The following Debian updates has been released:
[DLA 395-1] librsvg security update
[DLA 396-1] bind9 security update
[DSA 3448-1] linux security update
[DSA 3449-1] bind9 security update
[DLA 395-1] librsvg security update
[DLA 396-1] bind9 security update
[DSA 3448-1] linux security update
[DSA 3449-1] bind9 security update
[DLA 395-1] librsvg security update
Package : librsvg
Version : 2.26.3-1+deb6u3
CVE ID : CVE-2015-7557
A vulnerability was found in LibRSVG, a library to render SVG graphics.
Librsvg was susceptible to an out-of-bounds heap read when parsing SVG
files.
For Debian 6 "Squeeze", this issue has been fixed in librsvg version
2.26.3-1+deb6u3. We recommend you to upgrade your librsvg packages.
Learn more about the Debian Long Term Support (LTS) Project and how to
apply these updates at: https://wiki.debian.org/LTS/
[DLA 396-1] bind9 security update
Package : bind9
Version : 1:9.7.3.dfsg-1~squeeze19
CVE ID : CVE-2015-8704
It was discovered that specific APL RR data could trigger an INSIST
failure in apl_42.c and cause the BIND DNS server to exit, leading to a
denial-of-service.
[DSA 3448-1] linux security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3448-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 19, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : linux
CVE ID : CVE-2013-4312 CVE-2015-7566 CVE-2015-8767 CVE-2016-0723
CVE-2016-0728
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation or denial-of-service.
CVE-2013-4312
Tetsuo Handa discovered that it is possible for a process to open
far more files than the process' limit leading to denial-of-service
conditions.
CVE-2015-7566
Ralf Spenneberg of OpenSource Security reported that the visor
driver crashes when a specially crafted USB device without bulk-out
endpoint is detected.
CVE-2015-8767
An SCTP denial-of-service was discovered which can be triggered by a
local attacker during a heartbeat timeout event after the 4-way
handshake.
CVE-2016-0723
A use-after-free vulnerability was discovered in the TIOCGETD ioctl.
A local attacker could use this flaw for denial-of-service.
CVE-2016-0728
The Perception Point research team discovered a use-after-free
vulnerability in the keyring facility, possibly leading to local
privilege escalation.
For the stable distribution (jessie), these problems have been fixed in
version 3.16.7-ckt20-1+deb8u3.
We recommend that you upgrade your linux packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3449-1] bind9 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3449-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 19, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : bind9
CVE ID : CVE-2015-8704
It was discovered that specific APL RR data could trigger an INSIST
failure in apl_42.c and cause the BIND DNS server to exit, leading to a
denial-of-service.
For the oldstable distribution (wheezy), this problem has been fixed
in version 1:9.8.4.dfsg.P1-6+nmu2+deb7u9.
For the stable distribution (jessie), this problem has been fixed in
version 1:9.9.5.dfsg-9+deb8u5.
We recommend that you upgrade your bind9 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/