[SECURITY] [DSA 4057-1] erlang security update

2017-12-07 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4057-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
December 08, 2017 https://www.debian.org/security/faq
- -

Package: erlang
CVE ID : CVE-2017-1000385

It was discovered that the TLS server in Erlang is vulnerable to an
adaptive chosen ciphertext attack against RSA keys.

For the oldstable distribution (jessie), this problem has been fixed
in version 1:17.3-dfsg-4+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 1:19.2.1+dfsg-2+deb9u1.

We recommend that you upgrade your erlang packages.

For the detailed security status of erlang please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/erlang

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=RfhS
-END PGP SIGNATURE-



[SECURITY] [DSA 4056-1] nova security update

2017-12-07 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4056-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
December 07, 2017 https://www.debian.org/security/faq
- -

Package: nova
CVE ID : CVE-2017-16239
Debian Bug : 882009

George Shuklin from servers.com discovered that Nova, a cloud
computing fabric controller, did not correctly enforce its image- or
hosts-filters. This allowed an authenticated user to bypass those
filters by simply rebuilding an instance.

For the stable distribution (stretch), this problem has been fixed in
version 2:14.0.0-4+deb9u1.

We recommend that you upgrade your nova packages.

For the detailed security status of nova please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nova

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlopB00ACgkQEL6Jg/PV
nWQvGwgAh+clzIDc7FdEhuYFSmGPz8XOxnIsvyymeYxvz/M3gCkQU2tdw/80Jv78
Y35pP1g8u/rq1Ub4cV6QAZt1UK571m8qXFqh/mnxOwFuqQJrkY0L8pu93anRVAz3
uwPlwC3jKo4dEyi4QDphGc54qiqf28twWz8iX+XdnBVG++T7ZAZykbqU5+WlNpQF
5kpbFsUV38W6jP2VyQ/2/Uozh839rnhBmQ/Sy9gIbIeycbp0Veigwh5PVnXgXqvA
83O8oTr2++5prB24ESFcl8FQ82kjs2suf4M1IbLJyJrsT6X1VORcYz6PPW/v3EVq
whmgpC6orU68AoPGo4FDHV8UpH7HoA==
=+GR1
-END PGP SIGNATURE-



[SECURITY] [DSA 4055-1] heimdal security update

2017-12-07 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-4055-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
December 07, 2017 https://www.debian.org/security/faq
- -

Package: heimdal
CVE ID : CVE-2017-17439
Debian Bug : 878144

Michael Eder and Thomas Kittel discovered that Heimdal, an
implementation of Kerberos 5 that aims to be compatible with MIT
Kerberos, did not correctly handle ASN.1 data. This would allow an
unauthenticated remote attacker to cause a denial of service (crash of
the KDC daemon) by sending maliciously crafted packets.

For the stable distribution (stretch), this problem has been fixed in
version 7.1.0+dfsg-13+deb9u2.

We recommend that you upgrade your heimdal packages.

For the detailed security status of heimdal please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/heimdal

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAloo8VsACgkQEL6Jg/PV
nWQsrQgAkOt019q15yl6Ctx1SzWHNT0NfOFybG8WzMp1TZ3JzjsoRUSffymWKceB
mJiuim5J+5se2+bVEMkblsXuNmbqnn1EaTwZ6XjI41J5Kv+/2qvbGsosvGP8JdTB
0cHWgSyNTaV8mwD745AoctIN8BL/5lxO3r7LjC8Mpw+W7l3XjhK6SfGL2QHd65BY
6K2r1hHTypOM3iLSNnWC2nR9/4OK5RU2JBvK9kjP4cRJJzZX7JacR53tO/+bY4eL
5fEzXexh97jNW7M5svJtCsdyoEwauAtkIl6noLGTs+K/a8afw8VU0gDQfTD35d3H
e+rG1WMEv0H1tYQGdIKOGqtWYuNQKQ==
=iHQJ
-END PGP SIGNATURE-