The following updates has been released for Debian:
[DLA 552-1] binutils security update
[DSA 3621-1] mysql-connector-java security update
[DSA 3622-1] python-django security update
[DLA 552-1] binutils security update
[DSA 3621-1] mysql-connector-java security update
[DSA 3622-1] python-django security update
[DLA 552-1] binutils security update
Package : binutils
Version : 2.22-8+deb7u3
CVE ID : CVE-2016-2226 CVE-2016-4487 CVE-2016-4488 CVE-2016-4489
CVE-2016-4490 CVE-2016-4492 CVE-2016-4493 CVE-2016-6131
Some minor security issues have been identified and fixed in binutils in
Debian LTS. These are:
CVE-2016-2226
Exploitable buffer overflow.
CVE-2016-4487
Invalid write due to a use-after-free to array btypevec.
CVE-2016-4488
Invalid write due to a use-after-free to array ktypevec.
CVE-2016-4489
Invalid write due to integer overflow.
CVE-2016-4490
Write access violation.
CVE-2016-4492
Write access violations.
CVE-2016-4493
Read access violations.
CVE-2016-6131
Stack buffer overflow when printing bad bytes in Intel Hex objects
For Debian 7 "Wheezy", these problems have been fixed in version
2.22-8+deb7u3.
We recommend that you upgrade your binutils packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DSA 3621-1] mysql-connector-java security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3621-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 18, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mysql-connector-java
CVE ID : CVE-2015-2575
A vulnerability was discovered in mysql-connector-java, a Java database
(JDBC) driver for MySQL, which may result in unauthorized update, insert
or delete access to some MySQL Connectors accessible data as well as
read access to a subset of MySQL Connectors accessible data. The
vulnerability was addressed by upgrading mysql-connector-java to the new
upstream version 5.1.39, which includes additional changes, such as bug
fixes, new features, and possibly incompatible changes. Please see the
MySQL Connector/J Release Notes and Oracle's Critical Patch Update
advisory for further details:
https://dev.mysql.com/doc/relnotes/connector-j/5.1/en/news-5-1.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html#AppendixMSQL
For the stable distribution (jessie), this problem has been fixed in
version 5.1.39-1~deb8u1.
We recommend that you upgrade your mysql-connector-java packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3622-1] python-django security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3622-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 18, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : python-django
CVE ID : CVE-2016-6186
It was discovered that Django, a high-level Python web development
framework, is prone to a cross-site scripting vulnerability in the
admin's add/change related popup.
For the stable distribution (jessie), this problem has been fixed in
version 1.7.7-1+deb8u5.
We recommend that you upgrade your python-django packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/