Debian 10225 Published by

The following updates has been released for Debian:

[DLA 552-1] binutils security update
[DSA 3621-1] mysql-connector-java security update
[DSA 3622-1] python-django security update



[DLA 552-1] binutils security update

Package : binutils
Version : 2.22-8+deb7u3
CVE ID : CVE-2016-2226 CVE-2016-4487 CVE-2016-4488 CVE-2016-4489
CVE-2016-4490 CVE-2016-4492 CVE-2016-4493 CVE-2016-6131

Some minor security issues have been identified and fixed in binutils in
Debian LTS. These are:

CVE-2016-2226

Exploitable buffer overflow.

CVE-2016-4487

Invalid write due to a use-after-free to array btypevec.

CVE-2016-4488

Invalid write due to a use-after-free to array ktypevec.

CVE-2016-4489

Invalid write due to integer overflow.

CVE-2016-4490

Write access violation.

CVE-2016-4492

Write access violations.

CVE-2016-4493

Read access violations.

CVE-2016-6131

Stack buffer overflow when printing bad bytes in Intel Hex objects

For Debian 7 "Wheezy", these problems have been fixed in version
2.22-8+deb7u3.

We recommend that you upgrade your binutils packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DSA 3621-1] mysql-connector-java security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3621-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 18, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mysql-connector-java
CVE ID : CVE-2015-2575

A vulnerability was discovered in mysql-connector-java, a Java database
(JDBC) driver for MySQL, which may result in unauthorized update, insert
or delete access to some MySQL Connectors accessible data as well as
read access to a subset of MySQL Connectors accessible data. The
vulnerability was addressed by upgrading mysql-connector-java to the new
upstream version 5.1.39, which includes additional changes, such as bug
fixes, new features, and possibly incompatible changes. Please see the
MySQL Connector/J Release Notes and Oracle's Critical Patch Update
advisory for further details:

https://dev.mysql.com/doc/relnotes/connector-j/5.1/en/news-5-1.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html#AppendixMSQL

For the stable distribution (jessie), this problem has been fixed in
version 5.1.39-1~deb8u1.

We recommend that you upgrade your mysql-connector-java packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3622-1] python-django security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3622-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 18, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : python-django
CVE ID : CVE-2016-6186

It was discovered that Django, a high-level Python web development
framework, is prone to a cross-site scripting vulnerability in the
admin's add/change related popup.

For the stable distribution (jessie), this problem has been fixed in
version 1.7.7-1+deb8u5.

We recommend that you upgrade your python-django packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/