The following Debian 7 updates has been released:
[DSA 3183-1] movabletype-opensource security update
[DSA 3184-1] gnupg security update
[DSA 3185-1] libgcrypt11 security update
[DSA 3183-1] movabletype-opensource security update
[DSA 3184-1] gnupg security update
[DSA 3185-1] libgcrypt11 security update
[DSA 3183-1] movabletype-opensource security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3183-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
March 12, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : movabletype-opensource
CVE ID : CVE-2013-2184 CVE-2014-9057 CVE-2015-1592
Debian Bug : 712602 774192
Multiple vulnerabilities have been discovered in Movable Type, a
blogging system. The Common Vulnerabilities and Exposures project
identifies the following problems:
CVE-2013-2184
Unsafe use of Storable::thaw in the handling of comments to blog
posts could allow remote attackers to include and execute arbitrary
local Perl files or possibly remotely execute arbitrary code.
CVE-2014-9057
Netanel Rubin from Check Point Software Technologies discovered a
SQL injection vulnerability in the XML-RPC interface allowing
remote attackers to execute arbitrary SQL commands.
CVE-2015-1592
The Perl Storable::thaw function is not properly used, allowing
remote attackers to include and execute arbitrary local Perl files
and possibly remotely execute arbitrary code.
For the stable distribution (wheezy), these problems have been fixed in
version 5.1.4+dfsg-4+deb7u2.
We recommend that you upgrade your movabletype-opensource packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3184-1] gnupg security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3184-1 security@debian.org
http://www.debian.org/security/ Alessandro Ghedini
March 12, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : gnupg
CVE ID : CVE-2014-3591 CVE-2015-0837 CVE-2015-1606
Multiple vulnerabilities were discovered in GnuPG, the GNU Privacy Guard:
CVE-2014-3591
The Elgamal decryption routine was susceptible to a side-channel
attack discovered by researchers of Tel Aviv University. Ciphertext
blinding was enabled to counteract it. Note that this may have a
quite noticeable impact on Elgamal decryption performance.
CVE-2015-0837
The modular exponentiation routine mpi_powm() was susceptible to a
side-channel attack caused by data-dependent timing variations when
accessing its internal pre-computed table.
CVE-2015-1606
The keyring parsing code did not properly reject certain packet
types not belonging in a keyring, which caused an access to memory
already freed. This could allow remote attackers to cause a denial
of service (crash) via crafted keyring files.
For the stable distribution (wheezy), these problems have been fixed in
version 1.4.12-7+deb7u7.
For the upcoming stable distribution (jessie), these problems have been
fixed in version 1.4.18-7.
For the unstable distribution (sid), these problems have been fixed in
version 1.4.18-7.
We recommend that you upgrade your gnupg packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3185-1] libgcrypt11 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3185-1 security@debian.org
http://www.debian.org/security/ Alessandro Ghedini
March 12, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libgcrypt11
CVE ID : CVE-2014-3591 CVE-2015-0837
Multiple vulnerabilities were discovered in libgcrypt:
CVE-2014-3591
The Elgamal decryption routine was susceptible to a side-channel
attack discovered by researchers of Tel Aviv University. Ciphertext
blinding was enabled to counteract it. Note that this may have a
quite noticeable impact on Elgamal decryption performance.
CVE-2015-0837
The modular exponentiation routine mpi_powm() was susceptible to a
side-channel attack caused by data-dependent timing variations when
accessing its internal pre-computed table.
For the stable distribution (wheezy), these problems have been fixed in
version 1.5.0-5+deb7u3.
We recommend that you upgrade your libgcrypt11 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/