJwDoQevORZ10BoJj93SowkKcmLgJNolGyQ
UFU8oyE6lrZdkyxmtSHWI4I98FDIL2oSzQEAy3dx33mTCR1HSS5fLOCCo5D8vQSk
CAFXfLeYyK4xVmBds9U4loOj5Ll/g1PRs0yHEUPWwPlEUTVXFlKpMK729j7HOmc=
=uIwr
-END PGP SIGNATURE-



[SECURITY] [DSA 3074-1] php5 security update

2014-11-18 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3074-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 18, 2014  http://www.debian.org/security/faq
- -

Package: php5
CVE ID : CVE-2014-3710
Debian Bug : 68283

Francisco Alonso of Red Hat Product Security found an issue in the file
utility, whose code is embedded in PHP, a general-purpose scripting
language.  When checking ELF files, note headers are incorrectly
checked, thus potentially allowing attackers to cause a denial of
service (out-of-bounds read and application crash) by supplying a
specially crafted ELF file.

As announced in DSA-3064-1 it has been decided to follow the stable
5.4.x releases for the Wheezy php5 packages. Consequently the
vulnerability is addressed by upgrading PHP to a new upstream version
5.4.35, which includes additional bug fixes, new features and possibly
incompatible changes. Please refer to the upstream changelog for more
information:

 http://php.net/ChangeLog-5.php#5.4.35

For the stable distribution (wheezy), this problem has been fixed in
version 5.4.35-0+deb7u1.

We recommend that you upgrade your php5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJUa7XMAAoJEG3bU/KmdcClzHgH/3sZmgwrWGUenVLcg3c8TWE3
uPMWOrUcRmPLzkyWuixKKaU1nijwB3EEYknNqGKqT87lLmZIntWF9FoJXfX6mxrg
UpeSHQTknLPdL8w6gAg2KTFCkua+k8wIOqmW7TSpSHr6LU6Aq6ePkBGzBfEaXWLK
JbL1HE8/SmfQ5+DWbaxz+g9cb5vJRHUUWGbTs2WotdrBlYho9wz4cSlx9khEIt3V
B/NJ3Etvl7UMgS7Tii3h0WW+hksrgrXt8itBj7aNtasnFNf3iySlUoEaxeotIugu
W6chDiuEKYdsq1jDdl0T/GhT2K9UxGIPoTwhvygLbGO20bw1Ux1Ku+r2qSNfryY=
=0CGm
-END PGP SIGNATURE-



[SECURITY] [DSA 3037-1] icedove security update

2014-09-29 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3037-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
September 26, 2014 http://www.debian.org/security/faq
- -

Package: icedove
CVE ID : CVE-2014-1568

Antoine Delignat-Lavaud from Inria discovered an issue in the way NSS (the
Mozilla Network Security Service library, embedded in Wheezy's Icedove),
was parsing ASN.1 data used in signatures, making it vulnerable to a
signature forgery attack.

An attacker could craft ASN.1 data to forge RSA certificates with a valid
certification chain to a trusted CA.

For the stable distribution (wheezy), this problem has been fixed in
version 24.8.1esr-1~deb7u1.

For the testing distribution (jessie) and unstable distribution (sid),
Icedove uses the system NSS library, handled in DSA 3033-1.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJUJb8TAAoJEG3bU/KmdcClBGMIAKedVT225QJCxKQWVEW55kOt
z4Q3jeVHuJSA1iITpLL7UNb/zSpsXy6Gydm0fopDSK4//MHAU1JomQJ6+amuz3tq
IJtnQRMysVlMLYrvfuMA4UYwoW4eNpr1oFg35A//P9sYf3B1f0WbnwGotzHhkNI+
194A1LCqAYA2lgGfrtiHcoj5vr7cs/nlJLxasx3C0OPoVkTVKXb2kxqXfFoaU4yz
9iRgPN6RMadldWEyr+3nLx+D8CTUmDrpeTHfHo030IuKuyHOOer9LCB7SJcYdaVg
eI1kM3jO4NGu/7VO8mF1H7QFBkjcKVgpbCG9rp5Dcwkluz4es4xNflGTf0oPYTM=
=A9At
-END PGP SIGNATURE-



[SECURITY] [DSA 3033-1] nss security update

2014-09-25 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3033-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
September 25, 2014 http://www.debian.org/security/faq
- -

Package: nss
CVE ID : CVE-2014-1568

Antoine Delignat-Lavaud from Inria discovered an issue in the way NSS
(the Mozilla Network Security Service library) was parsing ASN.1 data
used in signatures, making it vulnerable to a signature forgery attack.

An attacker could craft ASN.1 data to forge RSA certificates with a
valid certification chain to a trusted CA.

For the stable distribution (wheezy), this problem has been fixed in
version 2:3.14.5-1+deb7u2.

For the testing distribution (jessie), this problem has been fixed in
version 2:3.17.1.

For the unstable distribution (sid), this problem has been fixed in
version 2:3.17.1.

We recommend that you upgrade your nss packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJUI2CBAAoJEG3bU/KmdcCldbsIAKpmbb4XdAU3Lwr0aqXQ5UTt
Tg+w2bZ8nKgZr2e+apkdlCqOd7QLnvUrykhUGe4HAwCcb38BUV8xhA+sdAfrXhdQ
S7XOev+zgWtcu3FOylluRg5hMxBetqbZCtKHZ97NzbzX0IVMNXOMBNXsXOBSlxJd
8H5d30zcUtMCYQVMhj3tUDkTTZuo1POp7MA44RkL13ORMlDcRSbYacicyRZbFtOk
P6/i9Caq657Sm0MXjRCDet+jdtTIpCucF/nW+jXsWyzqtA5OJphic2UX9cG05LzC
hYyVKHITZVkuSQVqqX6+EwVaA9nn1DerX48Jqty+7dLWUdHVhs30WTRjx0Ip/dw=
=HZF1
-END PGP SIGNATURE-



[SECURITY] [DSA 3034-1] iceweasel security update

2014-09-25 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3034-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
September 25, 2014 http://www.debian.org/security/faq
- -

Package: iceweasel
CVE ID : CVE-2014-1568

Antoine Delignat-Lavaud from Inria discovered an issue in the way NSS
(the Mozilla Network Security Service library, embedded in Wheezy's
Iceweasel package), was parsing ASN.1 data used in signatures, making it
vulnerable to a signature forgery attack.

An attacker could craft ASN.1 data to forge RSA certificates with a
valid certification chain to a trusted CA.

For the stable distribution (wheezy), this problem has been fixed in
version 24.8.1esr-1~deb7u1.

For the testing distribution (jessie) and unstable distribution (sid),
Iceweasel uses the system NSS library, handled in DSA 3033-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJUI7VDAAoJEG3bU/KmdcClfnwIAI/APpG/TLyQ5c5EHH707fhJ
T/rHkpgqz7tVMx1bG1ZjCtbClb+3HuYzJ89l2iaJ6YZLSK36vfhCw1LKC/E8XwZX
enUV8tqcWg++dMwBFDa7qxkEU7+9PxaT6h0TasMCK0fwIYcMKFI7KwwpYOZAxYZ8
3Pdt/oY8Lrs2wuGI2FfzXpQJ9yy6WFHel8oabI6U9XvDcZ9dWFlgH85M0P5RGCc0
Or1Mr4TGONA8etuRfNyzfkABQ9Aj+x2v9xv8t7hxKMlWpbeeHEjgjRzEym8rEqeU
c8mV0LBXmogqztGCT6JMOukxQT7s+OBl33EB/LdoH9AXac1Map4Phy0bV4VhG+M=
=I4Kr
-END PGP SIGNATURE-



[SECURITY] [DSA 3022-1] curl security update

2014-09-11 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3022-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
September 10, 2014 http://www.debian.org/security/faq
- -

Package: curl
CVE ID : CVE-2014-3613 CVE-2014-3620

Two vulnerabilities have been discovered in cURL, an URL transfer
library. They can be use to leak cookie information:

CVE-2014-3613

By not detecting and rejecting domain names for partial literal IP
addresses properly when parsing received HTTP cookies, libcurl can
be fooled to both sending cookies to wrong sites and into allowing
arbitrary sites to set cookies for others.

CVE-2014-3620

libcurl wrongly allows cookies to be set for Top Level Domains
(TLDs), thus making them apply broader than cookies are allowed.
This can allow arbitrary sites to set cookies that then would get
sent to a different and unrelated site or domain.

For the stable distribution (wheezy), these problems have been fixed in
version 7.26.0-1+wheezy10.

For the testing distribution (jessie), these problems have been fixed in
version 7.38.0-1.

For the unstable distribution (sid), these problems have been fixed in
version 7.38.0-1.

We recommend that you upgrade your curl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJUEI+JAAoJEG3bU/KmdcCl2IEIAI5sK+QPJmu+/mZzxZwNHZUi
tmLOw24e0eHRV5YLBj7BdojrEQgLt8HyHeLCKujPz2bG7iftJTcfiKAnmsqh0z1A
mH4/b0m4G5L2x98Ag/+GKW9BcKJJY9LugrUrvE+8lw4fWZvlqfMaw7pen8TNz85Q
YVdHgaZnKd2nUlKhWpLnRVHJJU2Fu0I0H3j64Jj3dOTUw6OAD0b7hp45Xd5ZDp2v
BydYQ8Zsmrc0NORlfNeEca8Pip5gTi6tFDyNw5TGfogdz+IMMKfZRTvR/nriXZ7K
DlC3OwQxzRFMktsH4N3cifDPkxfse72lPAJWtNS1bCvumIUOYXsXr8xBtnQ8MwY=
=Vny8
-END PGP SIGNATURE-



[SECURITY] [DSA 2966-1] samba security update

2014-06-23 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2966-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
June 23, 2014  http://www.debian.org/security/faq
- -

Package: samba
CVE ID : CVE-2014-0178 CVE-2014-0244 CVE-2014-3493
Debian Bug : 

Multiple vulnerabilities were discovered and fixed in Samba, a SMB/CIFS
file, print, and login server:

CVE-2014-0178

Information leak vulnerability in the VFS code, allowing an
authenticated user to retrieve eight bytes of uninitialized memory
when shadow copy is enabled.

CVE-2014-0244

Denial of service (infinite CPU loop) in the nmbd Netbios name
service daemon. A malformed packet can cause the nmbd server to
enter an infinite loop, preventing it to process later requests to
the Netbios name service.

CVE-2014-3493

Denial of service (daemon crash) in the smbd file server daemon. An
authenticated user attempting to read a Unicode path using a
non-Unicode request can force the daemon to overwrite memory at an
invalid address.

For the stable distribution (wheezy), these problems have been fixed in
version 2:3.6.6-6+deb7u4.

For the testing distribution (jessie), these problems have been fixed in
version 2:4.1.9+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 2:4.1.9+dfsg-1.

We recommend that you upgrade your samba packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJTp/WMAAoJEG3bU/KmdcCl10cIAIb5QEA7bqS2gkilXlSfk2J+
WEZB8DKVWfHWGz/krUcSxn8FSF9ItwT0QCcrrZHJHofDx7BIyk+QaHNquDA6a2X8
xm6HHCjhwSUz5qbrnFeZULUQGhekhqTbucr9dEOrbjM+KUWKebX+jrJkEcCVkDVi
uqcAi7p1ESJJ88ebWV6VvlGJO9qOcNAaYAJCGzGapISeaQ/NevKjfWyM0FhdxF4/
nK8ol4C4hJXb02VrXZ7QEvGU0DJryBoA38euAt54NmBqfWBZg/Wi6osmluErbSbA
5xcBpctxXW5sVTf+2k608NdSnS9JilanNtWkaYiQkwD6CDkYfHtq14GMeAzk8ng=
=K2AH
-END PGP SIGNATURE-



[SECURITY] [DSA 2921-1] xbuffy security update

2014-05-05 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2921-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
May 04, 2014   http://www.debian.org/security/faq
- -

Package: xbuffy
CVE ID : CVE-2014-0469

Michael Niedermayer discovered a vulnerability in xbuffy, an utility for
displaying message count in mailbox and newsgroup accounts.

By sending carefully crafted messages to a mail or news account
monitored by xbuffy, an attacker can trigger a stack-based buffer
overflow, leading to xbuffy crash or even remote code execution.

For the oldstable distribution (squeeze), this problem has been fixed in
version 3.3.bl.3.dfsg-8+deb6u1.

For the stable distribution (wheezy), this problem has been fixed in
version 3.3.bl.3.dfsg-8+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 3.3.bl.3.dfsg-9.

For the unstable distribution (sid), this problem has been fixed in
version 3.3.bl.3.dfsg-9.

We recommend that you upgrade your xbuffy packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBCgAGBQJTZqtGAAoJEG3bU/KmdcClSCQH/jaytTnWyJpaBCj9RgsL2ulO
7elVLmvLwN2Tfo5hwmWzW1ibPTDaF+T19CPptimNmHx2wor0rDdNswfZFGqep4H0
TBBln9VdTrdlwkjMZwhlgceMIza+1/WlAWh/h1UFa+2Z5obyBIfDJ1mbgASsjISs
qWz3mSxJfUXV6nmQys+5b8gmbjdcMYCHk63TWkLOZrtqbMm4jIFPw7zwkehmrddr
PTyuKm8Dd+J2VSr3rnzfzVIDBxCBkU/np2Fh9ay6kpDXP2r1rGoYHoeHN50eKTPV
lMVmqPnsXJWsZOr82p2s+xwbvDxsOCHsfxMSMDCGx7QmBPrVNbPukpFFWuv5w34=
=Xx9R
-END PGP SIGNATURE-



[SECURITY] [DSA 2922-1] strongswan security update

2014-05-05 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2922-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
May 05, 2014   http://www.debian.org/security/faq
- -

Package: strongswan
CVE ID : CVE-2014-2891

A vulnerability has been found in the ASN.1 parser of strongSwan, an
IKE/IPsec suite used to establish IPsec protected links.

By sending a crafted ID_DER_ASN1_DN ID payload to a vulnerable pluto or
charon daemon, a malicious remote user can provoke a null pointer
dereference in the daemon parsing the identity, leading to a crash and a
denial of service.

For the oldstable distribution (squeeze), this problem has been fixed in
version 4.4.1-5.6.

For the stable distribution (wheezy), this problem has been fixed in
version 4.5.2-1.5+deb7u4.

For the testing distribution (jessie), this problem has been fixed in
version 5.1.2-1.

For the unstable distribution (sid), this problem has been fixed in
version 5.1.2-1.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBCgAGBQJTZ4o6AAoJEG3bU/KmdcClhi4H/3aeU8f6G2KfkCCKJuHsxHOQ
ENJqoQzL6VoUmnJX5mfVU/sIfMSjVPILwqEceQmaPemobsoAciRHHYX8xrnveqmf
LvhfNQFN3M+zxDpyBKp8qJtUW39t3HgrcqWkMJ/476C1tokdkUHO/kfBEYxHgTj3
IoZuTcLbIMVjDSgdMPszEA5FPoBGNPLsHfhEKDX7WRs3lPYGXS94INddugelau2V
qj3iFuhvWDGIBA7+ByEhW9xo0z9kzuDNh94ra6CZjOgMqu1BrVc1HB8uxHRoXfaw
noHjRcZE/iPiSMDXjcTjsQRqvyjopZFFesN5a0fyKKr/f13E5jzykuVC+iNOk20=
=dy69
-END PGP SIGNATURE-



[SECURITY] [DSA 2893-1] openswan security update

2014-04-01 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2893-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 31, 2014 http://www.debian.org/security/faq
- -

Package: openswan
CVE ID : CVE-2013-2053 CVE-2013-6466

Two vulnerabilities were fixed in Openswan, an IKE/IPsec implementation
for Linux.

CVE-2013-2053

During an audit of Libreswan (with which Openswan shares some code),
Florian Weimer found a remote buffer overflow in the atodn()
function.  This vulnerability can be triggered when Opportunistic
Encryption (OE) is enabled and an attacker controls the PTR record
of a peer IP address.
Authentication is not needed to trigger the vulnerability.

CVE-2013-6466

Iustina Melinte found a vulnerability in Libreswan which also
applies to the Openswan code. By carefuly crafting IKEv2 packets, an
attacker can make the pluto daemon derefeences non-received IKEv2
payload, leading to the daemon crash.
Authentication is not needed to trigger the vulnerability.

Patches were originally written to fix the vulnerabilities in Libreswan,
and have been ported to Openswan by Paul Wouters from the Libreswan
Project.

Since the Openswan package is not maintained anymore in the Debian
distribution and is not available in testing and unstable suites, it is
recommended for IKE/IPsec users to switch to a supported implementation
like strongSwan.

For the oldstable distribution (squeeze), these problems have been fixed in
version 2.6.28+dfsg-5+squeeze2.

For the stable distribution (wheezy), these problems have been fixed in
version 2.6.37-3.1.

We recommend that you upgrade your openswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBCgAGBQJTOcluAAoJEG3bU/KmdcClu7UH/07J/Vlqb3Ulnmlm2ZROyx3Q
2xALBLd5+0fBULBwMZ0A3y1elO+thmzFEL6R/7hsVJKqIMQWsWsn/Ahz0/HAOhkk
2YNnunJkZiyRI9J++9dli6dkbhLKBi53pkgzRzITu8ecJQ7Rt842bD79SvT40foh
CK+l7Y8DIWao0JG8HXwNFn49KGHjz/4ZXmuDi+nRX0AalJlV7LG9N9jgnYIYjVTs
+meQemBgffTyFCd3zW/ydq0K77+3z6EqprH4xVGsxGgu0Uu4Jk0GsAqYMRoETeRh
Nvd1vOTSAMsVFUUpH2FgJkXdDQCtDzRiYFgItUVLWcWoDYrjXgChpdOGI8R0Wv0=
=js6B
-END PGP SIGNATURE-



[SECURITY] [DSA 2869-1] gnutls26 security update

2014-03-03 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2869-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 03, 2014 http://www.debian.org/security/faq
- -

Package: gnutls26
Vulnerability  : incorrect certificate verification
CVE ID : CVE-2014-0092

Nikos Mavrogiannopoulos of Red Hat discovered an X.509 certificate
verification issue in GnuTLS, an SSL/TLS library. A certificate
validation could be reported sucessfully even in cases were an error
would prevent all verification steps to be performed.

An attacker doing a man-in-the-middle of a TLS connection could use this
vulnerability to present a carefully crafted certificate that would be
accepted by GnuTLS as valid even if not signed by one of the trusted
authorities.

For the oldstable distribution (squeeze), this problem has been fixed in
version 2.8.6-1+squeeze3.

For the stable distribution (wheezy), this problem has been fixed in
version 2.12.20-8+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 2.12.23-13.

For the unstable distribution (sid), this problem has been fixed in
version 2.12.23-13.

We recommend that you upgrade your gnutls26 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBCgAGBQJTFOKzAAoJEG3bU/KmdcCl+HkH/2MaLTV36/w+vvnPm0GyStx3
VDHXcI/3CPJVVp2hQFudLA72Fdgm6xlqQPoSNOjSxQItMsQvk4IPm2WpJfsm6kt5
6kPutZUMuQQJqFhxttoZMyvummumUzbKKkarvRgZ6Bb9zcaAFkIWGHdIymuurV2A
qTg11puWQRiNB/aTPwP9qfw8gJ0UIZB/fa7f3Z4RfeTlbUWfFUretc9VAssDZrlg
YiV7LF1Bdwa7BZEQUQgaKXSV3gbLL5MNbKwy2RjryRZ5lg8cpo2eyH2SjugdgJ6b
QZvKbWqYVzI9+HhUX2aQjSrbePMH+BHYe82KrayIOnnw+xwP9RLexMDMdzHSEgU=
=/e7L
-END PGP SIGNATURE-



[SECURITY] [DSA 2826-2] denyhosts regression update

2014-01-24 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2826-2   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
January 23, 2014   http://www.debian.org/security/faq
- -

Package: denyhosts
Vulnerability  : regression
Debian Bug : 734329
CVE ID : CVE-2013-6890

A regression has been found on the denyhosts packages fixing
CVE-2013-6890.  This regression could cause an attempted breakin attempt
to be missed by denyhosts, which would then fail to enforce a ban.

For the oldstable distribution (squeeze), this problem has been fixed in
version 2.6-7+deb6u3.

For the stable distribution (wheezy), this problem has been fixed in
version 2.6-10+deb7u3.

For the testing (jessie) and unstable (sid) distribution, the package denyhosts
has been removed, and its users are encouraged to switch to an alternative like
fail2ban.

We recommend that you upgrade your denyhosts packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)
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=
=sZxV
-END PGP SIGNATURE-



[SECURITY] [DSA 2826-1] denyhosts security update

2013-12-22 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2826-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
December 22, 2013  http://www.debian.org/security/faq
- -

Package: denyhosts
Vulnerability  : Remote denial of ssh service
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-6890

Helmut Grohne discovered that denyhosts, a tool preventing SSH
brute-force attacks, could be used to perform remote denial of service
against the SSH daemon. Incorrectly specified regular expressions used
to detect brute force attacks in authentication logs could be exploited
by a malicious user to forge crafted login names in order to make
denyhosts ban arbitrary IP addresses.

For the oldstable distribution (squeeze), this problem has been fixed in
version 2.6-7+deb6u2.

For the stable distribution (wheezy), this problem has been fixed in
version 2.6-10+deb7u2.

For the testing distribution (jessie), this problem has been fixed in
version 2.6-10.1.

For the unstable distribution (sid), this problem has been fixed in
version 2.6-10.1.

We recommend that you upgrade your denyhosts packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBCgAGBQJSty67AAoJEG3bU/KmdcClLHsH/08JpuJ82Zx+bIkahPHMDCgt
KwIV0s8ZXWamBSbUflfsxY0KfhozWzzlIqqNfCE7M7VG4TNkctnSSBZdpqDKGypn
eYuX/H3dPovLh4Srcx7TF3H9TW2/zv4uddn6xQYsWrKmhwDLcfZ/lR78TKZhnDZI
4fDP0hJ6qWdqE4kP+Qxt3hHxx1SYNJBm+tMaSJANlSaOjE5VPTmTlxf3b5u4bXez
jbK73IGXitfDAjvyMePpPJSKrZ6juJTYU+/sOVV0yMJfik1cSJU5VwHAZjtQIk2g
QqJFvVfWfqYR6wZIWUvONZI+5x0NvvFBXmjqyTbLb+5JzqKv2UwyVd19KEHvgjM=
=GFt6
-END PGP SIGNATURE-



[SECURITY] [DSA 2789-1] strongswan security update

2013-11-01 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2789-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 01, 2013  http://www.debian.org/security/faq
- -

Package: strongswan
Vulnerability  : Denial of service and authorization bypass
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-6075

A vulnerability has been found in the ASN.1 parser of strongSwan, an IKE
daemon used to establish IPsec protected links.

By sending a crafted ID_DER_ASN1_DN ID payload to a vulnerable pluto or
charon daemon, a malicious remote user can provoke a denial of service
(daemon crash) or an authorization bypass (impersonating a different
user, potentially acquiring VPN permissions she doesn't have).

For the oldstable distribution (squeeze), this problem has been fixed in
version 4.4.1-5.4.

For the stable distribution (wheezy), this problem has been fixed in
version 4.5.2-1.5+deb7u2.

For the testing distribution (jessie), this problem has been fixed in
version 5.1.0-3.

For the unstable distribution (sid), this problem has been fixed in
version 5.1.0-3.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBCgAGBQJSc5xJAAoJEG3bU/KmdcClvQkIAI69hEiVda/4uQt0qnz28LLT
spBuPTmn13SMIBz50ot8v1w0BtO4lM5H9DpVCUahZoJzUa/ixhQzjEpqfFnTv1YH
9TZTucpZukLoW/1dJmq6Nsr3oF/WQvPz7fXNB6c0vcD3+OMhKZX8ER1ZzW07oYIk
Pxjk6uF+F2vi1tWuZBsW6CiNx1Gqjo+ksoSKYEDh8raGDjwubN3hjGvK4RD8M++p
1R+Uh02Jq9Bkc+fJDqINQ28n0FjLbpM7gu5RGYuTTbieeDujJKgRZiRa9R/0ktTb
hAk5qnVJHSy7ZxvFYUn3dHXHGOix7N9zBxILUf6Gio939Df8s9EHj6ycV5z47Gs=
=vClG
-END PGP SIGNATURE-



[SECURITY] [DSA 2781-1] python-crypto security update

2013-10-18 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2781-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
October 18, 2013   http://www.debian.org/security/faq
- -

Package: python-crypto
Vulnerability  : PRNG not correctly reseeded in some situations
Problem type   : local
Debian-specific: no
CVE ID : CVE-2013-1445
Debian Bug : 

A cryptographic vulnerability was discovered in the pseudo random number
generator in python-crypto.

In some situations, a race condition could prevent the reseeding of the
generator when multiple processes are forked from the same parent. This would
lead it to generate identical output on all processes, which might leak
sensitive values like cryptographic keys.

For the oldstable distribution (squeeze), this problem has been fixed in
version 2.1.0-2+squeeze2.

For the stable distribution (wheezy), this problem has been fixed in
version 2.6-4+deb7u3.

For the testing distribution (jessie), this problem has been fixed in
version 2.6.1-2.

For the unstable distribution (sid), this problem has been fixed in
version 2.6.1-1.

We recommend that you upgrade your python-crypto packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBCgAGBQJSYY6gAAoJEG3bU/KmdcClrR8H/jFkzhCqg52Qyg7jpvqVmCT2
7Xc5xbkfk9zB7DNKrFD16ORnI4NzaWrj56mVz7ZkG/R1yHD8xM7m0Xb2m//EKDMu
Of2YdHqmT0T4T1qZ85Se6uAlnzbwzgz3URdBsFQzKFJ59/2khzm4noZlw60OBc/J
1iWGbFu6fnMPjTrv4x3IrJohrXEK5wX8bCKx5XPHA3x7X5M1nUlHu87Oen6cFZYU
8IIc9+zj5R9j2QT4vb+UMxVkrDN6d54qQ8xYNRLpIySfasNDqStEq+8g8lLr/Jcr
l9IqgKPeqaRoEyHMAF8AMV/+JIzvejwNioWgOzTIv4JSuLLlPCXG05y5fhsY1ns=
=uR3G
-END PGP SIGNATURE-



[SECURITY] [DSA 2757-1] wordpress security update

2013-09-16 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2757-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
September 14, 2013 http://www.debian.org/security/faq
- -

Package: wordpress
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-4338 CVE-2013-4339 CVE-2013-4340 CVE-2013-5738 
 CVE-2013-5739
Debian Bug : 722537

Several vulnerabilities were identified in Wordpress, a web blogging
tool. As the CVEs were allocated from releases announcements and specific
fixes are usually not identified, it has been decided to upgrade the
Wordpress package to the latest upstream version instead of backporting
the patches.

This means extra care should be taken when upgrading, especially when
using third-party plugins or themes, since compatibility may have been
impacted along the way.  We recommend that users check their install
before doing the upgrade.

CVE-2013-4338

Unsafe PHP unserialization in wp-includes/functions.php could cause
arbitrary code execution.

CVE-2013-4339

Insufficient input validation could result in redirecting or leading
a user to another website.

CVE-2013-4340

Privilege escalation allowing an user with an author role to create
an entry appearing as written by another user.

CVE-2013-5738

Insufficient capabilities were required for uploading .html/.html
files, making it easier for authenticated users to conduct cross-site
scripting attacks (XSS) using crafted html file uploads.

CVE-2013-5739

Default Wordpress configuration allowed file upload for .swf/.exe
files, making it easier for authenticated users to conduct cross-site
scripting attacks (XSS).

For the oldstable distribution (squeeze), these problems have been fixed in
version 3.6.1+dfsg-1~deb6u1.

For the stable distribution (wheezy), these problems have been fixed in
version 3.6.1+dfsg-1~deb7u1.

For the testing distribution (jessie), these problems have been fixed in
version 3.6.1+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 3.6.1+dfsg-1.

We recommend that you upgrade your wordpress packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)

iQEcBAEBCgAGBQJSNCi5AAoJEG3bU/KmdcCl3mgH/0jQvSeOoHHastL2/ELArLoh
ZZs99SSj7fqU3DC36EyEW0m+Pe81OlML793RlRxjAcYgv2VxIvFgFuUpMUZ+y1eC
ZnJgxyI6mU6qrZ+2sCRp72Rp+6M9X2Hp8wkfgozrBIYhaQikeJTpy/Z9LZmUnQXh
pdTqNCIBHfXfUcXxkHT002RuRdK9m4ROI7sh7qMFJfS1YoKM+dW9ys0mPIXQ07Qd
kZjDOb7Arn7c5QxcpEEJTgVYettJyXvupll4JkhLPvePYTkYnE4scn3P58GfGNAp
PXLi1c4ed9/KZIOSLWE0qmXARjIBvw28Etc1vudX5pFNvEJQmboSfomZzy8t7VE=
=gyM6
-END PGP SIGNATURE-



[SECURITY] [DSA 2718-1] wordpress security update

2013-07-03 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2718-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
July 01, 2013  http://www.debian.org/security/faq
- -

Package: wordpress
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-2173 CVE-2013-2199 CVE-2013-2200 CVE-2013-2201 
 CVE-2013-2202 CVE-2013-2203 CVE-2013-2204 CVE-2013-2205
Debian Bug : 713947

Several vulnerabilities were identified in Wordpress, a web blogging
tool. As the CVEs were allocated from releases announcements and
specific fixes are usually not identified, it has been decided to
upgrade the Wordpress package to the latest upstream version instead of
backporting the patches.

This means extra care should be taken when upgrading, especially when
using third-party plugins or themes, since compatibility may have been
impacted along the way.  We recommend that users check their install
before doing the upgrade.

CVE-2013-2173

A denial of service was found in the way wordpress performs hash
computation when checking password for protected posts. An attacker
supplying carefully crafted input as a password could make the
platform use excessive CPU usage

CVE-2013-2199

Multiple server-side requests forgery (SSRF) vulnerabilities were
found in the HTTP API. This is related to CVE-2013-0235, which was
specific to SSRF in pingback requests and was fixed in 3.5.1

CVE-2013-2200

 Inadequate checking of a user's capabilities could lead to a
 privilege escalation, enabling them to publish posts when their
 user role should not allow for it and to assign posts to other
 authors

CVE-2013-2201

Multiple cross-side scripting (XSS) vulnerabilities due to badly
escaped input were found in the media files and plugins upload forms

CVE-2013-2202

XML External Entity Injection (XXE) vulnerability via oEmbed
responses

CVE-2013-2203

A Full path disclosure (FPD) was found in the file upload mechanism.
If the upload directory is not writable, the error message returned
includes the full directory path

CVE-2013-2204

Content spoofing via flash applet in the embedded tinyMCE media
plugin

CVE-2013-2205

Cross-domain XSS in the embedded SWFupload uploader

For the oldstable distribution (squeeze), these problems have been fixed in
version 3.5.2+dfsg-1~deb6u1.

For the stable distribution (wheezy), these problems have been fixed in
version 3.5.2+dfsg-1~deb7u1.

For the testing distribution (jessie), these problems have been fixed in
version 3.5.2+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 3.5.2+dfsg-1.

We recommend that you upgrade your wordpress packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)

iQEcBAEBCgAGBQJR0y8CAAoJEG3bU/KmdcClIFwH/R0n5bxsMTIoNlVpZKZwY3/T
LMZmw1L7qMV1a32mj4xHRcpAFrHsvSy/aPOedh/9cFGyJ9GJ9UywDlmc/sJjgsHa
q4BaxsMEiwF+r5k3oEDstrlvE487BzVITOPX3+yYazY0wDuGINSQbdWAIUOf0HqH
AXx+0YII3M4Ct1W/p/L7LcLXj0m3i1OsbCCPqXaSKvIIhVCLkJIrrU40ejPQop3K
9i689xDmJ71QuqprxzhYIWX42Vnm8D1S1Cd4kcXyIVqrfE+WnUWqLkmp2tt00eYQ
btRhHZm5qO1EPH5jSLtFpXYl0IhWUq7w3DSlvvPed+6rPz+PGgCZbDoKQ3PruWI=
=Pm8a
-END PGP SIGNATURE-



[SECURITY] [DSA 2707-1] dbus security update

2013-06-13 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2707-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
June 13, 2013  http://www.debian.org/security/faq
- -

Package: dbus
Vulnerability  : denial of service
Problem type   : local 
Debian-specific: no
CVE ID : CVE-2013-2168

Alexandru Cornea discovered a vulnerability in libdbus caused by an
implementation bug in _dbus_printf_string_upper_bound(). This
vulnerability can be exploited by a local user to crash system services
that use libdbus, causing denial of service. Depending on the dbus
services running, it could lead to complete system crash.

The oldstable distribution (squeeze) is not affected by this problem.

For the stable distribution (wheezy), this problem has been fixed in
version 1.6.8-1+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 1.6.12-1.

For the unstable distribution (sid), this problem has been fixed in
version 1.6.12-1.

We recommend that you upgrade your dbus packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)

iQEcBAEBCgAGBQJRub9QAAoJEG3bU/KmdcClBZ0H/AyRsjX0rH4O1dARNlgtNC8r
VdJyuzlKUzEbVxD7o8PV2EDBVU58h+7cQQUvA8l3qNFEKctcfPmJzGlkfuYaZWQg
ZlTH6FUA6fYsTrE7fsUUTig/wct12UMNJm+WLkkqWfjTAgwRJpyvwEg10TzwMUYH
pyvT86nGLaRIdxILczrfA8W+jDY8Ned4pj/DsKOY9ky+IkS3p9Mq7L/kAqe91Ynd
1HhAU7+9MbUg3UrSjGF7PF4BijR7/cseUiRd0R6oEdrzxXT9kbb57UCso9LcJh76
y/UfFqyetdJqqdyFqBnASHwCE510WmXwwSqSXWTnBpiEwJy7LjaXiCcZx8Ej1wg=
=gnak
-END PGP SIGNATURE-



[SECURITY] [DSA 2665-1] strongswan security update

2013-04-30 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2665-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
April 30, 2013 http://www.debian.org/security/faq
- -

Package: strongswan
Vulnerability  : authentication bypass
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-2944

Kevin Wojtysiak discovered a vulnerability in strongSwan, an IPsec based VPN
solution.

When using the openssl plugin for ECDSA based authentication, an empty, zeroed
or otherwise invalid signature is handled as a legitimate one. An attacker
could use a forged signature to authenticate like a legitimate user and gain
access to the VPN (and everything protected by this).

While the issue looks like CVE-2012-2388 (RSA signature based authentication
bypass), it is unrelated.

For the stable distribution (squeeze), this problem has been fixed in
version 4.4.1-5.3.

For the testing distribution (wheezy), this problem has been fixed in
version 4.5.2-1.5+deb7u1.

For the unstable distribution (sid), this problem has been fixed in
version 4.6.4-7.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRf9owAAoJEG3bU/KmdcClCOUIAJrk1tERsSDSH308tjwSnI2O
7iNJGuo2euCKyp160yk2ZJlCfM+n/7j5Bu95bGzr9u7XvPzzoQD9HMdEZ3Tux/8/
FQ54pFqq/xL1btemBYaPNFr92nppiedLLV2e30OzyAvfHMwPdkRwfsU6LypG6Keb
CdljTXadZktCoBPK3hy3z5qNYzN2Ycde3GDFw8hTaYJ+1kZwuTxATpL2+O4YVB+k
ecAVf3d/YFMlHajI/e+YEP6COHV/t6dBlyYcQtAH2DHWu5lsltl5v/68ModhXNP3
rCDfu+boGL/672tuN36hcrQLb6KO7CMqXgmEVu5W2jPFBo+1RVKrQNkjxU63+ys=
=1nHw
-END PGP SIGNATURE-



[SECURITY] [DSA 2663-1] tinc security update

2013-04-23 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2663-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
April 22, 2013 http://www.debian.org/security/faq
- -

Package: tinc
Vulnerability  : stack based buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-1428

Martin Schobert discovered a stack-based vulnerability in tinc, a virtual
private network daemon.

When packets are forwarded via TCP, packet length is not checked against
the stack buffer length. Authenticated peers could use this to crash the
tinc daemon and maybe execute arbitrary code.

Note that on Wheezy and Sid, tinc is built using hardening flags and
especially stack smashing protection, which should help protect against
arbitrary code execution.

For the stable distribution (squeeze), this problem has been fixed in
version 1.0.13-1+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 1.0.19-3.

For the unstable distribution (sid), this problem has been fixed in
version 1.0.19-3.

We recommend that you upgrade your tinc packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRdaZuAAoJEG3bU/KmdcClqMIH/0gueevwYrOuGpJ3A943ZgWT
B6R7uKlvMrZshmFQX9tvzFiT9YrTC5/oADF9ujo4abeMaODUhVBoXoFOGuWKV8iV
zi3ue09NNxhE5kyA6UQpaEnbamdIegP2cKfmte/s4PePO6tTSb2VpdbqvRGonKWK
R1kah9mUOwnZpr6S2hVlyEo3xzD4I+mK/v8Zpj5fy8U63e0vt9NIcB289UO9XaK2
mKHD82C8Y/80SJktRyqWtAfBrboVaggGyHH9OssU6F9SobFSGUWFaGo4HfpcQmdy
Lr5J0eVhEOk83nUpV908lWJRm4T+i9oOWmp/MMlCWO/UxnixBLNX3XTw1Y8dXjY=
=Ctrc
-END PGP SIGNATURE-



[SECURITY] [DSA 2646-1] typo3-src security update

2013-03-18 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2646-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 15, 2013 http://www.debian.org/security/faq
- -

Package: typo3-src
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-1842 CVE-2013-1843
Debian Bug : 702574

Typo3, a PHP-based content management system, was found vulnerable to several 
vulnerabilities.

CVE-2013-1842

Helmut Hummel and Markus Opahle discovered that the Extbase database layer
was not correctly sanitizing user input when using the Query object model.
This can lead to SQL injection by a malicious user inputing crafted
relation values.

CVE-2013-1843

Missing user input validation in the access tracking mechanism could lead
to arbitrary URL redirection.
.
Note: the fix will break already published links. Upstream advisory on

http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-001/
has more information on how to mitigate that.

For the stable distribution (squeeze), these problems have been fixed in
version 4.3.9+dfsg1-1+squeeze8.

For the testing distribution (wheezy), these problems have been fixed in
version 4.5.19+dfsg1-5.

For the unstable distribution (sid), these problems have been fixed in
version 4.5.19+dfsg1-5.

We recommend that you upgrade your typo3-src packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRQ4jPAAoJEG3bU/KmdcClptwIAINmLiZvfU9dO0/hruoZYM/y
fSH9+7JXU44hCClEmiM5NxRv5g5Lz7YZ3EUvz8jn9jzVojfsxEu4rtmdkjgUT2FC
c0W8D5pTcObgxPqburZKmDn8SAytUJrejC2e8c1jyG8y06e9gulpBj3ziVREIQ50
YnPHUBgX4ePDfPm1CLAApXjxUPsYMkr11rDDcbv6wyknLxhrCO9+mmQ4aWJFuhvr
kbIimDeFvuv507RJVq8t270tN9g96Yh5e1WQ1y861UJT+oSQjHywfDEFIPF0z6Q0
f0cA37JdKEGHA8Fri5r81MY1iCorCt3P4421jAflmNcBQLbGPoPePZk2li5Xo6E=
=tSil
-END PGP SIGNATURE-



[SECURITY] [DSA 2649-1] lighttpd security update

2013-03-18 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2649-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 15, 2013 http://www.debian.org/security/faq
- -

Package: lighttpd
Vulnerability  : fixed socket name in world-writable directory
Problem type   : local
Debian-specific: yes
CVE ID : CVE-2013-1427
Debian Bug : 

Stefan Bühler discovered that the Debian specific configuration file for
lighttpd webserver FastCGI PHP support used a fixed socket name in the
world-writable /tmp directory. A symlink attack or a race condition could be
exploited by a malicious user on the same machine to take over the PHP control
socket and for example force the webserver to use a different PHP version.

As the fix is in a configuration file lying in /etc, the update won't be
enforced if the file has been modified by the administrator. In that case, care
should be taken to manually apply the fix.

For the stable distribution (squeeze), this problem has been fixed in
version 1.4.28-2+squeeze1.3.

For the testing distribution (wheezy), this problem has been fixed in
version 1.4.31-4.

For the unstable distribution (sid), this problem has been fixed in
version 1.4.31-4.

We recommend that you upgrade your lighttpd packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRQ5OpAAoJEG3bU/KmdcClChwH+gIPrukTLA2IOjdgXBPiRhS6
46rJ1yGtoSMscVeJ9ILgT5wWjj+wFiYf5cfgWUUqjfCq3TcOEXtioul3rCShq4ht
zS+tp8CqltN80ZjXNzLV9X8ijvJ8tZyVRGFe+uroQSM3CUELU3Ykkeu7hr5EgQPE
B8PvrOhrvnPcPUZG4m9Dh92BDfbzv2CRWY51KH6t1/ZZNUHTH208hwENpsOeut3X
EbOGJzXgxWyWJCylnAc4Cp8WwCx36hhAU54msMyQxKu2NscGq8a4fmD3/uG98UjT
dDD/UlcDGh35OT/+plP5QWnG7ZLCUfTJlAG352DiaV9zegVBJE3f74nbAuKLJI8=
=CgMg
-END PGP SIGNATURE-



[SECURITY] [DSA 2650-1] libvirt-bin security update

2013-03-18 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2650-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 15, 2013 http://www.debian.org/security/faq
- -

Package: libvirt-bin
Vulnerability  : files and device nodes ownership change to kvm group
Problem type   : local
Debian-specific: yes
CVE ID : CVE-2013-1766
Debian Bug : 701649

Bastian Blank discovered that libvirtd, a daemon for management of virtual
machines, network and storage, would change ownership of devices files so they
would be owned by user `libvirt-qemu` and group `kvm`, which is a general
purpose group not specific to libvirt, allowing unintended write access to
those devices and files for the kvm group members.

For the stable distribution (squeeze), this problem has been fixed in
version 0.8.3-5+squeeze4.

For the testing distribution (wheezy), this problem has been fixed in
version 0.9.12-11.

For the unstable distribution (sid), this problem has been fixed in
version 0.9.12-11.

We recommend that you upgrade your libvirt-bin packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRQ5bcAAoJEG3bU/KmdcClnRUIAJTyuyXmpTUy3duydnI1HD41
fePPjp4JigdxwWNQKW87r/UMkAN237TfIselmSLtTEDxmnwvVedTXBg4KMbwrPNi
lyRdHCAH80EJjNWD5K293XUr9nFzvcHLEzPh6SJaIryP2IUGQWMD1zYLHmBm6Mxt
TG68imPzm/3jKpmqiieaEE4geZoo8qdKX2Xjtvyl6kTAkXKr2Xx/xuFeoaPhEnDz
MbAjJiC0FsNQCH1wrT9cibKpqSzSmtqy0TJGycrnLpDnmrxr6Axjp3eFZvShdPDu
RPS7jD3CKCrtox0j4gjqUrIrYfaleQ0CqcU3/1HbdCcSIIT89E+l7BJ5nvoekaY=
=qKiJ
-END PGP SIGNATURE-



[SECURITY] [DSA 2650-2] libvirt regression update

2013-03-18 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2650-2   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 17, 2013 http://www.debian.org/security/faq
- -

Package: libvirt
Vulnerability  : files and device nodes ownership change to kvm group
Problem type   : local
Debian-specific: yes
CVE ID : CVE-2013-1766
Debian Bug : 701649

The recent security update for libvirt was found to cause a regression.
The kvm/qemu processes weren't run as the `kvm` user anymore in order to
fix the file/device ownership changes, but the processes where not
correctly configured to use the `kvm` group either. When the user would
try to run a virtual machine, the process was denied access to the
/dev/kvm device node, preventing the virtual machine to run.

For the stable distribution (squeeze), this problem has been fixed in
version 0.8.3-5+squeeze5.

We recommend that you upgrade your libvirt packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRRj1OAAoJEG3bU/KmdcCltXgH/15HV8NfOc8zjnHfbmGoG0ZV
ihcLP6zdBOlrdnfl54sGyGXWh2Gw95O8anrYuIUPSlduhHh5XxNXq2nl/+qYORo5
ltpFp82dQuUz0B93QuQ8bYyg6BfM7pXE8G7FkWYbPvd6LzAOp8F1ldTjLwLjWDLP
tFQ+YoNK+IW8ZxB7cXxO/szgdblby4ZwHS2tUfNB4+J1/+pwdxKcEoHf43ap528q
brEbFq5EcFqPAxnY7f127J5zyFjX6BM/+NmEgNb4NiVW4JqeBguHOed0XmTAIFwt
RIzt/kipO/GVGbtk2faMyrTZOvxchq1Kq2wnCgFGJTkP9rS0g44JlnIdIkqqVck=
=+lg6
-END PGP SIGNATURE-



[SECURITY] [DSA 2645-1] inetutils security update

2013-03-15 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2645-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 14, 2013 http://www.debian.org/security/faq
- -

Package: inetutils
Vulnerability  : denial of service
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2010-2529
Debian Bug : 

Ovidiu Mara reported in 2010 a vulnerability in the ping util, commonly used by
system and network administrators. By carefully crafting ICMP responses, an
attacker could make the ping command hangs.

For the stable distribution (squeeze), this problem has been fixed in
version 2:1.6-3.1+squeeze2.

For the testing distribution (wheezy), this problem has been fixed in
version 2:1.9-2.

For the unstable distribution (sid), this problem has been fixed in
version 2:1.9-2.

We recommend that you upgrade your inetutils packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRQj5kAAoJEG3bU/KmdcClNLwH/3/TjaieJysDhZHxV/dMiphk
9A6s25771faSoRphaaB6tq+1ktqLs1FzlnLIyWQRS/F95iQy+yhB39wJe09juh9W
udEH/VIwOSfwh7H3GYsbmPQo6c6VGLhJsphFpYrnpwTstquMcgaEvui/KMYfuAv+
Xfv52wcxp8mQH0a7aCS3ivDSy0EI1NJVhEs5YK9QRhf1Rruu8YvbgcBCxwNHRPj9
R2vPXsaRFERgqkPuBmDmA0E/clSCYI7h3AHz/4K5SD+JTHUNYL30Qv5LolZd/sVt
DVrF9vcu0quR5JMoXqAtHqG+uK6f3JJVoUlK+YMM0vaU6j3rz5uiD60lHmhiCpc=
=Ov9a
-END PGP SIGNATURE-



[SECURITY] [DSA 2643-1] puppet security update

2013-03-13 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2643-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 12, 2013 http://www.debian.org/security/faq
- -

Package: puppet
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654
 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275
Debian Bug :

Multiple vulnerabilities were discovered in Puppet, a centralized
configuration management system.

CVE-2013-1640

An authenticated malicious client may request its catalog from the puppet
master, and cause the puppet master to execute arbitrary code. The puppet
master must be made to invoke the `template` or `inline_template` functions
during catalog compilation.

CVE-2013-1652

An authenticated malicious client may retrieve catalogs from the puppet
master that it is not authorized to access. Given a valid certificate and
private key, it is possible to construct an HTTP GET request that will
return a catalog for an arbitrary client.

CVE-2013-1653

An authenticated malicious client may execute arbitrary code on Puppet
agents that accept kick connections. Puppet agents are not vulnerable in
their default configuration. However, if the Puppet agent is configured to
listen for incoming connections, e.g. listen = true, and the agent's
auth.conf allows access to the `run` REST endpoint, then an authenticated
client can construct an HTTP PUT request to execute arbitrary code on the
agent. This issue is made worse by the fact that puppet agents typically
run as root.

CVE-2013-1654

A bug in Puppet allows SSL connections to be downgraded to SSLv2, which is
known to contain design flaw weaknesses This affects SSL connections
between puppet agents and master, as well as connections that puppet agents
make to third party servers that accept SSLv2 connections. Note that SSLv2
is disabled since OpenSSL 1.0.

CVE-2013-1655

An unauthenticated malicious client may send requests to the puppet master,
and have the master load code in an unsafe manner. It only affects users
whose puppet masters are running ruby 1.9.3 and above.

CVE-2013-2274

An authenticated malicious client may execute arbitrary code on the
puppet master in its default configuration. Given a valid certificate and
private key, a client can construct an HTTP PUT request that is authorized
to save the client's own report, but the request will actually cause the
puppet master to execute arbitrary code.

CVE-2013-2275

The default auth.conf allows an authenticated node to submit a report for
any other node, which is a problem for compliance. It has been made more
restrictive by default so that a node is only allowed to save its own
report.

For the stable distribution (squeeze), these problems have been fixed in
version 2.6.2-5+squeeze7.

For the testing distribution (wheezy), these problems have been fixed in
version 2.7.18-3.

For the unstable distribution (sid), these problems have been fixed in
version 2.7.18-3.

We recommend that you upgrade your puppet packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRP7CzAAoJEG3bU/KmdcClzGIIAI90dF51SNHLGAIImu6vXJd2
4PII5l3AeAyL8f7HQWqVgFYrockwsCazs/vgqPdwfDEAnon2C/I4FvpehJo5hd5y
dFH01a7KYEvgG1okfiuDk+Pe3AEQsJSbBSyhA/Yw4Uix4wk508TWjvUAUMjRnUn5
yO0dB3b3hj4xgESmKtlXbHpjeQaaVOh5emXLuaV5V9mxCCN0fedIqjKxWd4vN4E9
l7hin1DzuxwkwoKeCGDOjKcSShpHAvwspTsUFZMhcU33Mu2an5j0QgPBhiQthJ1r
5uNeOYyYq+DVD0wjO++Lo2KwUayQUOriL+6y1BUvheyc/o+408/jppJ1JLjIWyg=
=Z1A4
-END PGP SIGNATURE-



[SECURITY] [DSA 2633-1] fusionforge security update

2013-02-27 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2633-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
February 26, 2013  http://www.debian.org/security/faq
- -

Package: fusionforge
Vulnerability  : privilege escalation
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-1423
Debian Bug : 

Helmut Grohne discovered multiple privilege escalation flaws in FusionForge, a
web-based project-management and collaboration software. Most of the
vulnerabilities are related to the bad handling of privileged operations on
user-controlled files or directories.

For the stable distribution (squeeze), this problem has been fixed in
version 5.0.2-5+squeeze2.

For the testing (wheezy) and unstable (sid) distribution, theses problems will
be fixed soon.

We recommend that you upgrade your fusionforge packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRLTAMAAoJEG3bU/KmdcCl43wH/jdpZlJtw7SRsWwPKrqUn8QM
ELqf89k6yjIbQt4Ex1ydrQHEFH/yX+B45oZHk6KVI9wkBbssihZRYMcbdEXcYNl5
xduZKZjJfUef4Mp1Qssac6l8NeInPqQZv8dpSS9IpU0UgDYOUayAMIelmQblpssB
m87s2Gl2gl+ufi6ESMVyDaMGBiqtAcULKyk9+0v6qCt6p+qkynMcH0e8zxoTBmAZ
SJi684GLR0o83RtAo6xRWZsgHrQ+6rkAlC45Cx0LJeHO/8RuRtd9VGTy+aZrJN1+
iuRHX4bKnR6N5xuF7mdieHKEhRgibocqMtoTQYux2aESD8idV1O6p2WwLtpX2wY=
=9m5U
-END PGP SIGNATURE-



[SECURITY] [DSA 2614-1] libupnp security update

2013-02-04 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2614-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
February 01, 2013  http://www.debian.org/security/faq
- -

Package: libupnp
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-5958 CVE-2012-5959 CVE-2012-5960 CVE-2012-5961 
 CVE-2012-5962 CVE-2012-5963 CVE-2012-5964 CVE-2012-5965
Debian Bug : 699316

Multiple stack-based buffer overflows were discovered in libupnp, a library
used for handling the Universal Plug and Play protocol. HD Moore from Rapid7
discovered that SSDP queries where not correctly handled by the
unique_service_name() function.

An attacker sending carefully crafted SSDP queries to a daemon built on libupnp
could generate a buffer overflow, overwriting the stack, leading to the daemon
crash and possible remote code execution.

For the stable distribution (squeeze), these problems have been fixed in
version 1:1.6.6-5+squeeze1.

For the testing distribution (wheezy), these problems have been fixed in
version 1:1.6.17-1.2.

For the unstable distribution (sid), these problems have been fixed in
version 1:1.6.17-1.2.

We recommend that you upgrade your libupnp packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRDOe7AAoJEG3bU/KmdcClR6sH/1tMFZTfqjzSEvU81ck6m7Fs
QD5r45u6YpCfjioo9K6RvRdQ1JqU/8R4sSnrJPVJdf7xiEtxEZJ8DG+A7nt60Dmp
iBG8RJYU0lc2KeADEiejZy02V/wGRPi+fe931X6Vpqaho6BUWEyXb0xm6qY2MV8n
FrJh8aKYjmOjH2WCGSLitsfC0BNpjc++MP9KFQPMLK6lXq68dz/rDnClWinFeEr0
fehtWrdM17az6fLUihwo9TXByH9gZmdFj/F0vlARBzkv29jUlAtu55hS3nbCJUCB
1rH0HifatkkZ2h4guMDC6SmFFHGxI+9JSz9TrfdkUtb6fwPNB4hGP8TT0GAMhag=
=MYvI
-END PGP SIGNATURE-



[SECURITY] [DSA 2615-1] libupnp4 security update

2013-02-04 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2615-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
February 01, 2013  http://www.debian.org/security/faq
- -

Package: libupnp4
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-5958 CVE-2012-5959 CVE-2012-5960 CVE-2012-5961 
 CVE-2012-5962 CVE-2012-5963 CVE-2012-5964 CVE-2012-5965
Debian Bug : 699459

Multiple stack-based buffer overflows were discovered in libupnp4, a library
used for handling the Universal Plug and Play protocol. HD Moore from Rapid7
discovered that SSDP queries where not correctly handled by the
unique_service_name() function.

An attacker sending carefully crafted SSDP queries to a daemon built on
libupnp4 could generate a buffer overflow, overwriting the stack, leading to
the daemon crash and possible remote code execution.

For the stable distribution (squeeze), these problems have been fixed in
version 1.8.0~svn20100507-1+squeeze1.

For the testing distribution (wheezy), these problems have been fixed in
version 1.8.0~svn20100507-1.2.

For the unstable distribution (sid), these problems have been fixed in
version 1.8.0~svn20100507-1.2.

We recommend that you upgrade your libupnp4 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJRDPb/AAoJEG3bU/KmdcClkHcH/3T66iE5QyeUwxE0wGNusOUX
Hu4A7ycp8f8PxBbEkU2sQgjTaZ/cDAXc5pf3/McerMBuNp7oBA4Jvmm0IHrrM3As
Lkt7f+AE1f6ixpF4OE9NfzZx2EtMDf3KhZwyGGp1BUcXXCYoQoQiFV6A8gcj1ay4
LnksPxFycFhYEs3SLmAXp4HkScQ6zAybtuC4wHI+o/LeMVg2Z94hYJ7E5SiF7iDn
/Pm+BzBAsQyQpApHG7a/wIIkfY31DFQB+Rq82nv6VOHqQUlawdcBVB2rN0SA8XMv
5rxV+eQjl5ReOYzoGr7XL7T8d5BJSHXyUfUjKWqYPGqAgRqHaRvn11WkD6OcWwQ=
=YQoc
-END PGP SIGNATURE-



[SECURITY] [DSA 2610-1] ganglia security update

2013-01-22 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2610-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
January 21, 2013   http://www.debian.org/security/faq
- -

Package: ganglia
Vulnerability  : arbitrary script execution
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-3448
Debian Bug : 683584

Insufficient input sanitization in Ganglia, a web based monitoring system,
could lead to remote PHP script execution with permissions of the user running
the web browser. 

For the stable distribution (squeeze), this problem has been fixed in
version 3.1.7-1+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 3.3.8-1.

For the unstable distribution (sid), this problem has been fixed in
version 3.3.8-1.

We recommend that you upgrade your ganglia packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJQ/aXLAAoJEG3bU/KmdcClDXQH/RPc30ViDfDhv2CqsQ7o6xuI
zhDAG0y1JJeJ8o70YDogUykzzGRZL57j9X98dcvtQGw4co65I0tGAXS+UgbSvHa0
rCBk6tY+Gv7BptcXbTkeUnspn4YgAeHbMWTEz1aT1l2oIwoKTSL66Kl++gxSR7qp
A1guGTRLW6sQDFG06Pf5Zt69W/fPZ8bhIhvJExrhXwzfn9WioNxetVdjSP/Ebc/c
OPMCQ6X9Yk3fA8sJ1ZPdNz1aBE/JuJhVBMv0At07IxKdi8AHhIoATX6jT/YSJqYP
oAGsk89Jrs4NmStfTMes0sENOtxa7SvIFPZfSD6/v8LjaQMiOmiV1wSl9BgA+AA=
=uUVF
-END PGP SIGNATURE-



[SECURITY] [DSA 2611-1] movabletype-opensource security update

2013-01-22 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2611-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
January 22, 2013   http://www.debian.org/security/faq
- -

Package: movabletype-opensource
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-0209
Debian Bug : 697666

An input sanitation problem has been found in upgrade functions of
movabletype-opensource, a web-based publishing platform. Using carefully
crafted requests to the mt-upgrade.cgi file, it would be possible to inject OS
command and SQL queries.

For the stable distribution (squeeze), this problem has been fixed in
version 4.3.8+dfsg-0+squeeze3.

For the testing distribution (wheezy), this problem has been fixed in
version 5.1.2+dfsg-1.

For the unstable distribution (sid), this problem has been fixed in
version 5.1.2+dfsg-1.

We recommend that you upgrade your movabletype-opensource packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJQ/jMZAAoJEG3bU/KmdcClxhQH/AjkGtmqNV08gRFPbnKvAV/p
ovjbaBwCuXCwnMaYL23GCjxwJ2Ic7/jba/6f/Dnm1g6nr0T+ybbMzCjy5fQtpoQz
Nu5FMN1mfAGDQbmaruDjWcqOOdUBBv0zWAkDMCiEHJvmVyoCQxBM1/Qtrvph6gmM
SJVjd8ZkOrYZVtxEQTwxUw/um/mqKStEhlPYzMBElqYm7zXD2r3L2IrqJZz//8cm
yvYOHHVC7dwvcTgUs7bxBjkYRGTbzbynLOc13s9snOKlF7qE8BkDRuCTSzNH5BBg
wksakOGqmbjS/stTn8SsZc8tI1NHwzumJUTgOKEC7y9GwQbWzmxhw0Q9ZeNPqRo=
=Cn8s
-END PGP SIGNATURE-



[SECURITY] [DSA 2583-1] iceweasel security update

2012-12-10 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2583-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
December 08, 2012  http://www.debian.org/security/faq
- -

Package: iceweasel
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-4201 CVE-2012-4207 CVE-2012-4216 CVE-2012-5829 
 CVE-2012-5842
Debian Bug : 

Multiple vulnerabilities have been found in Iceweasel, the Debian web browser
based on Mozilla Firefox:

CVE-2012-5829

  Heap-based buffer overflow in the nsWindow::OnExposeEvent function could
  allow remote attackers to execute arbitrary code.

CVE-2012-5842

  Multiple unspecified vulnerabilities in the browser engine could allow remote
  attackers to cause a denial of service (memory corruption and application
  crash) or possibly execute arbitrary code.

CVE-2012-4207

  The HZ-GB-2312 character-set implementation does not properly handle a ~
  (tilde) character in proximity to a chunk delimiter, which allows remote
  attackers to conduct cross-site scripting (XSS) attacks via a crafted
  document.

CVE-2012-4201

  The evalInSandbox implementation uses an incorrect context during the
  handling of JavaScript code that sets the location.href property, which
  allows remote attackers to conduct cross-site scripting (XSS) attacks or read
  arbitrary files by leveraging a sandboxed add-on.

CVE-2012-4216

  Use-after-free vulnerability in the gfxFont::GetFontEntry function allows
  remote attackers to execute arbitrary code or cause a denial of service (heap
  memory corruption) via unspecified vectors.

For the stable distribution (squeeze), these problems have been fixed in
version 3.5.16-20.

For the testing distribution (wheezy), these problems have been fixed in
version 10.0.11esr-1.

For the unstable distribution (sid), these problems have been fixed in
version 10.0.11esr-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJQwy0CAAoJEG3bU/KmdcClrKYH/2/0FoI6R7xGT0gzjgVj3FwA
7vi8PwbR6tKqu8laFe85fxUanr7Y4wfuSD9buZYMFIKv9WJZVjYVGhly9x7SnV5d
dcR20d3ggu9nOQsN6G/J5IsYHBEnaJwMG1/q15+VYlLXPhESX1qW3yZ08FhZJFm6
7hpWYRsqK2mL6DHbBvV49e5bnNrYMO9udYoWgc3XfQ3HWSHvMLCswDLb19kUvnvB
reg8r35a3iMtkuINP9MlzlHcX08aGZq4AxfnWRBWWin20EfNACw2J1kLstI1/85D
RxRilzAOmi5n2Pfwi3AtdAMmTxtLa1ZS5C0buAEEaVQgHoaxY9WnpOWF5JJGsOQ=
=lCjs
-END PGP SIGNATURE-



[SECURITY] [DSA 2584-1] iceape security update

2012-12-10 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2584-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
December 08, 2012  http://www.debian.org/security/faq
- -

Package: iceape
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-4201 CVE-2012-4207 CVE-2012-4216 CVE-2012-5829 
 CVE-2012-5842
Debian Bug : 

For the stable distribution (squeeze), these problems have been fixed in
version 2.0.11-17.

For the testing distribution (wheezy), these problems have been fixed in
version 2.7.11-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.7.11-1.

We recommend that you upgrade your iceape packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJQw0kOAAoJEG3bU/KmdcCleekH/jz8nZeU/C3XgWYtolzGRkIJ
ElCSrMWPv2wulLES/ZqtO6LgHLWA3asP5V5GXCQCO2zNhH1b46grY3VfCgvfuDr7
pY6f4EFerO3gvZoBG668iUssaHLBDxyf2hGKXpzRPFNUu4vGrOpplpueuaQbsPPa
LbxSLy1+a7jtUf/vi2SpGaaaNLH4XALgCxOaXrkEZdJI6iXYDgYepThOWIk9mFwz
mZvDFI4YxTfoIZzyyYucJ71hu2+IOiok/tVOEAdeP9aayRjFRdyqVpNBCXyS6Z54
3H93xj6TpYAS8PA307mOFmj/m2NTkp5fpe9SysZUWfHTq1K49X8OgIWGq3irJsg=
=m0Me
-END PGP SIGNATURE-



[SECURITY] [DSA 2582-1] xen security update

2012-12-07 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2582-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
December 07, 2012  http://www.debian.org/security/faq
- -

Package: xen
Vulnerability  : several
Problem type   : local
Debian-specific: no
CVE ID : CVE-2011-3131 CVE-2012-4535 CVE-2012-4537 CVE-2012-4538 
 CVE-2012-4539 CVE-2012-5510 CVE-2012-5513 CVE-2012-5514
 CVE-2012-5515
Debian Bug : 

Multiple denial of service vulnerabilities have been discovered in the xen
hypervisor. One of the issue (CVE-2012-5513) could even lead to privilege
escalation from guest to host.

Some of the recently published Xen Security Advisories (XSA 25 and 28) are not
fixed by this update and should be fixed in a future release.

CVE-2011-3131 (XSA 5): DoS using I/OMMU faults from PCI-passthrough guest

A VM that controls a PCI[E] device directly can cause it to issue DMA
requests to invalid addresses. Although these requests are denied by the
I/OMMU, the hypervisor needs to handle the interrupt and clear the 
error from
the I/OMMU, and this can be used to live-lock a CPU and potentially 
hang the
host.

CVE-2012-4535 (XSA 20): Timer overflow DoS vulnerability

A guest which sets a VCPU with an inappropriate deadline can cause an
infinite loop in Xen, blocking the affected physical CPU indefinitely.

CVE-2012-4537 (XSA 22): Memory mapping failure DoS vulnerability

When set_p2m_entry fails, Xen's internal data structures (the p2m and 
m2p
tables) can get out of sync. This failure can be triggered by unusual 
guest
behaviour exhausting the memory reserved for the p2m table. If it 
happens,
subsequent guest-invoked memory operations can cause Xen to fail an 
assertion
and crash.

CVE-2012-4538 (XSA 23): Unhooking empty PAE entries DoS vulnerability

The HVMOP_pagetable_dying hypercall does not correctly check the
caller's pagetable state, leading to a hypervisor crash.

CVE-2012-4539 (XSA 24): Grant table hypercall infinite loop DoS vulnerability

Due to inappropriate duplicate use of the same loop control variable,
passing bad arguments to GNTTABOP_get_status_frames can cause an
infinite loop in the compat hypercall handler.

CVE-2012-5510 (XSA 26): Grant table version switch list corruption vulnerability

Downgrading the grant table version of a guest involves freeing its 
status
pages. This freeing was incomplete - the page(s) are freed back to the
allocator, but not removed from the domain's tracking list. This would 
cause
list corruption, eventually leading to a hypervisor crash.

CVE-2012-5513 (XSA 29): XENMEM_exchange may overwrite hypervisor memory

The handler for XENMEM_exchange accesses guest memory without range 
checking
the guest provided addresses, thus allowing these accesses to include 
the
hypervisor reserved range.
.
A malicious guest administrator can cause Xen to crash. If the out of 
address
space bounds access does not lead to a crash, a carefully crafted 
privilege
escalation cannot be excluded, even though the guest doesn't itself 
control
the values written.

CVE-2012-5514 (XSA 30): Broken error handling in 
guest_physmap_mark_populate_on_demand()

guest_physmap_mark_populate_on_demand(), before carrying out its actual
operation, checks that the subject GFNs are not in use. If that check 
fails,
the code prints a message and bypasses the gfn_unlock() matching the
gfn_lock() carried out before entering the loop.
.
A malicious guest administrator can then use it to cause Xen to hang.

CVE-2012-5515 (XSA 31): Several memory hypercall operations allow invalid 
extent order values

Allowing arbitrary extent_order input values for 
XENMEM_decrease_reservation,
XENMEM_populate_physmap, and XENMEM_exchange can cause arbitrarily long 
time
being spent in loops without allowing vital other code to get a chance 
to
execute. This may also cause inconsistent state resulting at the 
completion
of these hypercalls.

For the stable distribution (squeeze), these problems have been fixed in
version 4.0.1-5.5.

For the testing distribution (wheezy), these problems have been fixed in
version 4.1.3-6.

For the unstable distribution (sid), these problems have been fixed in
version 4.1.3-6.

We recommend that you upgrade your xen packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http

[SECURITY] [DSA 2581-1] mysql-5.1 security update

2012-12-04 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2581-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
December 04, 2012  http://www.debian.org/security/faq
- -

Package: mysql-5.1
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-3150 CVE-2012-3158 CVE-2012-3160 CVE-2012-3163 
 CVE-2012-3166 CVE-2012-3167 CVE-2012-3173 CVE-2012-3177
 CVE-2012-3180 CVE-2012-3197 CVE-2012-5611
Debian Bug : 690778 695001

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to a new upstream version,
5.1.66, which includes additional changes, such as performance improvements and
corrections for data loss defects.  These changes are described in the MySQL
release notes at: http://dev.mysql.com/doc/refman/5.1/en/news-5-1-66.html

For the testing distribution (wheezy) and unstable distribution (sid), these
problems have been fixed in version 5.5.28+dfsg-1.

Additionally, CVE-2012-5611 has been fixed in this upload. The vulnerability
(discovered independently by Tomas Hoger from the Red Hat Security Response
Team and king cope) is a stack-based buffer overflow in acl_get() when
checking user access to a database. Using a carefully crafted database name, an
already authenticated MySQL user could make the server crash or even execute
arbitrary code as the mysql system user.

For the stable distribution (squeeze), this problem has been fixed in version
5.1.66-0+squeeze1.

For the testing distribution (wheezy) and unstable distribution (sid), this
problem will be fixed soon.

We recommend that you upgrade your mysql-5.1 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJQvZ/WAAoJEG3bU/KmdcClarEIAJ9nKbUELxjb1eksmEGOXkYr
x2WM+6XPVAN+4JKwwFyXCNYJbTPG5J3EM090YguqfnoWvVHZaPbcciymDOyNwPh3
x9Dm7lBNla2/fPvgEsA8enGaQdIrHnOy13Lj4e4Mu/3g1nSBp0eGZIVT6TVy9BJO
Hiqds0BZDqHuG/SGtWNsMLs6dMH4iYVcvcK3NFyFh6zt8O73Cbe0xIYDDuwO0uwj
HoUk6WxK2qs7auir+XkAShdQAj7KjL7Zs3LmLPaH1oUKvRD/IYJw14NRkdeU8CC5
Jz9sdTICSYxYe11zITXYdF4UYRLpF7W8jW6WDPM5kkZWPTjtUkUB0jcdeFQP6v4=
=D3mt
-END PGP SIGNATURE-



[SECURITY] [DSA 2577-1] libssh security update

2012-12-03 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2577-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
December 01, 2012  http://www.debian.org/security/faq
- -

Package: libssh
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-4559 CVE-2012-4561 CVE-2012-4562
Debian Bug  

Multiple vulnerabilities were discovered in libssh by Florian Weimer and Xi
Wang:

CVE-2012-4559: multiple double free() flaws
CVE-2012-4561: multiple invalid free() flaws
CVE-2012-4562: multiple improper overflow checks

Those could lead to a denial of service by making an ssh client linked to
libssh crash, and maybe even arbitrary code execution.

For the stable distribution (squeeze), these problems have been fixed in
version 0.4.5-3+squeeze1.

For the testing distribution (wheezy), these problems have been fixed in
version 0.5.3-1.

For the unstable distribution (sid), these problems have been fixed in
version 0.5.3-1.

We recommend that you upgrade your libssh packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJQuhCHAAoJEG3bU/KmdcClhN8H/2WeI/NZK6IvKI3JKRniLQxn
Z4RnjjW1au4yZ4b32+qVpLYQ0m8v5kuT5jR2geN95ZXCqk4iY4Jzg38iC1b2CPT5
8hs8y8uvzHwTgia/Rvi4fb9JnDun7bOn3ZInTGkSPpMx+bK38hRKLJ3BOzHsIfwD
WbLlm+Emhd+MJLj3GWoTudd/2wift1ATN7vQG+Dy+budAu9sVv2g3d3fvHGo9ggG
L6XCPRFzONwMgQT6jAwi2GcZYzJ8xK7KP4ELzjnf5yMKxuz2l026mhFK1JwErfWy
N/Rit3gcQ4hek+VSM9JCC5l9lzkvzE6Ldkc1CZu+kkU1Itt2Lez6zfwIJVdYRdc=
=pMqn
-END PGP SIGNATURE-



Re: [oss-security] Re: [Full-disclosure] MySQL (Linux) Stack based buffer overrun PoC Zeroday

2012-12-03 Thread Yves-Alexis Perez
On dim., 2012-12-02 at 21:17 +0100, king cope wrote:
 My opinion is that the FILE to admin privilege elevation should be patched.
 What is the reason to have FILE and ADMIN privileges seperated when
 with this exploit
 FILE privileges equate to ALL ADMIN privileges. 

Maybe because you might not want admins to have read/write access to the
filesystem anyway?

Regards,
-- 
Yves-Alexis


signature.asc
Description: This is a digitally signed message part


[SECURITY] [DSA 2578-1] rssh security update

2012-11-28 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2578-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 28, 2012  http://www.debian.org/security/faq
- -

Package: rssh
Vulnerability  : insufficient filtering of rsync command line
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-2251 CVE-2012-2252 
Debian Bug : 

James Clawson discovered that rssh, a restricted shell for OpenSSH to be used
with scp/sftp, rdist and cvs, was not correctly filtering command line options.
This could be used to force the execution of a remote script and thus allow
arbitrary command execution. Two CVE were assigned:

CVE-2012-2251
Incorrect filtering of command line when using rsync protocol. It was
for example possible to pass dangerous options after a -- switch. The 
rsync
protocol support has been added in a Debian (and Fedora/Red Hat) 
specific
patch, so this vulnerability doesn't affect upstream.

CVE-2012-2251
Incorrect filtering of the --rsh option: the filter preventing usage 
of the
--rsh= option would not prevent passing --rsh. This vulnerability 
affects
upstream code.

For the stable distribution (squeeze), this problem has been fixed in
version 2.3.2-13squeeze2.

For the testing distribution (wheezy), this problem has been fixed in
version 2.3.3-6.

For the unstable distribution (sid), this problem has been fixed in
version 2.3.3-6.

We recommend that you upgrade your rssh packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJQtUm5AAoJEG3bU/KmdcCl+mYH/i+Qu3RJaGkNZhz0JphBAMvT
L2g1dbzNQOAePwvo69XIhNuAVAAqltV2N/GRvdlBORR7/W1NO9QOBodPwTkf4N9e
enl9z9+Wxb9Z1NgRCkAjTd6rkdzxFPpAzTe4uF4WfUH306lbTDHZyR3KZgEFqOdS
/16vbWoQ2QYz/hjIdlQI4GArBL+AZ5Fucq5oFqb5VcXv63Yi0U9qTliYH4iO/rzf
CkDbm7cdD7bO7LbshEqC+Cz1khVDfIG/KakzByxoNgcvMCoyhE5v8QNp6qnCPf3U
2yZ+8X5rm3on0j6YUF7+qeBTcLSAinHY+6Qzq9r+T7/xa77N+NGWUmW18EkYup8=
=Rfew
-END PGP SIGNATURE-



[SECURITY] [DSA 2576-1] trousers security update

2012-11-23 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2576-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 23, 2012  http://www.debian.org/security/faq
- -

Package: trousers
Vulnerability  : denial of service
Problem type   : local
Debian-specific: no
CVE ID : CVE-2012-0698
Debian Bug : 692649

Andy Lutomirski discovered that tcsd (the TPM userspace daemon) was missing a
of input validation. Using carefully crafted input, it can lead to a denial of
service by making the daemon crash with a segmentation fault.

For the stable distribution (squeeze), this problem has been fixed in
version 0.3.5-2+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 0.3.9-1.

For the unstable distribution (sid), this problem has been fixed in
version 0.3.9-1.

We recommend that you upgrade your trousers packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQEcBAEBCgAGBQJQrxduAAoJEG3bU/KmdcCl5NsH/0lRow6hryWbDPJ1/pnKgh2D
DYdlyHoOyd16L1070p4I0lwTjUiOHDOkKpzURLypCjRXCwTi3SnZEof9PzOa+u2A
BOLonQKwaDth2Z10YrcNv/u8+XjKHqBuT1H9HPYg24aSPRwY2jCkrDas6HrOsj4X
/WNV5UeJe/VvtDpIl24Ce9CC8QRMWBTtaUi02upelgjd0HAChoZxvXmL0qdN8h7f
CgXSpk8pcstU51lcH9/5C6zD6X0ej2O1yd8ddz4f4mllr0jm/aN0qGARS6y41Fiz
+/Rv5DkR1am1482qP/FLbB/43I4LwrPXrfZIMDkYPnK0jqav2+D9s/MeX0Kj3Ag=
=0xCk
-END PGP SIGNATURE-



[SECURITY] [DSA 2570-1] openoffice.org security update

2012-11-01 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2570-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
October 31, 2012   http://www.debian.org/security/faq
- -

Package: openoffice.org
Vulnerability  : remote
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-4233
Debian Bug : 

High-Tech Bridge SA Security Research Lab discovered multiple null-pointer
dereferences based vulnerabilities in OpenOffice which could cause
application crash or even arbitrary code execution using specially crafted
files. Affected file types are LWP (Lotus Word Pro), ODG, PPT (MS Powerpoint
2003) and XLS (MS Excel 2003).

For the stable distribution (squeeze), this problem has been fixed in
version 1:3.2.1-11+squeeze8.

openoffice.org package has been replaced by libreoffice in testing (wheezy)
and unstable (sid) distributions.

For the testing distribution (wheezy), this problem has been fixed in
version 1:3.5.4+dfsg-3.

For the unstable distribution (sid), this problem has been fixed in
version 1:3.5.4+dfsg-3.

We recommend that you upgrade your openoffice.org packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQIcBAEBCgAGBQJQkYwEAAoJEDBVD3hx7wuoofcQAL40FW6uvEF8FQxJN1Sz46qK
+9or2c+iRRF3eDuOBEHgECw0Knas33m/sLYIt2w7wywTLpO4FNgggeJXRY5P57oo
I2EFo4ZnHSCa/kYGNkE6NuE+ZCDDJ8og+d8G7TxHbHMpWJXxWneEKlXhqB1nT0WQ
t7TboxKXItxj82ezYClehkXCbK1v0t10rZipagwq7aZ5DPxSJ4GTBbFaJ96NLPqk
aAZKO+yik+g+zFpy3y7EYPXseiTsW68pHQS+W/SvK6iTIHGHgKgZCFAlTAtVyQ//
Vs82HkLWzGl/Bcm5o/Vght0rc0ZAEUBfpTiDfVTkAlmniao03YKD7wr3Ieqm9PXD
hXgSy8x10DoLoZbdYPKG6M6To0jO4+8VidLd5nY48+TK//p3ZEEABuY5PP+OFIyI
7+vcLLvL/VeHguLJuKDqoK24YVsebCK6laNxIehtbvvJWz6qZzj7SfieVrVeaSgB
62XDCghfrhIlV23W/U85e0QRcEKbLzGxw1JFcbwmZh/7QMO3MixYvI9JJ7TQt/1r
9ZOqbfPiBVHzA0vEh5PK+L1C3idyh9pOT0Aoo9ZfTLt09P4CtWd3HTFZ8L+reaOi
pWzV4REyhhFYo+4BsAgb4cT6fTW9x0Qh0P9b0rLWv2dCtqmpktKkVoXXzfCz/Pqp
rKYAuypU8eo4B+Jq2O+p
=hToM
-END PGP SIGNATURE-



[SECURITY] [DSA 2559-1] libexif security update

2012-10-17 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2559-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
October 11, 2012   http://www.debian.org/security/faq
- -

Package: libexif
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-2812 CVE-2012-2813 CVE-2012-2814 CVE-2012-2836 
 CVE-2012-2837 CVE-2012-2840 CVE-2012-2841
Debian Bug : 681454

Several vulnerabilities were found in libexif, a library used to parse EXIF
meta-data on camera files.

CVE-2012-2812: A heap-based out-of-bounds array read in the
exif_entry_get_value function allows remote attackers to cause a denial of
service or possibly obtain potentially sensitive information from process
memory via an image with crafted EXIF tags.

CVE-2012-2813: A heap-based out-of-bounds array read in the
exif_convert_utf16_to_utf8 function allows remote attackers to cause a denial
of service or possibly obtain potentially sensitive information from process
memory via an image with crafted EXIF tags. 

CVE-2012-2814: A buffer overflow in the exif_entry_format_value function
allows remote attackers to cause a denial of service or possibly execute
arbitrary code via an image with crafted EXIF tags.

CVE-2012-2836: A heap-based out-of-bounds array read in the
exif_data_load_data function allows remote attackers to cause a denial of
service or possibly obtain potentially sensitive information from process
memory via an image with crafted EXIF tags.

CVE-2012-2837: A divide-by-zero error in the mnote_olympus_entry_get_value
function while formatting EXIF maker note tags allows remote attackers to
cause a denial of service via an image with crafted EXIF tags.

CVE-2012-2840: An off-by-one error in the exif_convert_utf16_to_utf8 function
allows remote attackers to cause a denial of service or possibly execute
arbitrary code via an image with crafted EXIF tags. 

CVE-2012-2841: An integer underflow in the exif_entry_get_value function can
cause a heap overflow and potentially arbitrary code execution while
formatting an EXIF tag, if the function is called with a buffer size
parameter equal to zero or one.

For the stable distribution (squeeze), these problems have been fixed in
version 0.6.19-1+squeeze1.

For the testing distribution (wheezy), these problems have been fixed in
version 0.6.20-3.

For the unstable distribution (sid), these problems have been fixed in
version 0.6.20-3.

We recommend that you upgrade your libexif packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=Fb7l
-END PGP SIGNATURE-



[SECURITY] [DSA 2554-1] iceape security update

2012-09-27 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2554-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
September 26, 2012 http://www.debian.org/security/faq
- -

Package: iceape
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-1970 CVE-2012-1972 CVE-2012-1973 CVE-2012-1974 
 CVE-2012-1975 CVE-2012-1976 CVE-2012-3959 CVE-2012-3962
 CVE-2012-3969 CVE-2012-3972 CVE-2012-3978

Several vulnerabilities have been discovered in Iceape, an internet suite based
on Seamonkey.

The reported vulnerabilities could lead to the execution of arbitrary
code or the bypass of content-loading restrictions via the location
object.

For the stable distribution (squeeze), these problems have been fixed in
version 2.0.11-15.

For the testing distribution (wheezy), these problems have been fixed in
version 2.7.7-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.7.7-1.

We recommend that you upgrade your iceape packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=wRJq
-END PGP SIGNATURE-



[SECURITY] [DSA 2522-1] fckeditor security update

2012-08-06 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2522-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
August 05, 2012http://www.debian.org/security/faq
- -

Package: fckeditor
Vulnerability  : cross site scripting
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-4000
Debian Bug : 683418

Emilio Pinna discovered a cross site scripting vulnerability in the
spellchecker.php page of FCKeditor, a popular html/text editor for the web.

For the stable distribution (squeeze), this problem has been fixed in
version 1:2.6.6-1squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 1:2.6.6-3.

For the unstable distribution (sid), this problem has been fixed in
version 1:2.6.6-3.

We recommend that you upgrade your fckeditor packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=rOo8
-END PGP SIGNATURE-



[SECURITY] [DSA 2520-1] openoffice.org security update

2012-08-03 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2520-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
August 01, 2012http://www.debian.org/security/faq
- -

Package: openoffice.org
Vulnerability  : Multiple heap-based buffer overflows
Problem type   : local
Debian-specific: no
CVE ID : CVE-2012-2665
Debian Bug : 

Timo Warns from PRE-CERT discovered multiple heap-based buffer overflows in
OpenOffice.org, an office productivity suite. The issues lies in the XML
manifest encryption tag parsing code. Using specially crafted files, an
attacker can cause application crash and could cause arbitrary code execution.

For the stable distribution (squeeze), this problem has been fixed in
version 3.2.1-11+squeeze7.

openoffice.org package has been replaced by libreoffice in testing (wheezy) and
unstable (sid) distributions.

For the testing distribution (wheezy), this problem has been fixed in
version 1:3.5.4-7.

For the unstable distribution (sid), this problem has been fixed in
version 1:3.5.4-7.

We recommend that you upgrade your openoffice.org packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=ymEK
-END PGP SIGNATURE-



[SECURITY] [DSA 2518-1] krb5 security update

2012-08-01 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2518-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
July 31, 2012  http://www.debian.org/security/faq
- -

Package: krb5
Vulnerability  : denial of service and remote code execution
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-1014 CVE-2012-1015
Debian Bug : 683429

Emmanuel Bouillon from NCI Agency discovered multiple vulnerabilities in MIT
Kerberos, a daemon implementing the network authentication protocol.

CVE-2012-1014

By sending specially crafted AS-REQ (Authentication Service Request) to 
a KDC
(Key Distribution Center), an attacker could make it free an 
uninitialized
pointer, corrupting the heap.  This can lead to process crash or even 
arbitrary
code execution.
.
This CVE only affects testing (wheezy) and unstable (sid) distributions.

CVE-2012-1015

By sending specially crafted AS-REQ to a KDC, an attacker could make it
dereference an uninitialized pointer, leading to process crash or even
arbitrary code execution

In both cases, arbitrary code execution is believed to be difficult to achieve,
but might not be impossible.

For the stable distribution (squeeze), this problem has been fixed in
version 1.8.3+dfsg-4squeeze6.

For the testing distribution (wheezy), this problem has been fixed in
version 1.10.1+dfsg-2.

For the unstable distribution (sid), this problem has been fixed in
version 1.10.1+dfsg-2.

We recommend that you upgrade your krb5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=lkou
-END PGP SIGNATURE-



[SECURITY] [DSA 2508-1] kfreebsd-8 security update

2012-07-23 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2508-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
July 22, 2012  http://www.debian.org/security/faq
- -

Package: kfreebsd-8
Vulnerability  : privilege escalation
Problem type   : local
Debian-specific: no
CVE ID : CVE-2012-0217
Debian Bug : 677297

Rafal Wojtczuk from Bromium discovered that FreeBSD wasn't handling correctly
uncanonical return addresses on Intel amd64 CPUs, allowing privilege escalation
to kernel for local users.

For the stable distribution (squeeze), this problem has been fixed in
version 8.1+dfsg-8+squeeze3.

For the testing distribution (wheezy), this problem has been fixed in
version 8.3-4.

For the unstable distribution (sid), this problem has been fixed in
version 8.3-4.

We recommend that you upgrade your kfreebsd-8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=DH+Y
-END PGP SIGNATURE-



[SECURITY] [DSA 2506-1] libapache-mod-security security update

2012-07-03 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2506-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
July 02, 2012  http://www.debian.org/security/faq
- -

Package: libapache-mod-security
Vulnerability  : modsecurity bypass
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-2751
Debian Bug : #678529

Qualys Vulnerability  Malware Research Labs discovered a vulnerability in
ModSecurity, a security module for the Apache webserver. In situations where
both 'Content:Disposition: attachment' and 'Content-Type: multipart' were
present in HTTP headers, the vulernability could allow an attacker to bypass
policy and execute cross-site script (XSS) attacks through properly crafted
HTML documents.

For the stable distribution (squeeze), this problem has been fixed in
version 2.5.12-1+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 2.6.6-1.

For the unstable distribution (sid), this problem has been fixed in
version 2.6.6-1.

In testing and unstable distribution, the source package has been renamed to
modsecurity-apache.

We recommend that you upgrade your libapache-mod-security packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=3M0X
-END PGP SIGNATURE-



[SECURITY] [DSA 2498-1] dhcpcd security update

2012-06-26 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


- -
Debian Security Advisory DSA-2498-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
June 23, 2012  http://www.debian.org/security/faq
- -

Package: dhcpcd
Vulnerability  : remote stack overflow
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-2152
Debian Bug : #671265

It was discovered that dhcpcd, a DHCP client, was vulnerable to a stack
overflow. A malformed DHCP message could crash the client, causing a denial of
service, and potentially remote code execution through properly designed
malicous DHCP packets.

For the stable distribution (squeeze), this problem has been fixed in
version 1:3.2.3-5+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 1:3.2.3-11.

For the unstable distribution (sid), this problem has been fixed in
version 1:3.2.3-11.

We recommend that you upgrade your dhcpcd package.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=iUQH
-END PGP SIGNATURE-



[SECURITY] [DSA 2481-1] arpwatch security update

2012-06-04 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2481-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
June 2, 2012   http://www.debian.org/security/faq
- -

Package: arpwatch
Vulnerability  : fails to drop supplementary groups
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-2653
Debian Bug : 674715

Steve Grubb from Red Hat discovered that a patch for arpwatch (as shipped at
least in Red Hat and Debian distributions) in order to make it drop root
privileges would fail to do so and instead add the root group to the list of
the daemon uses.

For the stable distribution (squeeze), this problem has been fixed in
version 2.1a15-1.1+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 2.1a15-1.2.

For the unstable distribution (sid), this problem has been fixed in
version 2.1a15-1.2.

We recommend that you upgrade your arpwatch packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJPygvjAAoJEOxfUAG2iX57kQMH/3fZNWPAbXpbn2EYmZsZZBqc
LVBPBL+qp++Ym/dNqm/TKop0+FSVeF3rGpTq1l9HOk6BNMm2jNZvVJ9/OF6vvIZD
zTKEDtqYNbHPMapr/zU7py5Qb/XL2prFlFjfd3A5HXCeLc1dptuhlbyUVkJYjsga
P9QJMphQ5U4CiL9EYV5xM5Co6WAlR13SFrX1cBV7il+OxpGK+lUV4NckocoQk4mG
Su3ImPyCpTbxprZH5BuPjSsGqKB6M6EKIiAA7KvTPfbNyWro53WTg7fChhEJbGzO
X4nZI1eQXJLOCDyYWZekdUFGKb4OsxQPAqRmZJnrURpxB66YWIAzyipE5UfeELI=
=nMw+
-END PGP SIGNATURE-



[SECURITY] [DSA 2482-1] arpwatch security update

2012-06-04 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2482-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
June 2, 2012   http://www.debian.org/security/faq
- -

Package: libgdata
Vulnerability  : insufficient certificate validation
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-2653
Debian Bug : 664032

Vreixo Formoso discovered that libgdata, a library used to access various
Google services, wasn't validating certificates against trusted system
root CAs when using an https connection.

For the stable distribution (squeeze), this problem has been fixed in
version 0.6.4-2+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 0.10.2-1.

For the unstable distribution (sid), this problem has been fixed in
version 0.10.2-1.

We recommend that you upgrade your libgdata packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJPygyBAAoJEOxfUAG2iX57khMIAMxbExHsAKz+hHW+0OkfbfKN
IZ9JChzsA+I56DIqpUXGGw2cTFvxEjHjpDaH3JDX+zj0r7fpIhe3JvproQc6nkF0
5GVCxMglKAnL3vxLeJpLm13BdHG32W/Sa2bElZCl+Ar0s6WAFYcpjaX9VRBw3Jb+
cQ2zRQxg6UketX5w+shJkvyoqfbdo+648/qpMPiK6F+PL6j6ag/wL9pKwx8Hzy9o
PvMCdeKGslHHBHkc4cgoxDXOLV+UF8eo4pWkEj+GbGTJfs8T3DwkwDkG9bhm91mA
Fs0BUHuuvKk+bj78dz8R4KS1AElxpp4ssHmF1atbHqGfRfL4LBM0bWaf2bKpVJg=
=yPHj
-END PGP SIGNATURE-



[SECURITY] [DSA 2482-1] libgdata security update

2012-06-04 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2482-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
June 2, 2012   http://www.debian.org/security/faq
- -

Package: libgdata
Vulnerability  : insufficient certificate validation
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-2653
Debian Bug : 664032

Vreixo Formoso discovered that libgdata, a library used to access various
Google services, wasn't validating certificates against trusted system
root CAs when using an https connection.

For the stable distribution (squeeze), this problem has been fixed in
version 0.6.4-2+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 0.10.2-1.

For the unstable distribution (sid), this problem has been fixed in
version 0.10.2-1.

We recommend that you upgrade your libgdata packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJPyg+cAAoJEOxfUAG2iX570q8H/34iZgboRkiMBx82t6kaP5J+
xn0pP6ZfQqrGJUA9VeWegD3nFuNLG9LlxCmE5B+v743/+V891ctQ6UzCG2iL1xd4
z8eiij//E+2QhaZatrrd58HXBYQI+51/rPpJ3nE+5l3QxCNGwpE8P8D7dIae20SR
EFS5TJ4WzwYKt+cgEJVgPOH94l4KV69MJCDIwOYy79ZgYWT5lrfJ2pQ9Mw4mVtkg
Z8+pxZCeXhgEq7H5NrAZplfcjgxBb2ZiJG1naxmGhVNtuo2ybSuOHbGeTbOQ47q5
5ZSFKaafo+CzSOXXwWPzfPMbpRDBwPvdRZgpsKUaWbHLQwkDDNCi+xE5XRPB+Fo=
=WCiw
-END PGP SIGNATURE-



[SECURITY] [DSA 2483-1] strongswan security update

2012-05-31 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2483-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
May 31, 2012   http://www.debian.org/security/faq
- -

Package: strongswan
Vulnerability  : authentication bypass
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-2388

An authentication bypass issue was discovered by the Codenomicon CROSS
project in strongSwan, an IPsec-based VPN solution. When using
RSA-based setups, a missing check in the gmp plugin could allow an
attacker presenting a forged signature to successfully authenticate
against a strongSwan responder.

The default configuration in Debian does not use the gmp plugin for
RSA operations but rather the OpenSSL plugin, so the packages as
shipped by Debian are not vulnerable.

For the stable distribution (squeeze), this problem has been fixed in
version 4.4.1-5.2.

For the testing distribution (wheezy), this problem has been fixed in
version 4.5.2-1.4.

For the unstable distribution (sid), this problem has been fixed in
version 4.5.2-1.4.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJPx6vTAAoJEL97/wQC1SS+cFYIAIq65txOmBylguvyEIzgYsoa
EGLxDtKYf8lM78MKS1sSyoXocS9Yo3PkENEbVdcRuC8b+81+FDm+Y8VWOAoNQkwV
bzzvjDCmVKlzmmdOLBgc1On+kOpCGOL42khkIlHYiTI9qqlEmYaSpSm10h3sxzDU
xt3/1PAhPE9O8TX/Rl2au8ihLHLIV/45Ptt/QSMrErIuRInUqV4D0tNbU/M3Styf
jA9MjG2b6P+sY7CeOf22QKsBvgcmx/dvat2DzvXDcFQgq/FiG+FVuZ/AZkzh4z5u
xeQQiQUm1jreHNmAQ2UmLx/TUTRbj1xLfPReqLy/vDLgdTD2XyaoHhW38zMCNaY=
=cSz+
-END PGP SIGNATURE-



[SECURITY] [DSA 2670-1] wordpress security update

2012-05-14 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2670-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
May 11, 2012   http://www.debian.org/security/faq
- -

Package: wordpress
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-3122 CVE-2011-3125 CVE-2011-3126 CVE-2011-3127
 CVE-2011-3128 CVE-2011-3129 CVE-2011-3130 CVE-2011-4956
 CVE-2011-4957 CVE-2012-2399 CVE-2012-2400 CVE-2012-2401
 CVE-2012-2402 CVE-2012-2403 CVE-2012-2404
Debian Bug : 670124

Several vulnerabilities were identified in Wordpress, a web blogging
tool.  As the CVEs were allocated from releases announcements and
specific fixes are usually not identified, it has been decided to
upgrade the Wordpress package to the latest upstream version instead
of backporting the patches.

This means extra care should be taken when upgrading, especially when
using third-party plugins or themes, since compatibility may have been
impacted along the way.  We recommend that users check their install
before doing the upgrade.

For the stable distribution (squeeze), those problems have been fixed in
version 3.3.2+dfsg-1~squeeze1.

For the testing distribution (wheezy) and the unstable distribution
(sid), those problems have been fixed in version 3.3.2+dfsg-1.

We recommend that you upgrade your wordpress packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJPrXyJAAoJEL97/wQC1SS+4EcH/1nAhgTx17pMJF7JbWFNG2ZY
/xSD6v4MDj3pLiZrntRx4c3y+Kbx91QKBN6KgqDxyHjDLoZgoNVVGwyozGjS2VBn
m2OwnjzLUJVqd77R+mUj5h3yEVS1d4O+VcYRcpugPTaD17d90rlPGL2HkZXnQAk1
OjOKGns+yiapuLpcHmNz5cjwvJxaNe355aZlwSUjFWumqtGjQcgyJeKy1XGW0s2o
h9YnLXGRNwtihXz0P+5qx7Qwcri3PXLn1Uapp2RSJStkNfiRjSJoqUkb5wqvhT7x
O6GhUWShBF6pZ11uvOySY2yU5jPOQDufSUn6T4R5CL4hYJ6Bif6iqkHznPubHeE=
=M38G
-END PGP SIGNATURE-



[SECURITY] [DSA 2388-1] t1lib security update

2012-01-16 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2388-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
January 14, 2012   http://www.debian.org/security/faq
- -

Package: t1lib
Vulnerability  : several
Problem type   : local
Debian-specific: no
CVE ID : CVE-2010-2642 CVE-2011-0433 CVE-2011-0764 CVE-2011-1552
 CVE-2011-1553 CVE-2011-1554
Debian Bug : 652996

Several vulnerabilities were discovered in t1lib, a Postscript Type 1
font rasterizer library, some of which might lead to code execution
through the opening of files embedding bad fonts.

CVE-2010-2642
A heap-based buffer overflow in the AFM font metrics parser
potentially leads to the execution of arbitrary code.

CVE-2011-0433
Another heap-based buffer overflow in the AFM font metrics
parser potentially leads to the execution of arbitrary code.

CVE-2011-0764
An invalid pointer dereference allows execution of arbitrary
code using crafted Type 1 fonts.

CVE-2011-1552
Another invalid pointer dereference results in an application
crash, triggered by crafted Type 1 fonts.

CVE-2011-1553
A use-after-free vulnerability results in an application
crash, triggered by crafted Type 1 fonts.

CVE-2011-1554
An off-by-one error results in an invalid memory read and
application crash, triggered by crafted Type 1 fonts.

For the oldstable distribution (lenny), this problem has been fixed in
version 5.1.2-3+lenny1.

For the stable distribution (squeeze), this problem has been fixed in
version 5.1.2-3+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 5.1.2-3.3.

For the unstable distribution (sid), this problem has been fixed in
version 5.1.2-3.3.

We recommend that you upgrade your t1lib packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJPEqtaAAoJEL97/wQC1SS++s4H/1V+Q5spiTcrjuLqFrwyljqz
YtEtm2jVuZKNJwXmntLA3hpyO6cAbw7yZVfimcJagGb7Vc8PkeCR4L+U7Hl7FGk2
4QELdzlMYeM7bJdchBmrmrv0Jd7jhqAek4MMO2gMJyaNxDwnjvWpjWtf1wYzPlJ5
3kopGxF0nKf47IsFd6fFwu5mkCl+RwhG5b0JVuyPYqxr2ir64iS3rcMIxCS3yBOc
IgYhNwNW+WQaJP5MwXelLnzkKJJGmugk9SrLaazVlIRGOXu34RZfziByxbQQQCF6
jGKm2L9ZcWfkDBHsoldEyP1J3WQLNUEqyxzLEib78D/28jEiuAu0GWNCkE+sO78=
=uEYD
-END PGP SIGNATURE-



[SECURITY] [DSA 2354-1] cups security update

2011-11-30 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2354-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 28, 2011  http://www.debian.org/security/faq
- -

Package: cups
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-2896 CVE-2011-3170 

Petr Sklenar and Tomas Hoger discovered that missing input sanitising in
the GIF decoder inside the Cups printing system could lead to denial
of service or potentially arbitrary code execution through crafted GIF 
files.

For the oldstable distribution (lenny), this problem has been fixed in
version 1.3.8-1+lenny10.

For the stable distribution (squeeze), this problem has been fixed in
version 1.4.4-7+squeeze1.

For the testing and unstable distribution (sid), this problem has been
fixed in version 1.5.0-8.

We recommend that you upgrade your cups packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk7WagQACgkQXm3vHE4uylpgngCgy+xPdr3SGtgK+5zLkrIm2fHE
YdEAoJP3bofxwm/6M+akx0DSTXnRC183
=aY5X
-END PGP SIGNATURE-



[SECURITY] [DSA 2336-1] ffmpeg security update

2011-11-08 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2336-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 07, 2011  http://www.debian.org/security/faq
- -

Package: ffmpeg
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-3362 CVE-2011-3973 CVE-2011-3974 CVE-2011-3504
Debian Bug : 641478

Multiple vulnerabilities were found in the ffmpeg, a multimedia player,
server and encoder:

CVE-2011-3362

An integer signedness error in decode_residual_block function of 
the Chinese AVS video (CAVS) decoder in libavcodec can lead to 
denial of service (memory corruption and application crash) or 
possible code execution via a crafted CAVS file.

CVE-2011-3973/CVE-2011-3974

Multiple errors in the Chinese AVS video (CAVS) decoder can lead to 
denial of service (memory corruption and application crash) via an 
invalid bitstream.

CVE-2011-3504

A memory allocation problem in the Matroska format decoder can lead 
to code execution via a crafted file.

For the stable distribution (squeeze), this problem has been fixed in
version 4:0.5.5-1.

For the unstable distribution (sid), this problem has been fixed in
version 4:0.7.2-1 of the libav source package.

Security support for ffmpeg has been discontinued for the oldstable
distribution (lenny) before in DSA 2306.
The current version in oldstable is not supported by upstream anymore
and is affected by several security issues. Backporting fixes for these
and any future issues has become unfeasible and therefore we needed to
drop our security support for the version in oldstable.

We recommend that you upgrade your ffmpeg packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk64LoAACgkQXm3vHE4uylp5JQCgrx+SilXzFZxZ+hwHIQqUfd6d
klwAoLFQFIUCtJ1HIDafZoJyj1QmZebU
=Or5C
-END PGP SIGNATURE-



[SECURITY] [DSA 2323-1] radvd security update

2011-10-28 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2323-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
October 26, 2011   http://www.debian.org/security/faq
- -

Package: radvd
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-3602 CVE-2011-3604 CVE-2011-3605
Debian Bug : 644614

Multiple security issues were discovered by Vasiliy Kulikov in radvd, an 
IPv6 Router Advertisement daemon:

CVE-2011-3602

   set_interface_var() function doesn't check the interface name, which is
   chosen by an unprivileged user. This could lead to an arbitrary file
   overwrite if the attacker has local access, or specific files overwrites
   otherwise.

CVE-2011-3604

   process_ra() function lacks multiple buffer length checks which could
   lead to memory reads outside the stack, causing a crash of the daemon.

CVE-2011-3605

   process_rs() function calls mdelay() (a function to wait for a defined
   time) unconditionnally when running in unicast-only mode. As this call
   is in the main thread, that means all request processing is delayed (for
   a time up to MAX_RA_DELAY_TIME, 500 ms by default). An attacked could
   flood the daemon with router solicitations in order to fill the input
   queue, causing a temporary denial of service (processing would be
   stopped during all the mdelay() calls).
   Note: upstream and Debian default is to use anycast mode.


For the oldstable distribution (lenny), this problem has been fixed in
version 1:1.1-3.1.

For the stable distribution (squeeze), this problem has been fixed in
version 1:1.6-1.1.

For the testing distribution (wheezy), this problem has been fixed in
version 1:1.8-1.2.

For the unstable distribution (sid), this problem has been fixed in
version 1:1.8-1.2.

We recommend that you upgrade your radvd packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk6q2QcACgkQXm3vHE4uylqlEQCgpdFwHzpKLF6KHlJs4y/ykeo/
oEYAniJXFaff25pMtXzM6Ovu8zslZm7H
=VfHu
-END PGP SIGNATURE-