Debian 10228 Published by

The following updates has been released for Debian:

[DLA 175-1] gnupg security update
[DSA 3193-1] tcpdump security update
[DSA 3194-1] libxfont security update



[DLA 175-1] gnupg security update

Package : gnupg
Version : 1.4.10-4+squeeze7
CVE ID : CVE-2014-3591 CVE-2015-0837 CVE-2015-1606
Debian Bug : 778652

Multiple vulnerabilities were discovered in GnuPG, the GNU Privacy Guard:

CVE-2014-3591

The Elgamal decryption routine was susceptible to a side-channel
attack discovered by researchers of Tel Aviv University. Ciphertext
blinding was enabled to counteract it. Note that this may have a quite
noticeable impact on Elgamal decryption performance.

CVE-2015-0837

The modular exponentiation routine mpi_powm() was susceptible to a
side-channel attack caused by data-dependent timing variations when
accessing its internal pre-computed table.

CVE-2015-1606

The keyring parsing code did not properly reject certain packet types
not belonging in a keyring, which caused an access to memory already
freed. This could allow remote attackers to cause a denial of service
(crash) via crafted keyring files.

For the oldstable distribution (squeeze), those problems have been fixed in
version 1.4.10-4+squeeze7.

For the stable distribution (wheezy), these problems have been fixed in
version 1.4.12-7+deb7u7.

We recommend that you upgrade your gnupg packages.

[DSA 3193-1] tcpdump security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3193-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
March 17, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : tcpdump
CVE ID : CVE-2015-0261 CVE-2015-2153 CVE-2015-2154 CVE-2015-2155

Several vulnerabilities have been discovered in tcpdump, a command-line
network traffic analyzer. These vulnerabilities might result in denial
of service (application crash) or, potentially, execution of arbitrary
code.

For the stable distribution (wheezy), these problems have been fixed in
version 4.3.0-1+deb7u2.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 4.6.2-4.

For the unstable distribution (sid), these problems have been fixed in
version 4.6.2-4.

We recommend that you upgrade your tcpdump packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3194-1] libxfont security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3194-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 17, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libxfont
CVE ID : CVE-2015-1802 CVE-2015-1803 CVE-2015-1804

Ilja van Sprundel, Alan Coopersmith and William Robinet discovered
multiple issues in libxfont's code to process BDF fonts, which might
result in privilege escalation.

For the stable distribution (wheezy), these problems have been fixed in
version 1.4.5-5.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your libxfont packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/