Debian 10225 Published by

The following 4 updates has been released for Debian GNU/Linux:

[DLA 125-1] mime-support security update
[DLA 126-1] ettercap security update
[DSA 3115-1] pyyaml security update
[DSA 3116-1] polarssl security update



[DLA 125-1] mime-support security update

Package : mime-support
Version : 3.48-1+deb6u1
CVE ID : CVE-2014-7209

Timothy D. Morgan discovered that run-mailcap, an utility to execute
programs via entries in the mailcap file, is prone to shell command
injection via shell meta-characters in filenames. In specific scenarios
this flaw could allow an attacker to remotely execute arbitrary code.

For the oldstable distribution (squeeze), this problem has been fixed in
version 3.48-1+deb6u1.

We recommend that you upgrade your mime-support packages.

[DLA 126-1] ettercap security update

Package : ettercap
Version : 1:0.7.3-2.1+squeeze2
CVE ID : CVE-2014-9380 CVE-2014-9381
Debian Bug : 773416

Patches a bunch of security vulnerabilities:
- CVE-2014-9380 (Buffer over-read)
- CVE-2014-9381 (Signedness error)
See: https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/
Patches taken from upstream
- 6b196e011fa456499ed4650a360961a2f1323818 pull/608
- 31b937298c8067e6b0c3217c95edceb983dfc4a2 pull/609
Thanks to Nick Sampanis who is responsible for
both finding and repairing these issues.

[DSA 3115-1] pyyaml security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3115-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
December 29, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : pyyaml
CVE ID : CVE-2014-9130
Debian Bug : 772815

Jonathan Gray and Stanislaw Pitucha found an assertion failure in the
way wrapped strings are parsed in Python-YAML, a YAML parser and emitter
for Python. An attacker able to load specially crafted YAML input into an
application using python-yaml could cause the application to crash.

For the stable distribution (wheezy), this problem has been fixed in
version 3.10-4+deb7u1.

For the upcoming stable distribution (jessie), this problem has been
fixed in version 3.11-2.

For the unstable distribution (sid), this problem has been fixed in
version 3.11-2.

We recommend that you upgrade your pyyaml packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3116-1] polarssl security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3116-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
December 30, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : polarssl
CVE ID : CVE-2014-8628

It was discovered that a memory leak in parsing X.509 certificates may
result in denial of service.

For the stable distribution (wheezy), this problem has been fixed in
version 1.2.9-1~deb7u4.

For the upcoming stable distribution (jessie), this problem has been
fixed in version 1.3.9-1.

For the unstable distribution (sid), this problem has been fixed in
version 1.3.9-1.

We recommend that you upgrade your polarssl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/