[SECURITY] [DSA 4029-1] postgresql-common security update

2017-11-09 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4029-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
November 09, 2017 https://www.debian.org/security/faq
- -

Package: postgresql-common
CVE ID : CVE-2017-8806

It was discovered that the pg_ctlcluster, pg_createcluster and
pg_upgradecluster commands handled symbolic links insecurely which could
result in local denial of service by overwriting arbitrary files.

For the oldstable distribution (jessie), this problem has been fixed
in version 165+deb8u3.

For the stable distribution (stretch), this problem has been fixed in
version 181+deb9u1.

We recommend that you upgrade your postgresql-common packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=HMzZ
-END PGP SIGNATURE-



[SECURITY] [DSA 4027-1] postgresql-9.4 security update

2017-11-09 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4027-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
November 09, 2017 https://www.debian.org/security/faq
- -

Package: postgresql-9.4
CVE ID : CVE-2017-15098

A vulnerabilitiy has been found in the PostgreSQL database system:
Denial of service and potential memory disclosure in the
json_populate_recordset() and jsonb_populate_recordset() functions.

For the oldstable distribution (jessie), this problem has been fixed
in version 9.4.15-0+deb8u1.

We recommend that you upgrade your postgresql-9.4 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=Eg5u
-END PGP SIGNATURE-



[SECURITY] [DSA 4030-1] roundcube security update

2017-11-09 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4030-1   secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 09, 2017 https://www.debian.org/security/faq
- -

Package: roundcube
CVE ID : CVE-2017-16651

A file disclosure vulnerability was discovered in roundcube, a skinnable
AJAX based webmail solution for IMAP servers. An authenticated attacker
can take advantage of this flaw to read roundcube's configuration files.

For the stable distribution (stretch), this problem has been fixed in
version 1.2.3+dfsg.1-4+deb9u1.

For the unstable distribution (sid), this problem has been fixed in
version 1.3.3+dfsg.1-1.

We recommend that you upgrade your roundcube packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=677c
-END PGP SIGNATURE-



[SECURITY] [DSA 4026-1] bchunk security update

2017-11-09 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4026-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
November 09, 2017 https://www.debian.org/security/faq
- -

Package: bchunk
CVE ID : CVE-2017-15953 CVE-2017-15954 CVE-2017-15955
Debian Bug : 880116

Wen Bin discovered that bchunk, an application that converts a CD
image in bin/cue format into a set of iso and cdr/wav tracks files,
did not properly check its input. This would allow malicious users to
crash the application or potentially execute arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.2.0-12+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1.2.0-12+deb9u1.

We recommend that you upgrade your bchunk packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAloEk+wACgkQEL6Jg/PV
nWQThAf+O/cqMInKkiwqZ72TdQiADpZgta7ZKCA8gmLMIUwgirZhZxoJAY2AIebR
M/QPVlBzyo/W5jxbzZD/YO4ZlbKF/X5opiBW+2oXxnPH92zDSDSYrZ1tCzLBwLZT
GzsVdUx+p8AQX0W1NBaX49RG6jyrMA+LwsdwCLAlyvdQsCYASrG0QheFpOHtE6Fh
Oe6MbaG3iepNWZl0qEdTQfPO8yEYP6hQ9eUo2dUAnEUyhLvuRPNCtPutS/EhB715
awMvJ4hKQ9g5WaEeZPf5DlLbdpcBY+oVQPe8wrSh+qHnuMGMrtTUwlD/xxrt5uoJ
gWxJK6iTJqHS731J1oECJxiQum/MBw==
=pVF7
-END PGP SIGNATURE-