The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 Extended LTS:
ELA-132-1: bzip2 security update
Debian GNU/Linux 9:
DSA 4469-1: libvirt security update
Debian GNU/Linux 7 Extended LTS:
ELA-132-1: bzip2 security update
Debian GNU/Linux 9:
DSA 4469-1: libvirt security update
ELA-132-1: bzip2 security update
Package: bzip2
Version: 1.0.6-4+deb7u1
Related CVE: CVE-2016-3189 CVE-2019-12900
Two issues in bzip2, a high-quality block-sorting file compressor, have been fixed. One, CVE-2019-12900, is a out-of-bounds write when using a crafted compressed file. The other, CVE-2016-3189, is a potential user-after-free.
For Debian 7 Wheezy, these problems have been fixed in version 1.0.6-4+deb7u1.
We recommend that you upgrade your bzip2 packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
DSA 4469-1: libvirt security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4469-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 22, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libvirt
CVE ID : CVE-2019-10161 CVE-2019-10167
Two vulnerabilities were discovered in Libvirt, a virtualisation
abstraction library, allowing an API client with read-only permissions
to execute arbitrary commands via the virConnectGetDomainCapabilities
API, or read or execute arbitrary files via the
virDomainSaveImageGetXMLDesc API.
Additionally the libvirt's cpu map was updated to make addressing
CVE-2018-3639, CVE-2017-5753, CVE-2017-5715, CVE-2018-12126,
CVE-2018-12127, CVE-2018-12130 and CVE-2019-11091 easier by supporting
the md-clear, ssbd, spec-ctrl and ibpb CPU features when picking CPU
models without having to fall back to host-passthrough.
For the stable distribution (stretch), these problems have been fixed in
version 3.0.0-4+deb9u4.
We recommend that you upgrade your libvirt packages.
For the detailed security status of libvirt please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/libvirt
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/