Debian 10223 Published by

The following updates has been released for Debian GNU/Linux:

Debian GNU/Linux 8 LTS:
DLA 1463-1: sam2p security update

Debian GNU/Linux 9:
DSA 4268-1: openjdk-8 security update
DSA 4269-1: postgresql-9.6 security update



DLA 1463-1: sam2p security update

Package : sam2p
Version : 0.49.2-3+deb8u3
CVE ID : CVE-2018-12578 CVE-2018-12601


Various vulnerabilities leading to denial of service or possible unspecified
other impacts were discovered in sam2p, an utility to convert raster images to
EPS, PDF, and other formats.

CVE-2018-12578

A heap-buffer-overflow in bmp_compress1_row. Thanks to Peter Szabo for
providing a fix.

CVE-2018-12601

A heap-buffer-overflow in function ReadImage, in file input-tga.ci. Thanks
to Peter Szabo for providing a fix.

For Debian 8 "Jessie", these problems have been fixed in version
0.49.2-3+deb8u3.

We recommend that you upgrade your sam2p packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



DSA 4268-1: openjdk-8 security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4268-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 10, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openjdk-8
CVE ID : CVE-2018-2952

It was discovered that the PatternSyntaxException class in the
Concurrency component of OpenJDK, an implementation of the Oracle Java
platform could result in denial of service via excessive memory
consumption.

For the stable distribution (stretch), this problem has been fixed in
version 8u181-b13-1~deb9u1.

We recommend that you upgrade your openjdk-8 packages.

For the detailed security status of openjdk-8 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjdk-8

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/



DSA 4269-1: postgresql-9.6 security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4269-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 10, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : postgresql-9.6
CVE ID : CVE-2018-10915 CVE-2018-10925

Two vulnerabilities have been found in the PostgreSQL database system:

CVE-2018-10915

Andrew Krasichkov discovered that libpq did not reset all its
connection state during reconnects.

CVE-2018-10925

It was discovered that some "CREATE TABLE" statements could
disclose server memory.

For additional information please refer to the upstream announcement
at https://www.postgresql.org/about/news/1878/

For the stable distribution (stretch), these problems have been fixed in
version 9.6.10-0+deb9u1.

We recommend that you upgrade your postgresql-9.6 packages.

For the detailed security status of postgresql-9.6 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/postgresql-9.6

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/