The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 8 LTS:
DLA 1501-1: libextractor security update
Debian GNU/Linux 9:
DSA 4291-1: mgetty security update
DSA 4292-1: kamailio security update
Debian GNU/Linux 8 LTS:
DLA 1501-1: libextractor security update
Debian GNU/Linux 9:
DSA 4291-1: mgetty security update
DSA 4292-1: kamailio security update
DLA 1501-1: libextractor security update
Package : libextractor
Version : 1:1.3-2+deb8u3
CVE ID : CVE-2018-16430
Debian Bug : #907987
It was discovered that there was an out-of-bounds read vulnerability in
libextractor, a library to extract meta-data from files of arbitrary type.
For Debian 8 "Jessie", this issue has been fixed in libextractor version
1:1.3-2+deb8u3.
We recommend that you upgrade your libextractor packages.
DSA 4291-1: mgetty security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4291-1 security@debian.org
https://www.debian.org/security/ Yves-Alexis Perez
September 11, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mgetty
CVE ID : CVE-2018-16741
Two input sanitization failures have been found in the faxrunq and faxq
binaries in mgetty, a smart modem getty replacement. An attacker could leverage
them to insert commands via shell metacharacters in jobs id and have them
executed with the privilege of the faxrunq/faxq user.
For the stable distribution (stretch), this problem has been fixed in
version 1.1.36-3+deb9u1.
We recommend that you upgrade your mgetty packages.
For the detailed security status of mgetty please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mgetty
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
DSA 4292-1: kamailio security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4292-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 11, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : kamailio
CVE ID : CVE-2018-16657
Debian Bug : 908324
Henning Westerholt discovered a flaw related to the Via header
processing in kamailio, a very fast, dynamic and configurable SIP
server. An unauthenticated attacker can take advantage of this flaw to
mount a denial of service attack via a specially crafted SIP message
with an invalid Via header.
For the stable distribution (stretch), this problem has been fixed in
version 4.4.4-2+deb9u3.
We recommend that you upgrade your kamailio packages.
For the detailed security status of kamailio please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/kamailio
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/