The following Debian updates has been released:
[DLA 757-1] phpmyadmin security update
[DLA 760-1] spip security update
[DLA 761-1] python-bottle security update
[DSA 3746-1] graphicsmagick security update
[DLA 757-1] phpmyadmin security update
[DLA 760-1] spip security update
[DLA 761-1] python-bottle security update
[DSA 3746-1] graphicsmagick security update
[DLA 757-1] phpmyadmin security update
Package : phpmyadmin
Version : 4:3.4.11.1-2+deb7u7
CVE ID : CVE-2016-4412 CVE-2016-6626 CVE-2016-9849 CVE-2016-9850
CVE-2016-9861 CVE-2016-9864 CVE-2016-9865
Various security issues where found and fixed in phpmyadmin in wheezy.
CVE-2016-4412 / PMASA-2016-57
A user can be tricked in following a link leading to phpMyAdmin, which
after authentication redirects to another malicious site.
CVE-2016-6626 / PMASA-2016-49
In the fix for PMASA-2016-57, we didn't have sufficient checking and was
possible to bypass whitelist.
CVE-2016-9849 / PMASA-2016-60
Username deny rules bypass (AllowRoot & Others) by using Null Byte.
CVE-2016-9850 / PMASA-2016-61
Username matching for the allow/deny rules
may result in wrong matches and detection of the username in the rule due
to non-constant execution time.
CVE-2016-9861 / PMASA-2016-66
In the fix for PMASA-2016-49, we has buggy checks and was possible to
bypass whitelist.
CVE-2016-9864 / PMASA-2016-69
Multiple SQL injection vulnerabilities.
CVE-2016-9865 / PMASA-2016-70
Due to a bug in serialized string parsing, it was possible to bypass the
protection offered by PMA_safeUnserialize() function.
For Debian 7 "Wheezy", these problems have been fixed in version
4:3.4.11.1-2+deb7u7.
We recommend that you upgrade your phpmyadmin packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 760-1] spip security update
Package : spip
Version : 2.1.17-1+deb7u8
CVE ID : CVE-2016-9997 CVE-2016-9998
Debian Bug : 848641
Multiple reflected cross-site scripting (XSS) vulnerabilities have been
discovered in SPIP, a website publishing engine written in PHP.
CVE-2016-9997
It was discovered that the 'id' parameter to the puce_statut action
isn't sanitized properly. An attacker could inject arbitrary HTML
code by tricking an authenticated SPIP user to open a specially
crafted URL.
CVE-2016-9998
It was discovered that the 'plugin' parameter to the info_plugin
action isn't sanitized properly. An attacker could inject arbitrary
HTML code by tricking an authenticated SPIP user to open a specially
crafted URL.
For Debian 7 "Wheezy", these problems have been fixed in version
2.1.17-1+deb7u8.
We recommend that you upgrade your spip packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 761-1] python-bottle security update
Package : python-bottle
Version : 0.10.11-1+deb7u2
CVE ID : CVE-2016-9964
Debian Bug : 848392
It was discovered that bottle, a WSGI-framework for the Python
programming language, did not properly filter "\r\n" sequences when
handling redirections. This allowed an attacker to perform CRLF
attacks such as HTTP header injection.
For Debian 7 "Wheezy", these problems have been fixed in version
0.10.11-1+deb7u2.
We recommend that you upgrade your python-bottle packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DSA 3746-1] graphicsmagick security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3746-1 security@debian.org
https://www.debian.org/security/ Luciano Bello
December 24, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : graphicsmagick
CVE ID : CVE-2015-8808 CVE-2016-2317 CVE-2016-2318 CVE-2016-3714
CVE-2016-3715 CVE-2016-5118 CVE-2016-5240 CVE-2016-7800
CVE-2016-7996 CVE-2016-7997 CVE-2016-8682 CVE-2016-8683
CVE-2016-8684 CVE-2016-9830
Debian Bug : 814732 825800 847055
Several vulnerabilities have been discovered in GraphicsMagick, a
collection of image processing tool, which can cause denial of service
attacks, remote file deletion, and remote command execution.
This security update removes the full support of PLT/Gnuplot decoder to
prevent Gnuplot-shell based shell exploits for fixing the CVE-2016-3714
vulnerability.
The undocumented "TMP" magick prefix no longer removes the argument file
after it has been read for fixing the CVE-2016-3715 vulnerability. Since
the "TMP" feature was originally implemented, GraphicsMagick added a
temporary file management subsystem which assures that temporary files
are removed so this feature is not needed.
Remove support for reading input from a shell command, or writing output
to a shell command, by prefixing the specified filename (containing the
command) with a '|' for fixing the CVE-2016-5118 vulnerability.
CVE-2015-8808
Gustavo Grieco discovered an out of bound read in the parsing of GIF
files which may cause denial of service.
CVE-2016-2317
Gustavo Grieco discovered a stack buffer overflow and two heap buffer
overflows while processing SVG images which may cause denial of service.
CVE-2016-2318
Gustavo Grieco discovered several segmentation faults while processing
SVG images which may cause denial of service.
CVE-2016-5240
Gustavo Grieco discovered an endless loop problem caused by negative
stroke-dasharray arguments while parsing SVG files which may cause
denial of service.
CVE-2016-7800
Marco Grassi discovered an unsigned underflow leading to heap overflow
when parsing 8BIM chunk often attached to JPG files which may cause
denial of service.
CVE-2016-7996
Moshe Kaplan discovered that there is no check that the provided
colormap is not larger than 256 entries in the WPG reader which may
cause denial of service.
CVE-2016-7997
Moshe Kaplan discovered that an assertion is thrown for some files in
the WPG reader due to a logic error which may cause denial of service.
CVE-2016-8682
Agostino Sarubbo of Gentoo discovered a stack buffer read overflow
while reading the SCT header which may cause denial of service.
CVE-2016-8683
Agostino Sarubbo of Gentoo discovered a memory allocation failure in the
PCX coder which may cause denial of service.
CVE-2016-8684
Agostino Sarubbo of Gentoo discovered a memory allocation failure in the
SGI coder which may cause denial of service.
CVE-2016-9830
Agostino Sarubbo of Gentoo discovered a memory allocation failure in
MagickRealloc() function which may cause denial of service.
For the stable distribution (jessie), these problems have been fixed in
version 1.3.20-3+deb8u2.
For the testing distribution (stretch), these problems (with the
exception of CVE-2016-9830) have been fixed in version 1.3.25-5.
For the unstable distribution (sid), these problems have been fixed in
version 1.3.25-6.
We recommend that you upgrade your graphicsmagick packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/