Debian 10261 Published by

The following security updates has been released for Debian GNU/Linux: [DSA 2502-1] python-crypto security update, [DSA 2498-1] dhcpcd security update, [DSA 2501-1] xen security update, [DSA 2500-1] mantis security update, and [DSA 2499-1] icedove security update



[DSA 2502-1] python-crypto security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2502-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
June 24, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : python-crypto
Vulnerability : programming error
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-2417

It was discovered that that the ElGamal code in PythonCrypto, a
collection of cryptographic algorithms and protocols for Python used
insecure insufficient prime numbers in key generation, which lead to a
weakened signature or public key space, allowing easier brute force
attacks on such keys.

For the stable distribution (squeeze), this problem has been fixed in
version 2.1.0-2+squeeze1.

For the unstable distribution (sid), this problem has been fixed in
version 2.6-1.

We recommend that you upgrade your python-crypto packages. After
installing this update, previously generated keys need to be regenerated.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

[DSA 2498-1] dhcpcd security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2498-1 security@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
June 23, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : dhcpcd
Vulnerability : remote stack overflow
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-2152
Debian Bug : #671265

It was discovered that dhcpcd, a DHCP client, was vulnerable to a stack
overflow. A malformed DHCP message could crash the client, causing a denial of
service, and potentially remote code execution through properly designed
malicous DHCP packets.

For the stable distribution (squeeze), this problem has been fixed in
version 1:3.2.3-5+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 1:3.2.3-11.

For the unstable distribution (sid), this problem has been fixed in
version 1:3.2.3-11.

We recommend that you upgrade your dhcpcd package.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
[DSA 2501-1] xen security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2501-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
June 24, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xen
Vulnerability : several
Problem type : local
Debian-specific: no
CVE ID : CVE-2012-0217 CVE-2012-0218 CVE-2012-2934

Several vulnerabilities were discovered in Xen, a hypervisor.

CVE-2012-0217
Xen does not properly handle uncanonical return addresses on
Intel amd64 CPUs, allowing amd64 PV guests to elevate to
hypervisor privileges. AMD processors, HVM and i386 guests
are not affected.

CVE-2012-0218
Xen does not properly handle SYSCALL and SYSENTER instructions
in PV guests, allowing unprivileged users inside a guest
system to crash the guest system.

CVE-2012-2934
Xen does not detect old AMD CPUs affected by AMD Erratum #121.

For CVE-2012-2934, Xen refuses to start domUs on affected systems
unless the "allow_unsafe" option is passed.

For the stable distribution (squeeze), these problems have been fixed
in version 4.0.1-5.2.

For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version
4.1.3~rc1+hg-20120614.a9c0a89c08f2-1.

We recommend that you upgrade your xen packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
[DSA 2500-1] mantis security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2500-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
June 24, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mantis
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-1118 CVE-2012-1119 CVE-2012-1120 CVE-2012-1122
CVE-2012-1123 CVE-2012-2692

Several vulnerabilities were discovered in Mantis, am issue tracking
system.

CVE-2012-1118
Mantis installation in which the private_bug_view_threshold
configuration option has been set to an array value do not
properly enforce bug viewing restrictions.

CVE-2012-1119
Copy/clone bug report actions fail to leave an audit trail.

CVE-2012-1120
The delete_bug_threshold/bugnote_allow_user_edit_delete
access check can be bypassed by users who have write
access to the SOAP API.

CVE-2012-1122
Mantis performed access checks incorrectly when moving bugs
between projects.

CVE-2012-1123
A SOAP client sending a null password field can authenticate
as the Mantis administrator.

CVE-2012-2692
Mantis does not check the delete_attachments_threshold
permission when a user attempts to delete an attachment from
an issue.

For the stable distribution (squeeze), these problems have been fixed
in version 1.1.8+dfsg-10squeeze2.


For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version 1.2.11-1.

We recommend that you upgrade your mantis packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
[DSA 2499-1] icedove security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2499-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
June 24, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : icedove
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-1937 CVE-2012-1939 CVE-2012-1940

Several vulnerabilities have been discovered in icedove, the Debian
version of the Mozilla Thunderbird mail/news client. There were
miscellaneous memory safety hazards (CVE-2012-1937, CVE-2012-1939) and
a use-after-free issues (CVE-2012-1940).

For the stable distribution (squeeze), these problems have been fixed
in version 3.0.11-1+squeeze11.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/