[DLA 621-1] autotrace security update
[DLA 622-1] tomcat6 security update
[DLA 623-1] tomcat7 security update
[DSA 3668-1] mailman security update
[DSA 3669-1] tomcat7 security update
[DSA 3670-1] tomcat8 security update
[DLA 622-1] tomcat6 security update
[DLA 623-1] tomcat7 security update
[DSA 3668-1] mailman security update
[DSA 3669-1] tomcat7 security update
[DSA 3670-1] tomcat8 security update
[DLA 621-1] autotrace security update
Package : autotrace
Version : 0.31.1-16+deb7u1
CVE ID : CVE-2016-7392
Autotrace is a program for converting bitmaps to vector graphics. It had a bug
that caused an out-of-bounds write. This was caused by not allocating
sufficient memory to store the terminating NULL pointer in an array.
For Debian 7 "Wheezy", this problem have been fixed in version
0.31.1-16+deb7u1.
We recommend that you upgrade your autotrace packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 622-1] tomcat6 security update
Package : tomcat6
Version : 6.0.45+dfsg-1~deb7u2
CVE ID : CVE-2016-1240
Dawid Golunski from legalhackers.com discovered that Debian's version
of Tomcat 6 was vulnerable to a local privilege escalation. Local
attackers who have gained access to the server in the context of the
tomcat6 user through a vulnerability in a web application were able to
replace the file with a symlink to an arbitrary file.
The full advisory can be found at
http://legalhackers.com/advisories/Tomcat-Debian-based-Root-Privilege-Es
calation-Exploit.txt
For Debian 7 "Wheezy", these problems have been fixed in version
6.0.45+dfsg-1~deb7u2.
We recommend that you upgrade your tomcat6 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 623-1] tomcat7 security update
Package : tomcat7
Version : 7.0.28-4+deb7u6
CVE ID : CVE-2016-1240
Dawid Golunski from legalhackers.com discovered that Debian's version
of Tomcat 7 was vulnerable to a local privilege escalation. Local
attackers who have gained access to the server in the context of the
tomcat7 user through a vulnerability in a web application were able to
replace the file with a symlink to an arbitrary file.
The full advisory can be found at
http://legalhackers.com/advisories/Tomcat-Debian-based-Root-Privilege-Escalation-Exploit.txt
In addition this security update also fixes Debian bug #821391. File
ownership in /etc/tomcat7 will no longer be unconditionally overridden
on upgrade. As another precaution the file permissions of Debian
specific configuration files in /etc/tomcat7 were changed to 640 to
disallow world readable access.
For Debian 7 "Wheezy", these problems have been fixed in version
7.0.28-4+deb7u6.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DSA 3668-1] mailman security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3668-1 security@debian.org
https://www.debian.org/security/ Thijs Kinkhorst
September 15, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mailman
CVE ID : CVE-2016-6893
Debian Bug : 835970
It was discovered that there was a CSRF vulnerability in mailman, a
web-based mailing list manager, which could allow an attacker to obtain
a user's password.
For the stable distribution (jessie), this problem has been fixed in
version 1:2.1.18-2+deb8u1.
For the unstable distribution (sid), this problem has been fixed in
version 1:2.1.23-1.
We recommend that you upgrade your mailman packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3669-1] tomcat7 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3669-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 15, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : tomcat7
CVE ID : CVE-2016-1240
Dawid Golunski of LegalHackers discovered that the Tomcat init script
performed unsafe file handling, which could result in local privilege
escalation.
For the stable distribution (jessie), this problem has been fixed in
version 7.0.56-3+deb8u4.
We recommend that you upgrade your tomcat7 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
tomcat8 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3670-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 15, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : tomcat8
CVE ID : CVE-2016-1240
Dawid Golunski of LegalHackers discovered that the Tomcat init script
performed unsafe file handling, which could result in local privilege
escalation.
For the stable distribution (jessie), this problem has been fixed in
version 8.0.14-1+deb8u3.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your tomcat8 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/