Debian 10225 Published by

The following updates has been released for Debian GNU/Linux:

Debian GNU/Linux 7 LTS:
DLA 1252-1: couchdb security update
DLA 1253-1: openocd security update
DLA 1254-1: lucene-solr security update
DLA 1255-1: bind9 security update

Debian GNU/Linux 8 and 9:
DSA 4093-1: openocd security update



DLA 1252-1: couchdb security update




Package : couchdb
Version : 1.2.0-5+deb7u1
CVE ID : CVE-2017-12635 CVE-2017-12636


CVE-2017-12635
Prevent non-admin users to give themselves admin privileges.

CVE-2017-12636
Blacklist some configuration options to prevent execution of
arbitrary shell commands as the CouchDB user


For Debian 7 "Wheezy", these problems have been fixed in version
1.2.0-5+deb7u1.

We recommend that you upgrade your couchdb packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



DLA 1253-1: openocd security update




Package : openocd
Version : 0.5.0-1+deb7u1
CVE ID : CVE-2018-5704
Debian Bug : 887488

OpenOCD, an on-chip JTAG debug solution for ARM and MIPS systems, does
not block attempts to use HTTP POST for sending data to localhost, which
allows remote attackers to conduct cross-protocol scripting attacks,
and consequently execute arbitrary commands, via a crafted web site.

For Debian 7 "Wheezy", these problems have been fixed in version
0.5.0-1+deb7u1.

We recommend that you upgrade your openocd packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DLA 1254-1: lucene-solr security update




Package : lucene-solr
Version : 3.6.0+dfsg-1+deb7u3
CVE ID : CVE-2017-12629

Michael Stepankin and Olga Barinova discovered a remote code execution
vulnerability in Apache Solr by exploiting XML External Entity
processing (XXE) in conjunction with use of a Config API add-listener
command to reach the RunExecutableListener class. To resolve this
issue the RunExecutableListener class has been removed and resolving
of external entities in the CoreParser class disallowed.

For Debian 7 "Wheezy", these problems have been fixed in version
3.6.0+dfsg-1+deb7u3.

We recommend that you upgrade your lucene-solr packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DLA 1255-1: bind9 security update




Package : bind9
Version : 1:9.8.4.dfsg.P1-6+nmu2+deb7u19
CVE ID : CVE-2017-3145


Jayachandran Palanisamy of Cygate AB reported that BIND, a DNS server
implementation, was improperly sequencing cleanup operations, leading in
some cases to a use-after-free error, triggering an assertion failure
and crash in named.


For Debian 7 "Wheezy", these problems have been fixed in version
1:9.8.4.dfsg.P1-6+nmu2+deb7u19.

We recommend that you upgrade your bind9 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



DSA 4093-1: openocd security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4093-1 security@debian.org
https://www.debian.org/security/
January 21, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openocd
CVE ID : CVE-2018-5704
Debian Bug : 887488

Josef Gajdusek discovered that OpenOCD, a JTAG debugger for ARM and MIPS,
was vulnerable to Cross Protocol Scripting attacks. An attacker could
craft a HTML page that, when visited by a victim running OpenOCD, could
execute arbitrary commands on the victims host.

This fix also sets the OpenOCD default binding to localhost, instead of
every network interfaces. This can be changed with the added "bindto"
command argument.

For the oldstable distribution (jessie), this problem has been fixed
in version 0.8.0-4+deb7u1.

For the stable distribution (stretch), this problem has been fixed in
version 0.9.0-1+deb8u1.

We recommend that you upgrade your openocd packages.

For the detailed security status of openocd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openocd

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/