The following updates has been released for Debian:
[DLA 636-2] firefox-esr regression update
[DLA 642-1] ruby-activerecord-3.2 security update
[DLA 643-1] chicken security update
[DSA 3682-1] c-ares security update
[DLA 636-2] firefox-esr regression update
[DLA 642-1] ruby-activerecord-3.2 security update
[DLA 643-1] chicken security update
[DSA 3682-1] c-ares security update
[DLA 636-2] firefox-esr regression update
Package : firefox-esr
Version : 45.4.0esr-1~deb7u2
The update of firefox-esr to 45.4.0esr-1~deb7u1 caused build failure
on armel and armhf architectures.
For Debian 7 "Wheezy", these problems have been fixed in version
45.4.0esr-1~deb7u2.
We recommend that you upgrade your firefox-esr packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 642-1] ruby-activerecord-3.2 security update
Package : ruby-activerecord-3.2
Version : 3.2.6-5+deb7u3
CVE ID : CVE-2016-0753
Active Record in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before
4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level
writers for class accessors, which allows remote attackers to bypass
intended validation steps via crafted parameters.
For Debian 7 "Wheezy", these problems have been fixed in version
3.2.6-5+deb7u3.
We recommend that you upgrade your ruby-activerecord-3.2 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 643-1] chicken security update
Package : chicken
Version : 4.7.0-1+deb7u1
CVE ID : CVE-2016-6830 CVE-2016-6831
Multiple vulnerabilities have been found in the CHICKEN Scheme compiler:
CVE-2016-6830
Buffer overrun in CHICKEN Scheme's "process-execute" and
"process-spawn" procedures from the posix unit
CVE-2016-6831
Memory leak in CHICKEN Scheme's process-execute and process-spawn
procedures
For Debian 7 "Wheezy", these problems have been fixed in version
4.7.0-1+deb7u1.
We recommend that you upgrade your chicken packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DSA 3682-1] c-ares security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3682-1 security@debian.org
https://www.debian.org/security/ Florian Weimer
September 30, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : c-ares
CVE ID : CVE-2016-5180
Debian Bug : 839151
Gzob Qq discovered that the query-building functions in c-ares, an
asynchronous DNS request library would not correctly process crafted
query names, resulting in a heap buffer overflow and potentially
leading to arbitrary code execution.
For the stable distribution (jessie), this problem has been fixed in
version 1.10.0-2+deb8u1.
For the unstable distribution (sid), this problem has been fixed in
version 1.12.0-1.
We recommend that you upgrade your c-ares packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/