Debian 10263 Published by

The following security updates has been released for Debian GNU/Linux:

Debian GNU/Linux 7 LTS:
DLA 1312-1: libvorbisidec security update
DLA 1313-1: isc-dhcp security update

Debian GNU/Linux 8 and 9:
DSA 4148-1: kamailio security update
DSA 4149-1: plexus-utils2 security update



DLA 1312-1: libvorbisidec security update




Package : libvorbisidec
Version : 1.0.2+svn18153-0.2+deb7u1
CVE ID : CVE-2018-5147


Huzaifa Sidhpurwala discovered that an out-of-bounds memory write in the
codebook parsing code of the Libtremor multimedia library could result
in the execution of arbitrary code if a malformed Vorbis file is opened.


For Debian 7 "Wheezy", these problems have been fixed in version
1.0.2+svn18153-0.2+deb7u1.

We recommend that you upgrade your libvorbisidec packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



DLA 1313-1: isc-dhcp security update




Package : isc-dhcp
Version : 4.2.2.dfsg.1-5+deb70u9
CVE ID : CVE-2018-5732 CVE-2018-5733


Several vulnerabilities have been discovered in the ISC DHCP client,
relay and server. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2018-5732

Felix Wilhelm of the Google Security Team discovered that the DHCP
client is prone to an out-of-bound memory access vulnerability when
processing specially constructed DHCP options responses, resulting
in potential execution of arbitrary code by a malicious DHCP server.

CVE-2018-5733

Felix Wilhelm of the Google Security Team discovered that the DHCP
server does not properly handle reference counting when processing
client requests. A malicious client can take advantage of this flaw
to cause a denial of service (dhcpd crash) by sending large amounts
of traffic.


For Debian 7 "Wheezy", these problems have been fixed in version
4.2.2.dfsg.1-5+deb70u9.

We recommend that you upgrade your isc-dhcp packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



DSA 4148-1: kamailio security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4148-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 22, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : kamailio
CVE ID : CVE-2018-8828

Alfred Farrugia and Sandro Gauci discovered an off-by-one heap overflow
in the Kamailio SIP server which could result in denial of service and
potentially the execution of arbitrary code.

For the oldstable distribution (jessie), this problem has been fixed
in version 4.2.0-2+deb8u3.

For the stable distribution (stretch), this problem has been fixed in
version 4.4.4-2+deb9u1.

We recommend that you upgrade your kamailio packages.

For the detailed security status of kamailio please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/kamailio

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/



DSA 4149-1: plexus-utils2 security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4149-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 22, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : plexus-utils2
CVE ID : CVE-2017-1000487

Charles Duffy discovered that the Commandline class in the utilities for
the Plexus framework performs insufficient quoting of double-encoded
strings, which could result in the execution of arbitrary shell commands.

For the oldstable distribution (jessie), this problem has been fixed
in version 3.0.15-1+deb8u1.

For the stable distribution (stretch), this problem has been prior to
the initial release.

We recommend that you upgrade your plexus-utils2 packages.

For the detailed security status of plexus-utils2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/plexus-utils2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/