The following security updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 LTS:
DLA 1319-1: firefox-esr security update
Debian GNU/Linux 8 and 9:
DSA 4151-1: librelp security update
Debian GNU/Linux 7 LTS:
DLA 1319-1: firefox-esr security update
Debian GNU/Linux 8 and 9:
DSA 4151-1: librelp security update
DLA 1319-1: firefox-esr security update
Package : firefox-esr
Version : 52.7.2esr-1~deb7u1
CVE ID : CVE-2018-5146 CVE-2018-5147
Richard Zhu and Huzaifa Sidhpurwala discovered that an out-of-bounds
memory write when playing Vorbis media files could result in the
execution of arbitrary code.
For Debian 7 "Wheezy", these problems have been fixed in version
52.7.2esr-1~deb7u1.
We recommend that you upgrade your firefox-esr packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DSA 4151-1: librelp security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4151-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 26, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : librelp
CVE ID : CVE-2018-1000140
Bas van Schaik and Kevin Backhouse discovered a stack-based buffer
overflow vulnerability in librelp, a library providing reliable event
logging over the network, triggered while checking x509 certificates
from a peer. A remote attacker able to connect to rsyslog can take
advantage of this flaw for remote code execution by sending a specially
crafted x509 certificate.
Details can be found in the upstream advisory:
http://www.rsyslog.com/cve-2018-1000140/
For the oldstable distribution (jessie), this problem has been fixed
in version 1.2.7-2+deb8u1.
For the stable distribution (stretch), this problem has been fixed in
version 1.2.12-1+deb9u1.
We recommend that you upgrade your librelp packages.
For the detailed security status of librelp please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/librelp
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/