[SECURITY] [DLA 578-1] openssh security update

2016-07-30 Thread Ola Lundqvist
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: openssh
Version: 6.0p1-4+deb7u5
CVE ID : CVE-2016-6210

OpenSSH secure shell client and server had a user enumeration
problem reported.

CVE-2016-6210

  User enumeration via covert timing channel


For Debian 7 "Wheezy", this problem has been fixed in version
6.0p1-4+deb7u5.

We recommend that you upgrade your openssh packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -- 
 - Ola Lundqvist ---
/  o...@debian.org Folkebogatan 26  \
|  o...@inguza.com  654 68 KARLSTAD  |
|  http://inguza.com/  +46 (0)70-332 1551   |
\  gpg/f.p.: 22F2 32C6 B1E0 F4BF 2B26  0A6A 5E90 DCFA 9426 876F /
 ---
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=MzvQ
-END PGP SIGNATURE-



[SECURITY] [DLA 577-1] redis security update

2016-07-30 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: redis
Version: 2:2.4.14-1+deb7u1
CVE ID : CVE-2013-7458
Debian Bug : 832460

It was discovered that the redis-cli tool in redis (an in-memory
key-value database) created world-readable history files.

For Debian 7 "Wheezy", this issue has been fixed in redis version
2:2.4.14-1+deb7u1.

We recommend that you upgrade your redis packages.


Regards,

- -- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=cAU3
-END PGP SIGNATURE-



[SECURITY] [DLA 572-1] icedove security update

2016-07-30 Thread Guido Günther
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: icedove
Version: 1:45.2.0-2~deb7u1
CVE ID : CVE-2016-2818

Multiple security issues have been found in Icedove, Debian's version of
the Mozilla Thunderbird mail client: Multiple memory safety errors may
lead to the execution of arbitrary code or denial of service.

For Debian 7 "Wheezy", these problems have been fixed in version
1:45.2.0-2~deb7u1.

We recommend that you upgrade your icedove packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-

iQIcBAEBCAAGBQJXnKMiAAoJEAe4t7DqmBILtAEP/jZm68fXK/CrkU12aONeEFw7
je+IcmoqegdTmgKARJ8ngDfwLF63Irol5kFVn8CFaia7y6aQtpVlgvSlZMCXAO/e
hrbGZ+qDELb8ck0RHXwb68CxKoD6iI4BNHwNFJJXV8YuaRXWO3oqwg6ZUS0pwN+/
g+neybKf0m+m9jv5+pnuIDwdFEvC+mAdudGILyagtwwOyyb88xLiAMxSDGuOcpDE
kBouXzJrf8vUuAulmzGzD2v7if2dmRNT+ftxj/owddv6n0HChVt3AhnuLGxBq/ou
j83enEoknzSFNbGLPKrddIZDfWciKe5mnQ/S7ZAohsWohMA9pygvEGWiOh+LKLDv
3lhrytjOuojamqxvYPa6ryYvz5aibAPI1MiHkp2Az9sZQUcFHsl3fz4o+CPED1qW
aF5He03HHNTITgYSQhfBgpeZ6qaDljlOoLj+g18Fx3dH+fxVtHwa+so8p8E2WPFR
iKh0xNX7c9yJ2uH2kW1LxV2nCZrIsqb3VOaSMcSuhpEH9o4fJEruBa7WHc5gjbyx
QvEikUMPBp4L9yWbreJ7WgzEug2wCJGDg+22NGLJ1zFIEBLOGQ6iKD9H4y3ockF/
3FSzL/940CbEl1H4CaNxFnTFosrVhyl5hwy/a+5e9vKHPGXiLixfX8llLd/6NdbA
9DfL50KKWlKTtU0FjHJf
=kWIZ
-END PGP SIGNATURE-



[SECURITY] [DLA 576-1] libdbd-mysql-perl security update

2016-07-30 Thread Markus Koschany
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Package: libdbd-mysql-perl
Version: 4.021-1+deb7u1
CVE ID : CVE-2014-9906 CVE-2015-8949


Two use-after-free vulnerabilities were discovered in DBD::mysql, a Perl
DBI driver for the MySQL database server. A remote attacker can take
advantage of these flaws to cause a denial-of-service against an
application using DBD::mysql (application crash), or potentially to
execute arbitrary code with the privileges of the user running the
application.

For Debian 7 "Wheezy", these problems have been fixed in version
4.021-1+deb7u1.

We recommend that you upgrade your libdbd-mysql-perl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=5rfU
-END PGP SIGNATURE-



[SECURITY] [DLA 574-1] qemu-kvm security update

2016-07-30 Thread Guido Günther
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: qemu-kvm
Version: 1.1.2+dfsg-6+deb7u14
CVE ID : CVE-2015-5239 CVE-2016-2857 CVE-2016-4020 CVE-2016-4439 
 CVE-2016-5403 CVE-2016-6351

Multiple vulnerabilities have been discovered in qemu-kvm, a full
virtualization solution on x86 hardware. The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2015-5239

   Lian Yihan discovered that QEMU incorrectly handled certain payload
   messages in the VNC display driver. A malicious guest could use this
   issue to cause the QEMU process to hang, resulting in a denial of
   service.

CVE-2016-2857

   Ling Liu discovered that QEMU incorrectly handled IP checksum
   routines. An attacker inside the guest could use this issue to cause
   QEMU to crash, resulting in a denial of service, or possibly leak
   host memory bytes.

CVE-2016-4020

   Donghai Zdh discovered that QEMU incorrectly handled the Task
   Priority Register(TPR). A privileged attacker inside the guest could
   use this issue to possibly leak host memory bytes.

CVE-2016-4439, CVE-2016-6351

   Li Qiang disovered that the emulation of the 53C9X Fast SCSI
   Controller is affected by out of bound access issues.

CVE-2016-5403

   Zhenhao Hong discovered that a malicious guest administrator can
   cause unbounded memory allocation in QEMU (which can cause an
   Out-of-Memory condition) by submitting virtio requests without
   bothering to wait for completion.

For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u14.

We recommend that you upgrade your qemu-kvm packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
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=n/al
-END PGP SIGNATURE-



[SECURITY] [DLA 573-1] qemu security update

2016-07-30 Thread Guido Günther
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: qemu
Version: 1.1.2+dfsg-6+deb7u14
CVE ID : CVE-2015-5239 CVE-2016-2857 CVE-2016-4020 CVE-2016-4439 
 CVE-2016-5403 CVE-2016-6351

Multiple vulnerabilities have been discovered in QEMU, a fast processor
emulator. The Common Vulnerabilities and Exposures project identifies
the following problems:

CVE-2015-5239

   Lian Yihan discovered that QEMU incorrectly handled certain payload
   messages in the VNC display driver. A malicious guest could use this
   issue to cause the QEMU process to hang, resulting in a denial of
   service.

CVE-2016-2857

   Ling Liu discovered that QEMU incorrectly handled IP checksum
   routines. An attacker inside the guest could use this issue to cause
   QEMU to crash, resulting in a denial of service, or possibly leak
   host memory bytes.

CVE-2016-4020

   Donghai Zdh discovered that QEMU incorrectly handled the Task
   Priority Register(TPR). A privileged attacker inside the guest could
   use this issue to possibly leak host memory bytes.

CVE-2016-4439, CVE-2016-6351

   Li Qiang disovered that the emulation of the 53C9X Fast SCSI
   Controller is affected by out of bound access issues.

CVE-2016-5403

   Zhenhao Hong discovered that a malicious guest administrator can
   cause unbounded memory allocation in QEMU (which can cause an
   Out-of-Memory condition) by submitting virtio requests without
   bothering to wait for completion.

For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u14.

We recommend that you upgrade your qemu packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-

iQIcBAEBCAAGBQJXnH/iAAoJEAe4t7DqmBILgOAP/3U3B96UK+fC1KcPpngD8e3N
3a2b7T8LE0W3KVom1zEwIwtF9m4iiLgb43YC7SUNmIuzQ6eSQ7qs2ffR3uLQxaxQ
YG6VQfZ7rcxMN34uNHTEWPSvhD3ZSrxyaI+4yc/wyt2nSUW/2aPw9UNRZbBRD/qx
EaNSBCSMNNzNZ2RpIoRfJmChBuWsFPS1WtLw6K8PxKSF5h4RFSTOsb5qfpGX4eIu
4NLKxJcWoJNbntb0W7JVySKFX5SaWMnILKGxoHiZwLYC/uZ8t3uypVmoWAtsPNw7
dKvo2P2HGSCZdtfngPgYcV13+bsfwgBHiRsDule7h9C/0RZC8yVUpAta0Yzox83d
/lW9ASgNrg7b8KM3TB6d6dbQDn1MbvHTDMehU+9Xnrh82c8uMN3Cnzum7xESWYun
Qew9X0BDKS+WG7K+Bbxnk3DE8APPwGlgOUNRDHGeRfzZMdIO2L3pKeyUVBN/mmZ7
fZqlFItOxO/45unp2CUdmod5837CrpOj2qa4VxJv2OlBHrMVfOsNJuA6SMWZvMZD
FxKOom3c+WCaBzOkv86WsVgr+XD7FEC8aXIzgpjiJJdZNjJlWbyg6PM426zCmR2F
FfkW1N6OoPX6j23GiL/r+IpCOFoPC80jsuZIDUlBmeX/1szl8OjqjefmW2em63Sq
TTm2xaCaczylFrHPTecG
=jppC
-END PGP SIGNATURE-



[SECURITY] [DLA 575-1] collectd security update

2016-07-30 Thread Sebastian Harl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Package: collectd
Version: 5.1.0-3+deb7u1
CVE ID : CVE-2016-6254
Debian Bug : 832507 832577

Emilien Gaspar discovered that collectd, a statistics collection and
monitoring daemon, incorrectly processed incoming network
packets. This resulted in a heap overflow, allowing a remote attacker
to either cause a DoS via application crash, or potentially execute
arbitrary code.

Additionally, security researchers at Columbia University and the
University of Virginia discovered that collectd failed to verify a
return value during initialization. This meant the daemon could
sometimes be started without the desired, secure settings.

For Debian 7 "Wheezy", these problems have been fixed in version
5.1.0-3+deb7u1.

We recommend that you upgrade your collectd packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
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=7YzU
-END PGP SIGNATURE-



[SECURITY] [DLA 571-1] xen security update

2016-07-30 Thread Guido Günther
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: xen
Version: 4.1.6.lts1-1
CVE ID : CVE-2014-3672 CVE-2016-3158 CVE-2016-3159 CVE-2016-3710 
 CVE-2016-3712 CVE-2016-3960 CVE-2016-4480 CVE-2016-6258
Debian Bug : 

Multiple vulnerabilities have been discovered in the Xen hypervisor. The
Common Vulnerabilities and Exposures project identifies the following
problems:

CVE-2014-3672 (XSA-180)

Andrew Sorensen discovered that a HVM domain can exhaust the hosts
disk space by filling up the log file.

CVE-2016-3158, CVE-2016-3159 (XSA-172)

Jan Beulich from SUSE discovered that Xen does not properly handle
writes to the hardware FSW.ES bit when running on AMD64 processors.
A malicious domain can take advantage of this flaw to obtain address
space usage and timing information, about another domain, at a
fairly low rate.

CVE-2016-3710 (XSA-179)

Wei Xiao and Qinghao Tang of 360.cn Inc discovered an out-of-bounds
read and write flaw in the QEMU VGA module. A privileged guest user
could use this flaw to execute arbitrary code on the host with the
privileges of the hosting QEMU process.

CVE-2016-3712 (XSA-179)

Zuozhi Fzz of Alibaba Inc discovered potential integer overflow
or out-of-bounds read access issues in the QEMU VGA module. A
privileged guest user could use this flaw to mount a denial of
service (QEMU process crash).

CVE-2016-3960 (XSA-173)

Ling Liu and Yihan Lian of the Cloud Security Team, Qihoo 360
discovered an integer overflow in the x86 shadow pagetable code. A
HVM guest using shadow pagetables can cause the host to crash. A PV
guest using shadow pagetables (i.e. being migrated) with PV
superpages enabled (which is not the default) can crash the host, or
corrupt hypervisor memory, potentially leading to privilege
escalation.

CVE-2016-4480 (XSA-176)

Jan Beulich discovered that incorrect page table handling could
result in privilege escalation inside a Xen guest instance.

CVE-2016-6258 (XSA-182)

Jérémie Boutoille discovered that incorrect pagetable handling in
PV instances could result in guest to host privilege escalation.

Additionally this Xen Security Advisory without a CVE was fixed:

XSA-166

Konrad Rzeszutek Wilk and Jan Beulich discovered that ioreq handling
is possibly susceptible to a multiple read issue.

For Debian 7 "Wheezy", these problems have been fixed in version
4.1.6.lts1-1.

We recommend that you upgrade your xen packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
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=yWuS
-END PGP SIGNATURE-