Debian 10240 Published by

The following security updates has been released for Debian GNU/Linux: [SECURITY] [DSA 2340-1] postgresql security update, [SECURITY] [DSA 2336-1] ffmpeg security update, [SECURITY] [DSA 2339-1] nss security update, and [SECURITY] [DSA 2338-1] moodle security update



[SECURITY] [DSA 2340-1] postgresql security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2340-1 security@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
November 7, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : postgresql-8.3, postgresql-8.4, postgresql-9.0
Vulnerability : weak password hashing
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-2483
Debian Bug : 631285

magnum discovered that the blowfish password hashing used amongst
others in PostgreSQL contained a weakness that would give passwords
with 8 bit characters the same hash as weaker equivalents.

For the oldstable distribution (lenny), this problem has been fixed in
postgresql-8.3 version 8.3.16-0lenny1.

For the stable distribution (squeeze), this problem has been fixed in
postgresql-8.4 version 8.4.9-0squeeze1.

For the testing distribution (wheezy) and unstable distribution (sid),
this problem has been fixed in postgresql-8.4 version 8.4.9-1,
postgresql-9.0 9.0.5-1 and postgresql-9.1 9.1~rc1-1.

The updates also include reliability improvements, originally scheduled
for inclusion into the next point release; for details see the respective
changelogs.

We recommend that you upgrade your postgresql packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

[SECURITY] [DSA 2336-1] ffmpeg security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2336-1 security@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 07, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : ffmpeg
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-3362 CVE-2011-3973 CVE-2011-3974 CVE-2011-3504
Debian Bug : 641478

Multiple vulnerabilities were found in the ffmpeg, a multimedia player,
server and encoder:

CVE-2011-3362

An integer signedness error in decode_residual_block function of
the Chinese AVS video (CAVS) decoder in libavcodec can lead to
denial of service (memory corruption and application crash) or
possible code execution via a crafted CAVS file.

CVE-2011-3973/CVE-2011-3974

Multiple errors in the Chinese AVS video (CAVS) decoder can lead to
denial of service (memory corruption and application crash) via an
invalid bitstream.

CVE-2011-3504

A memory allocation problem in the Matroska format decoder can lead
to code execution via a crafted file.

For the stable distribution (squeeze), this problem has been fixed in
version 4:0.5.5-1.

For the unstable distribution (sid), this problem has been fixed in
version 4:0.7.2-1 of the libav source package.

Security support for ffmpeg has been discontinued for the oldstable
distribution (lenny) before in DSA 2306.
The current version in oldstable is not supported by upstream anymore
and is affected by several security issues. Backporting fixes for these
and any future issues has become unfeasible and therefore we needed to
drop our security support for the version in oldstable.

We recommend that you upgrade your ffmpeg packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
[SECURITY] [DSA 2339-1] nss security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2339-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
November 07, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : nss
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-3640
Debian Bug : 647614

This update to the NSS cryptographic libraries revokes the trust in the
"DigiCert Sdn. Bhd" certificate authority. More information can be found
in the Mozilla Security Blog:
http://blog.mozilla.com/security/2011/11/03/revoking-trust-in-digicert-sdn-bhd-intermediate-certificate-authority/

This update also fixes an insecure load path for pkcs11.txt configuration
file (CVE-2011-3640).

For the oldstable distribution (lenny), this problem has been fixed in
version 3.12.3.1-0lenny7.

For the stable distribution (squeeze), this problem has been fixed in
version 3.12.8-1+squeeze4.

For the unstable distribution (sid), this problem has been fixed in
version 3.13.1.with.ckbi.1.88-1.

We recommend that you upgrade your nss packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

[SECURITY] [DSA 2338-1] moodle security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2338-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
November 07, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : moodle
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : not yet available

Several cross-site scripting and information disclosure issues have
been fixed in Moodle, a course management system for online learning:

* MSA-11-0020 Continue links in error messages can lead offsite
* MSA-11-0024 Recaptcha images were being authenticated from an older
server
* MSA-11-0025 Group names in user upload CSV not escaped
* MSA-11-0026 Fields in user upload CSV not escaped
* MSA-11-0031 Forms API constant issue
* MSA-11-0032 MNET SSL validation issue
* MSA-11-0036 Messaging refresh vulnerability
* MSA-11-0037 Course section editing injection vulnerability
* MSA-11-0038 Database injection protection strengthened

For the stable distribution (squeeze), this problem has been fixed in
version 1.9.9.dfsg2-2.1+squeeze2.

For the unstable distribution (sid), this problem has been fixed in
version 1.9.9.dfsg2-4.

We recommend that you upgrade your moodle packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/