Debian 10205 Published by

The following updates has been released for Debian:

[DLA 790-1] mapserver security update
[DLA 791-1] libav security update
[DLA 792-1] libphp-swiftmailer security update
[DSA 3767-1] mysql-5.5 security update



[DLA 790-1] mapserver security update

Package : mapserver
Version : 6.0.1-3.2+deb7u4
CVE ID : CVE-2017-5522

It was discovered that mapserver, a CGI-based framework for Internet
map services, was vulnerable to a stack-based overflow. This issue
allowed a remote user to crash the service, or potentially execute
arbitrary code.

For Debian 7 "Wheezy", these problems have been fixed in version
6.0.1-3.2+deb7u4.

We recommend that you upgrade your mapserver packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DLA 791-1] libav security update

Package : libav
Version : 6:0.8.20-0+deb7u1
CVE ID : CVE-2016-9819 CVE-2016-9820 CVE-2016-9821 CVE-2016-9822

Multiple integer overflows have been discovered in libav 11.8 and earlier,
allowing remote attackers to cause a crash via a crafted MP3 file.

For Debian 7 "Wheezy", these problems have been fixed in version
6:0.8.20-0+deb7u1.

We recommend that you upgrade your libav packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DLA 792-1] libphp-swiftmailer security update

Package : libphp-swiftmailer
Version : 4.1.5-1+deb7u1
CVE ID : CVE-2016-10074
Debian Bug : 849626

Dawid Golunski from legalhackers-com [1] discovered that the mail
transport in Swift Mailer allowed remote attackers to pass extra
parameters to the mail command and consequently execute arbitrary code
via a \" (backslash double quote) in a crafted e-mail address in the
From, ReturnPath, or Sender header.

[1]
https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html

For Debian 7 "Wheezy", these problems have been fixed in version
4.1.5-1+deb7u1.

We recommend that you upgrade your libphp-swiftmailer packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DSA 3767-1] mysql-5.5 security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3767-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 19, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mysql-5.5
CVE ID : CVE-2017-3238 CVE-2017-3243 CVE-2017-3244 CVE-2017-3258
CVE-2017-3265 CVE-2017-3291 CVE-2017-3312 CVE-2017-3313
CVE-2017-3317 CVE-2017-3318
Debian Bug : 851233

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.54, which includes additional changes, such as performance
improvements, bug fixes, new features, and possibly incompatible
changes. Please see the MySQL 5.5 Release Notes and Oracle's Critical
Patch Update advisory for further details:

https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-54.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html

For the stable distribution (jessie), these problems have been fixed in
version 5.5.54-0+deb8u1.

We recommend that you upgrade your mysql-5.5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/