The following updates has been released for Debian:
[DSA 3613-1] libvirt security update
[DSA 3614-1] tomcat7 security update
[DSA 3615-1] wireshark security update
[DSA 3613-1] libvirt security update
[DSA 3614-1] tomcat7 security update
[DSA 3615-1] wireshark security update
[DSA 3613-1] libvirt security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3613-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 02, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libvirt
CVE ID : CVE-2016-5008
Vivian Zhang and Christoph Anton Mitterer discovered that setting an
empty VNC password does not work as documented in Libvirt, a
virtualisation abstraction library. When the password on a VNC server is
set to the empty string, authentication on the VNC server will be
disabled, allowing any user to connect, despite the documentation
declaring that setting an empty password for the VNC server prevents all
client connections. With this update the behaviour is enforced by
setting the password expiration to "now".
For the stable distribution (jessie), this problem has been fixed in
version 1.2.9-9+deb8u3.
For the unstable distribution (sid), this problem has been fixed in
version 2.0.0-1.
We recommend that you upgrade your libvirt packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3614-1] tomcat7 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3614-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 02, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : tomcat7
CVE ID : CVE-2016-3092
The TERASOLUNA Framework Development Team discovered a denial of service
vulnerability in Apache Commons FileUpload, a package to make it
easy to add robust, high-performance, file upload capability to servlets
and web applications. A remote attacker can take advantage of this flaw
by sending file upload requests that cause the HTTP server using the
Apache Commons Fileupload library to become unresponsive, preventing the
server from servicing other requests.
Apache Tomcat uses a package renamed copy of Apache Commons FileUpload
to implement the file upload requirements of the Servlet specification
and is therefore also vulnerable to the denial of service vulnerability.
For the stable distribution (jessie), this problem has been fixed in
version 7.0.56-3+deb8u3.
For the testing distribution (stretch), this problem has been fixed
in version 7.0.70-1.
For the unstable distribution (sid), this problem has been fixed in
version 7.0.70-1.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3615-1] wireshark security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3615-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 02, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : wireshark
CVE ID : CVE-2016-5350 CVE-2016-5351 CVE-2016-5353 CVE-2016-5354
CVE-2016-5355 CVE-2016-5356 CVE-2016-5357 CVE-2016-5359
Multiple vulnerabilities were discovered in the dissectors/parsers for
PKTC, IAX2, GSM CBCH and NCP, SPOOLS, IEEE 802.11, UMTS FP, USB,
Toshiba, CoSine, NetScreen, WBXML which could result in denial of service
or potentially the execution of arbitrary code.
For the stable distribution (jessie), these problems have been fixed in
version 1.12.1+g01b65bf-4+deb8u7.
For the testing distribution (stretch), these problems have been fixed
in version 2.0.4+gdd7746e-1.
For the unstable distribution (sid), these problems have been fixed in
version 2.0.4+gdd7746e-1.
We recommend that you upgrade your wireshark packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/