[SECURITY] [DSA 4029-1] postgresql-common security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4029-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 09, 2017 https://www.debian.org/security/faq - - Package: postgresql-common CVE ID : CVE-2017-8806 It was discovered that the pg_ctlcluster, pg_createcluster and pg_upgradecluster commands handled symbolic links insecurely which could result in local denial of service by overwriting arbitrary files. For the oldstable distribution (jessie), this problem has been fixed in version 165+deb8u3. For the stable distribution (stretch), this problem has been fixed in version 181+deb9u1. We recommend that you upgrade your postgresql-common packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAloEyhsACgkQEMKTtsN8 Tjax2w/7BPqWjyECU9IUBuitPpZcJCJphT+PR2+U15XWABzNiueAJ47hWnUBW4yC pZt/ynXoPZSN6WAwMSE2uNAsLB+y3VBTPztZSHPKsl8LK7icZG+fvxILD8yuZilR OG62MWaTOo4WHuAlZjNcmgFv2scvBgs7p+6g9qBSB3LgmTJ419D2ST8IiIFcDmHV 1PNwvybeMmw0p8xn+TQEyzgsGC3DCOchpzOYT2xHQg7IFoOeW6CA4bIXh+5eNiFq g6g+zDHxCKb3tZthqGa74YZOLSy/m7hvDe4RsaLSX0M9NIKWyyjS21MSbF98IZmB ANVCtCj5umzl4aOvU+Cq3tm67r63zMxSxUkH568MLB6DX8pcWxeqyfr/n17L+fB+ 5yYew5xSoD17HdLYnXwWArzPp67SFH4wCKJjR82C4q/6oi0okw94er/AD4YSxCC7 SP5OFhj+0CiIfoBrkOO070W1L2hYPdO8ocaA/liHGnj4S4bbn0SMDbwPXLurj4/e aMTQZSCNFG+CrWMBCkxGN4rLSOi77s8mcOkc/EeYiKebLN/IyzoD+BEF/Sl+TSLi khrIDdg76tJyjci+q5i4K+eJhr6w4LpZB2EhCcLjfxh3HbX/BiJDf12YdcnzegvX i1gffY8poESs0uZzIQ8yCZDHsCx++n0FUQGPNsVAKLl0RDYweKw= =HMzZ -END PGP SIGNATURE-
[SECURITY] [DSA 4027-1] postgresql-9.4 security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4027-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 09, 2017 https://www.debian.org/security/faq - - Package: postgresql-9.4 CVE ID : CVE-2017-15098 A vulnerabilitiy has been found in the PostgreSQL database system: Denial of service and potential memory disclosure in the json_populate_recordset() and jsonb_populate_recordset() functions. For the oldstable distribution (jessie), this problem has been fixed in version 9.4.15-0+deb8u1. We recommend that you upgrade your postgresql-9.4 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAloEyhIACgkQEMKTtsN8 TjZxOA//TZ8wa50uQAlkRoUdP5SGsI33lAkGBvCtERtkpDm5EThuMnxSs95j7Zq1 HTjd/Gqusfgl5xCHrXUNYGVs4jZ0QQa5LsHCsiNsvCayvkoxw6FguetqRSkvjtrT v1I0xU+3nNMzv66fVwnFJ5KK/WTvlOwLk1X0ccYcMkpxDhD6CUUQhZbdN9OB9nWT GlL3BwweerB8UuxxWapad9zbJnNM/a7tjd0XJ+OAu5P5LBxYIgsGmKMjynB/Igtx K5+B7t8kLCnG9Gbip1TLVg0zMVugbuO9OWA2I76U0lGvpfmbOaUq/yXEbOvv1hjG nbZG7D17lCyDJps/6e7VJI8yL6l2ibaCn28hrLy1bNm6r3hXdr2wn9ulgbXfMCrU o67PK6sFCwhYieKJUJBwQVtQ+XlK0TSsLycggIxA5SY5nfBHGoSjQEhR9bYlKuL0 Cspm8ciIxtibBN5gr8jU5zOlPA2jLRdnHrCR8zQwfKEU9nZaxWAa8KqNwOliG4xT vPvNczcyP0++GOtJO9bTc9NXZJW7zRMqfQP2jtn4YPBFCZndLXDrn3w+IWBTAGuU sDj+EzCSscMoVFvD0NlLn1sBB5xbNS3/GY6PncPIW+60q5xZ4sx83K8yxtmkfx01 k4LuTZqJP2PvcAa4BmxaIrLPQi33rEM0nwrQkMnUHSULGwQ6axE= =Eg5u -END PGP SIGNATURE-
[SECURITY] [DSA 4030-1] roundcube security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4030-1 secur...@debian.org https://www.debian.org/security/ Salvatore Bonaccorso November 09, 2017 https://www.debian.org/security/faq - - Package: roundcube CVE ID : CVE-2017-16651 A file disclosure vulnerability was discovered in roundcube, a skinnable AJAX based webmail solution for IMAP servers. An authenticated attacker can take advantage of this flaw to read roundcube's configuration files. For the stable distribution (stretch), this problem has been fixed in version 1.2.3+dfsg.1-4+deb9u1. For the unstable distribution (sid), this problem has been fixed in version 1.3.3+dfsg.1-1. We recommend that you upgrade your roundcube packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAloErkZfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RjtA/+Kgl5Cjdta2WT7c1OK5rbhfQUaFl1Z27/nT3nTPso8ExB+yUS13ya7fNS 3Oehz8VCZ9vkLywMht904b+A0eZAMyHvrhvVDktqFf0ETl4P8+6Oh37XVP1vRXtu bJB3Aikm4M2r4Z92i09x/vNYgpy+ae2HM3nvl0BjGhqqwkhDSJaQNXGjryts61MS BpT4yFbiG17tsMt8pfoAq7fwEeFFD3LGbj4bhISrlGN3H7iQzezhAJQgjiGLgLP+ srHg5dtJV9EHQwrTeqsdUBQ10E6Neq+ShAsrJZQJAJ4+tnQmX2+S0/a2dyhA72rI fE3FFHV8kxRIXA/H6K7SOjkjn1k4jvwG2VmXyOOb+hImiASWTh3uViYfF9dQKXwX w5fnQFsx7DP34GwNlKDbWWAuCT7WDbMMsWZdFBHkPot57WJjBVI7b4ue/EN3GgfX UxUSujSQwxD15wGX5JDk2uMMC12xUDE2ZXknDE/RFXdC7Fem03mol6e6gz0H8z6Q uZDy6FdTgIKKDVKqIrmaJltq3uD5wgDIhW0WQN1j5x8zsERWoFIZEhzgRr+qE7Jx D0ZqyJs54dazgRKKSsaB5V8ETIxyouEP1E3DbVRlsCXjzTzfYLWPYKq8ZERfUJra eNDye/8mx8dvt9ma2Hz8kwzRUyiPKP7k4GBYW7LZc/GZz0Ef5eY= =677c -END PGP SIGNATURE-
[SECURITY] [DSA 4026-1] bchunk security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4026-1 secur...@debian.org https://www.debian.org/security/ Sebastien Delafond November 09, 2017 https://www.debian.org/security/faq - - Package: bchunk CVE ID : CVE-2017-15953 CVE-2017-15954 CVE-2017-15955 Debian Bug : 880116 Wen Bin discovered that bchunk, an application that converts a CD image in bin/cue format into a set of iso and cdr/wav tracks files, did not properly check its input. This would allow malicious users to crash the application or potentially execute arbitrary code. For the oldstable distribution (jessie), these problems have been fixed in version 1.2.0-12+deb8u1. For the stable distribution (stretch), these problems have been fixed in version 1.2.0-12+deb9u1. We recommend that you upgrade your bchunk packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAloEk+wACgkQEL6Jg/PV nWQThAf+O/cqMInKkiwqZ72TdQiADpZgta7ZKCA8gmLMIUwgirZhZxoJAY2AIebR M/QPVlBzyo/W5jxbzZD/YO4ZlbKF/X5opiBW+2oXxnPH92zDSDSYrZ1tCzLBwLZT GzsVdUx+p8AQX0W1NBaX49RG6jyrMA+LwsdwCLAlyvdQsCYASrG0QheFpOHtE6Fh Oe6MbaG3iepNWZl0qEdTQfPO8yEYP6hQ9eUo2dUAnEUyhLvuRPNCtPutS/EhB715 awMvJ4hKQ9g5WaEeZPf5DlLbdpcBY+oVQPe8wrSh+qHnuMGMrtTUwlD/xxrt5uoJ gWxJK6iTJqHS731J1oECJxiQum/MBw== =pVF7 -END PGP SIGNATURE-