[SECURITY] [DSA 4057-1] erlang security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4057-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 08, 2017 https://www.debian.org/security/faq - - Package: erlang CVE ID : CVE-2017-1000385 It was discovered that the TLS server in Erlang is vulnerable to an adaptive chosen ciphertext attack against RSA keys. For the oldstable distribution (jessie), this problem has been fixed in version 1:17.3-dfsg-4+deb8u2. For the stable distribution (stretch), this problem has been fixed in version 1:19.2.1+dfsg-2+deb9u1. We recommend that you upgrade your erlang packages. For the detailed security status of erlang please refer to its security tracker page at: https://security-tracker.debian.org/tracker/erlang Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAloqNiMACgkQEMKTtsN8 TjbKTw/+IoaiI8d04yTl1wj3IqqcBA7ugnjzuPJYxopWe/dGTc1jEWuPBHtU9W/u em4wtkQL2IKKuQWprjBLarbDol6VRJLJARWL0kEbUdGzqmmeFN3BqTzo1FsoUhhB eusdHegnsZmXJeUCJ86Vt1RFJqZjxpms04pgf7YO6Gg2lxvNDFx3nnJ9qdZmRMHG h2V88hkc7GEkUAaYhDkTtOIZzUXRGPD9gOu8+H40mGuZI9rmqJ5Sgv79L5huQRU8 Ju5SSR8RYgP26q1X+6dDFGRRNrXVvNPik2bblEEnWi4rKBVW2fgl1Olrvr5NnWLr 32K2j7m2Lzy26gHvs4s3p3Eo0oaLqZHlyWzxyDp7DhwU6xY1x6rWwCjbBNlYIeFN uXoi2M0H9A9bWg7t1sEe8JbataLxtINHCW3v9rqsjizAiiRTWRKuIUxn+PR1nEjq N6ZGzTyCgKsqmvFuuZaJ65d0wLGTkiOMEK3C3euEse8oK72TA5EAu4mJ4tz+gBuq 1IBJwR5danj3c/x+G65Uxl2povGdblCNztN+7+EOgf17HfChMO1yYpWe3dL+4VFA oq999Ofbj86VUoWQ0k1toqpsO2p3vxIJBmHldwbylTyLnj62UUljq20C9jAX5bM6 S92QU9h+OEHYg+OznWAtkKEpDUJMvmCjZJDHBnRm8qLBqbz57sE= =RfhS -END PGP SIGNATURE-
[SECURITY] [DSA 4056-1] nova security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4056-1 secur...@debian.org https://www.debian.org/security/ Sebastien Delafond December 07, 2017 https://www.debian.org/security/faq - - Package: nova CVE ID : CVE-2017-16239 Debian Bug : 882009 George Shuklin from servers.com discovered that Nova, a cloud computing fabric controller, did not correctly enforce its image- or hosts-filters. This allowed an authenticated user to bypass those filters by simply rebuilding an instance. For the stable distribution (stretch), this problem has been fixed in version 2:14.0.0-4+deb9u1. We recommend that you upgrade your nova packages. For the detailed security status of nova please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nova Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlopB00ACgkQEL6Jg/PV nWQvGwgAh+clzIDc7FdEhuYFSmGPz8XOxnIsvyymeYxvz/M3gCkQU2tdw/80Jv78 Y35pP1g8u/rq1Ub4cV6QAZt1UK571m8qXFqh/mnxOwFuqQJrkY0L8pu93anRVAz3 uwPlwC3jKo4dEyi4QDphGc54qiqf28twWz8iX+XdnBVG++T7ZAZykbqU5+WlNpQF 5kpbFsUV38W6jP2VyQ/2/Uozh839rnhBmQ/Sy9gIbIeycbp0Veigwh5PVnXgXqvA 83O8oTr2++5prB24ESFcl8FQ82kjs2suf4M1IbLJyJrsT6X1VORcYz6PPW/v3EVq whmgpC6orU68AoPGo4FDHV8UpH7HoA== =+GR1 -END PGP SIGNATURE-
[SECURITY] [DSA 4055-1] heimdal security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-4055-1 secur...@debian.org https://www.debian.org/security/ Sebastien Delafond December 07, 2017 https://www.debian.org/security/faq - - Package: heimdal CVE ID : CVE-2017-17439 Debian Bug : 878144 Michael Eder and Thomas Kittel discovered that Heimdal, an implementation of Kerberos 5 that aims to be compatible with MIT Kerberos, did not correctly handle ASN.1 data. This would allow an unauthenticated remote attacker to cause a denial of service (crash of the KDC daemon) by sending maliciously crafted packets. For the stable distribution (stretch), this problem has been fixed in version 7.1.0+dfsg-13+deb9u2. We recommend that you upgrade your heimdal packages. For the detailed security status of heimdal please refer to its security tracker page at: https://security-tracker.debian.org/tracker/heimdal Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAloo8VsACgkQEL6Jg/PV nWQsrQgAkOt019q15yl6Ctx1SzWHNT0NfOFybG8WzMp1TZ3JzjsoRUSffymWKceB mJiuim5J+5se2+bVEMkblsXuNmbqnn1EaTwZ6XjI41J5Kv+/2qvbGsosvGP8JdTB 0cHWgSyNTaV8mwD745AoctIN8BL/5lxO3r7LjC8Mpw+W7l3XjhK6SfGL2QHd65BY 6K2r1hHTypOM3iLSNnWC2nR9/4OK5RU2JBvK9kjP4cRJJzZX7JacR53tO/+bY4eL 5fEzXexh97jNW7M5svJtCsdyoEwauAtkIl6noLGTs+K/a8afw8VU0gDQfTD35d3H e+rG1WMEv0H1tYQGdIKOGqtWYuNQKQ== =iHQJ -END PGP SIGNATURE-