Debian 10225 Published by

The following updates has been released for Debian GNU/Linux:

[DLA 268-1] virtualbox-ose security update
[DSA 3302-1] libwmf security update



[DLA 268-1] virtualbox-ose security update

Package : virtualbox-ose
Version : 3.2.10-dfsg-1+squeeze4
CVE ID : CVE-2015-0377 CVE-2015-0418 CVE-2015-3456
Debian Bug : #775888 #785424

Three vulnerabilities have been fixed in the Debian squeeze-lts version of
VirtualBox (package name: virtualbox-ose), a x86 virtualisation solution.

CVE-2015-0377

Avoid VirtualBox allowing local users to affect availability via
unknown vectors related to Core, which might result in denial of
service. (Other issue than CVE-2015-0418).

CVE-2015-0418

Avoid VirtualBox allowing local users to affect availability via
unknown vectors related to Core, which might result in denial of
service. (Other issue than CVE-2015-0377).


CVE-2015-3456

The Floppy Disk Controller (FDC) in QEMU, also used in VirtualBox and
other virtualization products, allowed local guest users to cause a
denial of service (out-of-bounds write and guest crash) or possibly
execute arbitrary code via the (1) FD_CMD_READ_ID, (2)
FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands,
aka VENOM.

[DSA 3302-1] libwmf security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3302-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 06, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libwmf
CVE ID : CVE-2015-0848 CVE-2015-4588 CVE-2015-4695 CVE-2015-4696

Insufficient input sanitising in libwmf, a library to process Windows
metafile data, may result in denial of service or the execution of
arbitrary code if a malformed WMF file is opened.

For the oldstable distribution (wheezy), these problems have been fixed
in version 0.2.8.4-10.3+deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 0.2.8.4-10.3+deb8u1.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your libwmf packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/