[SECURITY] [DLA 578-1] openssh security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: openssh Version: 6.0p1-4+deb7u5 CVE ID : CVE-2016-6210 OpenSSH secure shell client and server had a user enumeration problem reported. CVE-2016-6210 User enumeration via covert timing channel For Debian 7 "Wheezy", this problem has been fixed in version 6.0p1-4+deb7u5. We recommend that you upgrade your openssh packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -- - Ola Lundqvist --- / o...@debian.org Folkebogatan 26 \ | o...@inguza.com 654 68 KARLSTAD | | http://inguza.com/ +46 (0)70-332 1551 | \ gpg/f.p.: 22F2 32C6 B1E0 F4BF 2B26 0A6A 5E90 DCFA 9426 876F / --- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJXnR7eAAoJEF6Q3PqUJodv//QP/RzUhwWNrKgttgDNCxZPZba+ 3b1PSM04QiOSTCheaBGIumu0Ad7trSut48yTaQazTWULImYAK2PTUEUYJ1VSG2BQ M2wQ0yD/RoevUdMKgwIM9ekCNweHTZQpISKkew2jIW0v3wpK/NBMXIQy63VDtump cuuwnivi2utm3cVIbY+r9DgqqLleYgZVs8NdkaRzE1VVT/b7hFk0NODfxVBpEBot 7GE6h+Tl+AO1rXr3UXdg0AKWSG9h79gkBggpcn3u1pKHR/jFk3xnL+4zrgSqytU6 iGeyqT79Tdsy+46rHyBatjDhvYvIA/p0d57Cf6H8a0KP0PHbM1VZRg9jxBLse2X4 ppvesJZ7YWEE9Iiorov5sw25aHqnYxYFDGxQQXGN905JQBDzmJf2EkFWbukzMfgf eelhwrfosMGKC5T9IYcQbn0kWKkxINd4aAu/bl52GDOZLE11x6rSwd30voZxb5PJ MlFl59vMbi1giNKhFeHP05ZtPk9dcSQLGGGqO/exPKYtN8SN4XYTXyD/KKxOPt71 bblt6CdjhgdXuq+sxTxxkgaYTgdk86jPLchHaJ2f/mKZXGmtGQp/xNYuCgFFfTmb IwPw0VQt4hu/U8Gi+snmoxfcE1amrSagUnV2Jd+rgPjWx80pmdsuQUUKSwqGIogp qAB6AyE6HpI+A5IpLOnm =MzvQ -END PGP SIGNATURE-
[SECURITY] [DLA 577-1] redis security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: redis Version: 2:2.4.14-1+deb7u1 CVE ID : CVE-2013-7458 Debian Bug : 832460 It was discovered that the redis-cli tool in redis (an in-memory key-value database) created world-readable history files. For Debian 7 "Wheezy", this issue has been fixed in redis version 2:2.4.14-1+deb7u1. We recommend that you upgrade your redis packages. Regards, - -- ,''`. : :' : Chris Lamb `. `'` la...@debian.org / chris-lamb.co.uk `- -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIbBAEBCAAGBQJXnOJpAAoJEB6VPifUMR5YAOcP92tWhHfH/jeVr4outQu/fhkJ 2Z3Gry9lwwbXSRko+IVBDfW60WGoycGB9tdSBmUvcJudF5t72MBlCJf5XE/0exYV UGxWInRc/qhDTtmpmSwD4Gf4MTYhJxBxXKVoI2Rcqd+z/ZHhBK5UnHjHTWtvDeHf JVIDMK1TzgXvKWbqb//I7TA8IzQHWN6XzleNBUCWxPvQ7OlZMqTHr930wl5aj+iv 4gbUEak90ihgfh5MAC4AhOWFykLrCT44xezooa2lFdiQg06VY6hKmpVWnqh0k9pT 2KwXO0g0/rTv2Ip+7n3DFTEZIzx3X/ZFIz9KKlsrxzSb/r7xV4ut5k0qczWjiFko Y8UE7TULJ+HjU2IyYSCBr38wZ7z/VbFYVvBlrfeRQrnTZaZnVyDVkpnWkK3SNegE X0Ran/yCINEvKH7EtHZTlWTHCE7eJyAG9//9Wu+Z5/BJQK8hwjZ1P5rZIvJLkyXx sXwPuur+Ds7js4fADVTmGHveKDb+xrP6c+Mt/gjYzN52grWxj8WhQQ1pMmdzIKX0 +IBQBR4/7OjKn0D7Puv2Af7zzPw2Xt+C4IcgLsVD6P+OAI7aI/n7vZcJD3vIp75X e0eh9g5VlRpZYVq7050QAID5/xNMhTsfhMxiAsFJdr1R8BjSfi4SbdH4lp9YzVsC qpfxpRbM4ZNH8u4RxDM= =cAU3 -END PGP SIGNATURE-
[SECURITY] [DLA 572-1] icedove security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: icedove Version: 1:45.2.0-2~deb7u1 CVE ID : CVE-2016-2818 Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail client: Multiple memory safety errors may lead to the execution of arbitrary code or denial of service. For Debian 7 "Wheezy", these problems have been fixed in version 1:45.2.0-2~deb7u1. We recommend that you upgrade your icedove packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIcBAEBCAAGBQJXnKMiAAoJEAe4t7DqmBILtAEP/jZm68fXK/CrkU12aONeEFw7 je+IcmoqegdTmgKARJ8ngDfwLF63Irol5kFVn8CFaia7y6aQtpVlgvSlZMCXAO/e hrbGZ+qDELb8ck0RHXwb68CxKoD6iI4BNHwNFJJXV8YuaRXWO3oqwg6ZUS0pwN+/ g+neybKf0m+m9jv5+pnuIDwdFEvC+mAdudGILyagtwwOyyb88xLiAMxSDGuOcpDE kBouXzJrf8vUuAulmzGzD2v7if2dmRNT+ftxj/owddv6n0HChVt3AhnuLGxBq/ou j83enEoknzSFNbGLPKrddIZDfWciKe5mnQ/S7ZAohsWohMA9pygvEGWiOh+LKLDv 3lhrytjOuojamqxvYPa6ryYvz5aibAPI1MiHkp2Az9sZQUcFHsl3fz4o+CPED1qW aF5He03HHNTITgYSQhfBgpeZ6qaDljlOoLj+g18Fx3dH+fxVtHwa+so8p8E2WPFR iKh0xNX7c9yJ2uH2kW1LxV2nCZrIsqb3VOaSMcSuhpEH9o4fJEruBa7WHc5gjbyx QvEikUMPBp4L9yWbreJ7WgzEug2wCJGDg+22NGLJ1zFIEBLOGQ6iKD9H4y3ockF/ 3FSzL/940CbEl1H4CaNxFnTFosrVhyl5hwy/a+5e9vKHPGXiLixfX8llLd/6NdbA 9DfL50KKWlKTtU0FjHJf =kWIZ -END PGP SIGNATURE-
[SECURITY] [DLA 576-1] libdbd-mysql-perl security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Package: libdbd-mysql-perl Version: 4.021-1+deb7u1 CVE ID : CVE-2014-9906 CVE-2015-8949 Two use-after-free vulnerabilities were discovered in DBD::mysql, a Perl DBI driver for the MySQL database server. A remote attacker can take advantage of these flaws to cause a denial-of-service against an application using DBD::mysql (application crash), or potentially to execute arbitrary code with the privileges of the user running the application. For Debian 7 "Wheezy", these problems have been fixed in version 4.021-1+deb7u1. We recommend that you upgrade your libdbd-mysql-perl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQJ8BAEBCgBmBQJXnIgzXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRBQ0YzRDA4OEVGMzJFREVGNkExQTgzNUZE OUFEMTRCOTUxM0I1MUU0AAoJENmtFLlRO1HkSOMP/1imV6RfFXaSjHJjogiKNVxe VIu8GtSspKtESqSj9/5xXHh4/ezOA+1tAKUNTXUZgGZvXd4+pW0RrdY2mWNLIhM+ HgxaJzolV8GwbK0ESBTVJPZyNulC3j8giHiEuKPoYwTJfSdZVLDkCVci8x9EJg98 1ONa+RatK7CnMWJOOnkB93ycbu3cGiQdKkW7az+p9Gh1AzciMclUgTH/5UcjzJKJ 7xlmlk2Vda1C4sOJc+VTIQ7vydrmDlfngkuQB4f7vn9P7gxwGYpnph35VgqeS3Et lKDsEWpriDbUtKxoa3P9GD/nFCAjnypBb6tauAZeRmOuR84K/CvCAR8qBTeC+ab3 n/wPWwV+6VTL9kG5BBDhYk/onXOK9rLENUbkCYVdLr+zkzpFlTe0C4rBCqj7Cs05 e6BYZzbjutaMQaySRIa5yjKrUQfDF1hVPCIh9g5Rvp6q5nRuwtc4yuN96lxW5THl ApY2iUrF3KNHwunJp5XBjN540Ieu0rlRemFkYQWCyegyulX13w31jmvLbq6sHJPX TRMZ4OI6ziqFysncQpLPpeZ//eY3LfcEUQ1eXiqtPUuAmfO6xLgZYtwMTHVeeSd2 g/dGLIfvnhcv8oWx1CwFdDNZEW7jujzTSLc69tQH2OZvleq2mDJj/2wBUdy/H4bM qiQAjqfzMLd/wXHsSNN4 =5rfU -END PGP SIGNATURE-
[SECURITY] [DLA 574-1] qemu-kvm security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: qemu-kvm Version: 1.1.2+dfsg-6+deb7u14 CVE ID : CVE-2015-5239 CVE-2016-2857 CVE-2016-4020 CVE-2016-4439 CVE-2016-5403 CVE-2016-6351 Multiple vulnerabilities have been discovered in qemu-kvm, a full virtualization solution on x86 hardware. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-5239 Lian Yihan discovered that QEMU incorrectly handled certain payload messages in the VNC display driver. A malicious guest could use this issue to cause the QEMU process to hang, resulting in a denial of service. CVE-2016-2857 Ling Liu discovered that QEMU incorrectly handled IP checksum routines. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly leak host memory bytes. CVE-2016-4020 Donghai Zdh discovered that QEMU incorrectly handled the Task Priority Register(TPR). A privileged attacker inside the guest could use this issue to possibly leak host memory bytes. CVE-2016-4439, CVE-2016-6351 Li Qiang disovered that the emulation of the 53C9X Fast SCSI Controller is affected by out of bound access issues. CVE-2016-5403 Zhenhao Hong discovered that a malicious guest administrator can cause unbounded memory allocation in QEMU (which can cause an Out-of-Memory condition) by submitting virtio requests without bothering to wait for completion. For Debian 7 "Wheezy", these problems have been fixed in version 1.1.2+dfsg-6+deb7u14. We recommend that you upgrade your qemu-kvm packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIcBAEBCAAGBQJXnIS4AAoJEAe4t7DqmBILJnIP/iMzD2oZ9u37gLc0qUCH87N3 tYNEL7SSBb0ZYOb+Fg7vQxIDvkvuvWJ3AbmaxwQlJ/yTrEcdddeSubHoRI99u7zx RGl8dqHVNS2O1XlFUhfv6GiJgdyp1tGOtW32zvMisnrE+JZxdIqOXHGOiMewZHbd rBE01pv6GACLrJFmdrpuptq1i7AQpT05XzgK3XLgnudfa87bh/AF+6uSu/wi45ZU b2ilDFIckH9Hsi6SQ81JEsCTw/a/H6OgUzn6GQnXVGVgpk8SJwSIfAx97LbJ5kwW JG43p4UMhIBXNwic9/sWsQjlLTjgDW88D3/iGCk5GVYjVzaLoE3jyV3jms6EFbTv kjKtabjkWvL9c1xEDJGPmcQpv4tISDOK07/bZl4SXBayRdS7u+5J6m93gtltqFZ+ FBLUry9BvN8HC55IozPZXfWoDJLohWPVp7ZAhzCVeGsdp+u5ILEyUoduK9sWoOW/ ALsTDKdRIMkg1EiqVP0NiKtnKrkZ37T9/iEwalXpdmvRfQBMs43EqXq62/Yi3BvH KfOQ3eH9K/oHjRzOqPJpd3MCbMwEYsFGA57/y7ByWhYpLo3AQWa8NHBLQB5h9KIa xhViZtgurp/cEOC9JsSbtOAWRctgp3BwO9cEgiF/Vl9NDDfDYOpu7UP1DRDW7EME VSXdMCSw3CFj1BCQwRgN =n/al -END PGP SIGNATURE-
[SECURITY] [DLA 573-1] qemu security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: qemu Version: 1.1.2+dfsg-6+deb7u14 CVE ID : CVE-2015-5239 CVE-2016-2857 CVE-2016-4020 CVE-2016-4439 CVE-2016-5403 CVE-2016-6351 Multiple vulnerabilities have been discovered in QEMU, a fast processor emulator. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-5239 Lian Yihan discovered that QEMU incorrectly handled certain payload messages in the VNC display driver. A malicious guest could use this issue to cause the QEMU process to hang, resulting in a denial of service. CVE-2016-2857 Ling Liu discovered that QEMU incorrectly handled IP checksum routines. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly leak host memory bytes. CVE-2016-4020 Donghai Zdh discovered that QEMU incorrectly handled the Task Priority Register(TPR). A privileged attacker inside the guest could use this issue to possibly leak host memory bytes. CVE-2016-4439, CVE-2016-6351 Li Qiang disovered that the emulation of the 53C9X Fast SCSI Controller is affected by out of bound access issues. CVE-2016-5403 Zhenhao Hong discovered that a malicious guest administrator can cause unbounded memory allocation in QEMU (which can cause an Out-of-Memory condition) by submitting virtio requests without bothering to wait for completion. For Debian 7 "Wheezy", these problems have been fixed in version 1.1.2+dfsg-6+deb7u14. We recommend that you upgrade your qemu packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIcBAEBCAAGBQJXnH/iAAoJEAe4t7DqmBILgOAP/3U3B96UK+fC1KcPpngD8e3N 3a2b7T8LE0W3KVom1zEwIwtF9m4iiLgb43YC7SUNmIuzQ6eSQ7qs2ffR3uLQxaxQ YG6VQfZ7rcxMN34uNHTEWPSvhD3ZSrxyaI+4yc/wyt2nSUW/2aPw9UNRZbBRD/qx EaNSBCSMNNzNZ2RpIoRfJmChBuWsFPS1WtLw6K8PxKSF5h4RFSTOsb5qfpGX4eIu 4NLKxJcWoJNbntb0W7JVySKFX5SaWMnILKGxoHiZwLYC/uZ8t3uypVmoWAtsPNw7 dKvo2P2HGSCZdtfngPgYcV13+bsfwgBHiRsDule7h9C/0RZC8yVUpAta0Yzox83d /lW9ASgNrg7b8KM3TB6d6dbQDn1MbvHTDMehU+9Xnrh82c8uMN3Cnzum7xESWYun Qew9X0BDKS+WG7K+Bbxnk3DE8APPwGlgOUNRDHGeRfzZMdIO2L3pKeyUVBN/mmZ7 fZqlFItOxO/45unp2CUdmod5837CrpOj2qa4VxJv2OlBHrMVfOsNJuA6SMWZvMZD FxKOom3c+WCaBzOkv86WsVgr+XD7FEC8aXIzgpjiJJdZNjJlWbyg6PM426zCmR2F FfkW1N6OoPX6j23GiL/r+IpCOFoPC80jsuZIDUlBmeX/1szl8OjqjefmW2em63Sq TTm2xaCaczylFrHPTecG =jppC -END PGP SIGNATURE-
[SECURITY] [DLA 575-1] collectd security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Package: collectd Version: 5.1.0-3+deb7u1 CVE ID : CVE-2016-6254 Debian Bug : 832507 832577 Emilien Gaspar discovered that collectd, a statistics collection and monitoring daemon, incorrectly processed incoming network packets. This resulted in a heap overflow, allowing a remote attacker to either cause a DoS via application crash, or potentially execute arbitrary code. Additionally, security researchers at Columbia University and the University of Virginia discovered that collectd failed to verify a return value during initialization. This meant the daemon could sometimes be started without the desired, secure settings. For Debian 7 "Wheezy", these problems have been fixed in version 5.1.0-3+deb7u1. We recommend that you upgrade your collectd packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJXnHy2AAoJEMwFfnIvH/zHP/YP/3nltzMK38uzFzaY3wgmN2Am FoMfzYnauYT867Zb9IbpnRMYlWYoqSe7MLBSJ9xPOzo+JhEJkJxpNfyc4jSPMB6d iU2p2bIzbXIu4tVYFBsFOvQW9KwouXR6ADe5KagsUJIKhZCJJqwWhrdYtp4QhBEP 8e/lJ+aE6sqtM1YNwe6YrTUcaGB5QLTea3nWYBTuthFw5bfOtjEnPNDOASA5VGc9 aZtDEYeclliUR9ktNziYUZAvA4BPNL9scOYbFdX8HTcLPPNsX0jOPd7SVDbHwtTc Iwn5p5kspZIxGw8ivuceAuaKdyoF1tF9l5eDUHCUPmHdA0FGMvSDTUvEAws1Kjg2 LlH8ibFvHiymtJyHXoltJ/u80xjRsYBU1ag2cUyApyx0WhfgDBjde8boSxxydLIS mUQcPFbJVCgVmOvB9ZHJX3IMFumD/Na8JrnCOoHtFwKsCLMNQ/Pkdkp6zgscWlZg F+p3vrREoPDfouVSxWQJzzBlnrF6R1hJONkWkjNfHRzQxeXoM2Wa7YJWnkrfuQE9 MnqJJfUcl2Brc6RHsu1Q1rGKrzrUlCOo7EH++VMcP28sH84aAtKNTmi93Th3tbIR 2hMQo2XafNlxrExRv40W/Zq+doKSSoZpiUarHXtVXNVH6WA6K5Vre6k9qtOUCOjs 8fMC2uwoPnHoAr+X6SCF =7YzU -END PGP SIGNATURE-
[SECURITY] [DLA 571-1] xen security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: xen Version: 4.1.6.lts1-1 CVE ID : CVE-2014-3672 CVE-2016-3158 CVE-2016-3159 CVE-2016-3710 CVE-2016-3712 CVE-2016-3960 CVE-2016-4480 CVE-2016-6258 Debian Bug : Multiple vulnerabilities have been discovered in the Xen hypervisor. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2014-3672 (XSA-180) Andrew Sorensen discovered that a HVM domain can exhaust the hosts disk space by filling up the log file. CVE-2016-3158, CVE-2016-3159 (XSA-172) Jan Beulich from SUSE discovered that Xen does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors. A malicious domain can take advantage of this flaw to obtain address space usage and timing information, about another domain, at a fairly low rate. CVE-2016-3710 (XSA-179) Wei Xiao and Qinghao Tang of 360.cn Inc discovered an out-of-bounds read and write flaw in the QEMU VGA module. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. CVE-2016-3712 (XSA-179) Zuozhi Fzz of Alibaba Inc discovered potential integer overflow or out-of-bounds read access issues in the QEMU VGA module. A privileged guest user could use this flaw to mount a denial of service (QEMU process crash). CVE-2016-3960 (XSA-173) Ling Liu and Yihan Lian of the Cloud Security Team, Qihoo 360 discovered an integer overflow in the x86 shadow pagetable code. A HVM guest using shadow pagetables can cause the host to crash. A PV guest using shadow pagetables (i.e. being migrated) with PV superpages enabled (which is not the default) can crash the host, or corrupt hypervisor memory, potentially leading to privilege escalation. CVE-2016-4480 (XSA-176) Jan Beulich discovered that incorrect page table handling could result in privilege escalation inside a Xen guest instance. CVE-2016-6258 (XSA-182) Jérémie Boutoille discovered that incorrect pagetable handling in PV instances could result in guest to host privilege escalation. Additionally this Xen Security Advisory without a CVE was fixed: XSA-166 Konrad Rzeszutek Wilk and Jan Beulich discovered that ioreq handling is possibly susceptible to a multiple read issue. For Debian 7 "Wheezy", these problems have been fixed in version 4.1.6.lts1-1. We recommend that you upgrade your xen packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIcBAEBCAAGBQJXnG7HAAoJEAe4t7DqmBILHEQP/Rc4wQC3bIp3FC1EWf+ZmrZ7 IKSCmujP9gdpnm8O2nswcFTd+XaJ1ncYK0Q4Te7yppspAmyF9YLBoyOxcQstXNbA Wu/+kR3bvZJIR48wzBsGocZL9NvKnHdGHs3d4tkd9MUGU7rx1BGNqxBW/8h49nmC HQVRQGTYKlW+slljMzVi3RPUB4VRWy2EzVtHcAHXdje4WJDora4RdLc4iqtfKpgJ q+5NnilNClYa617i220AyKcUsgvzY4lLXCtQM4LotOY4YX9js1Lr0e+B/kLs8fVs pJxkJVTrsLa1NlE1Wj3IuwYRNnyEoPUngZX9E6YKyA797FGotwrGenmyTpeWLi+W IQbyVFlYIdKX88OgEmz+j7LIs9YSV2wXkigpcddqXnL6yHFZ0Zl7iAC7vyT/MgSV lHtV9w0hAjC/g/Y/TDxEHzusHNo97pAMJQVuEpmB9T+bzkg6hfJin+OjldQtQ6lW 3MGvkztwfhiYsRJyoDxYuVBr4GT5MdCgTujTtThVxdntmPk0aLvbYsvKyKecAIMU +Y1iVx5ErboP06vlzdJ7RBNAc3lvYvpvtbfMYSGCCyYMREPdLnwaDaZ234RNOvI3 QbSAbuPrjf9L5HaSDpdFMgFaJtrNCKKiXO5zSXTx8BYL9bkFJ8ORlDdxGe5ScbO0 cq++Ai7qDrQDTZpQVv9m =yWuS -END PGP SIGNATURE-