Debian 10225 Published by

The following updates are available for Debian:

[DSA 3504-1] bsh security update
[DSA 3505-1] wireshark security update
[DSA 3506-1] libav security update



[DSA 3504-1] bsh security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3504-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
March 04, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : bsh
CVE ID : CVE-2016-2510

Alvaro Muñoz and Christian Schneider discovered that BeanShell, an
embeddable Java source interpreter, could be leveraged to execute
arbitrary commands: applications including BeanShell in their
classpath are vulnerable to this flaw if they deserialize data from an
untrusted source.

For the oldstable distribution (wheezy), this problem has been fixed
in version 2.0b4-12+deb7u1.

For the stable distribution (jessie), this problem has been fixed in
version 2.0b4-15+deb8u1.

For the testing distribution (stretch) and unstable distribution
(sid), this problem has been fixed in version 2.0b4-16.

We recommend that you upgrade your bsh packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3505-1] wireshark security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3505-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 04, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : wireshark
CVE ID : CVE-2015-7830 CVE-2015-8711 CVE-2015-8712 CVE-2015-8713
CVE-2015-8714 CVE-2015-8715 CVE-2015-8716 CVE-2015-8717
CVE-2015-8718 CVE-2015-8719 CVE-2015-8720 CVE-2015-8721
CVE-2015-8722 CVE-2015-8723 CVE-2015-8724 CVE-2015-8725
CVE-2015-8726 CVE-2015-8727 CVE-2015-8728 CVE-2015-8729
CVE-2015-8730 CVE-2015-8732 CVE-2015-8733

Multiple vulnerabilities were discovered in the dissectors/parsers for
Pcapng, NBAP, UMTS FP, DCOM, AllJoyn, T.38, SDP, NLM, DNS, BED, SCTP,
802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A, Ascend, NBAP, ZigBee ZCL
and Sniffer which could result in denial of service.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.8.2-5wheezy17.

For the stable distribution (jessie), these problems have been fixed in
version 1.12.1+g01b65bf-4+deb8u4.

For the testing distribution (stretch), these problems have been fixed
in version 2.0.2+ga16e22e-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.0.2+ga16e22e-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3506-1] libav security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3506-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 04, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libav
CVE ID : CVE-2016-1897 CVE-2016-1898 CVE-2016-2326

Several security issues have been corrected in multiple demuxers and
decoders of the libav multimedia library.

For the oldstable distribution (wheezy), these problems have been fixed
in version 6:0.8.17-2.

For the stable distribution (jessie), libav has been updated to
11.6-1~deb8u1 which brings several further bugfixes as detailed in
the upstream changelog:
https://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v11.6

We recommend that you upgrade your libav packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/