Debian 10225 Published by

The following updates has been released for Debian:

[DLA 636-2] firefox-esr regression update
[DLA 642-1] ruby-activerecord-3.2 security update
[DLA 643-1] chicken security update
[DSA 3682-1] c-ares security update



[DLA 636-2] firefox-esr regression update

Package : firefox-esr
Version : 45.4.0esr-1~deb7u2

The update of firefox-esr to 45.4.0esr-1~deb7u1 caused build failure
on armel and armhf architectures.

For Debian 7 "Wheezy", these problems have been fixed in version
45.4.0esr-1~deb7u2.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DLA 642-1] ruby-activerecord-3.2 security update

Package : ruby-activerecord-3.2
Version : 3.2.6-5+deb7u3
CVE ID : CVE-2016-0753

Active Record in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before
4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level
writers for class accessors, which allows remote attackers to bypass
intended validation steps via crafted parameters.

For Debian 7 "Wheezy", these problems have been fixed in version
3.2.6-5+deb7u3.

We recommend that you upgrade your ruby-activerecord-3.2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


[DLA 643-1] chicken security update

Package : chicken
Version : 4.7.0-1+deb7u1
CVE ID : CVE-2016-6830 CVE-2016-6831


Multiple vulnerabilities have been found in the CHICKEN Scheme compiler:

CVE-2016-6830

Buffer overrun in CHICKEN Scheme's "process-execute" and
"process-spawn" procedures from the posix unit

CVE-2016-6831

Memory leak in CHICKEN Scheme's process-execute and process-spawn
procedures

For Debian 7 "Wheezy", these problems have been fixed in version
4.7.0-1+deb7u1.

We recommend that you upgrade your chicken packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DSA 3682-1] c-ares security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3682-1 security@debian.org
https://www.debian.org/security/ Florian Weimer
September 30, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : c-ares
CVE ID : CVE-2016-5180
Debian Bug : 839151

Gzob Qq discovered that the query-building functions in c-ares, an
asynchronous DNS request library would not correctly process crafted
query names, resulting in a heap buffer overflow and potentially
leading to arbitrary code execution.

For the stable distribution (jessie), this problem has been fixed in
version 1.10.0-2+deb8u1.

For the unstable distribution (sid), this problem has been fixed in
version 1.12.0-1.

We recommend that you upgrade your c-ares packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/