Debian 10222 Published by

The following security updates has been released for Debian GNU/Linux:

Debian GNU/Linux 7 Extended LTS:
ELA-179-1: nfs-utils security update

Debian GNU/Linux 8 LTS:
DLA 1965-1: nfs-utils security update
DLA 1966-1: aspell security update



ELA-179-1: nfs-utils security update

Package: nfs-utils
Version: 1.2.6-4+deb7u1
Related CVE: CVE-2019-3689

In the nfs-utils package, providing support files for Network File System (NFS) including the rpc.statd daemon, the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.

For Debian 7 Wheezy, these problems have been fixed in version 1.2.6-4+deb7u1.

We recommend that you upgrade your nfs-utils packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

DLA 1965-1: nfs-utils security update

Package : nfs-utils
Version : 1.2.8-9+deb8u1
CVE ID : CVE-2019-3689
Debian Bug : 940848


In the nfs-utils package, providing support files for Network File
System (NFS) including the rpc.statd daemon, the directory
/var/lib/nfs is owned by statd:nogroup. This directory contains files
owned and managed by root. If statd is compromised, it can therefore
trick processes running with root privileges into creating/overwriting
files anywhere on the system.

For Debian 8 "Jessie", this problem has been fixed in version
1.2.8-9+deb8u1.

We recommend that you upgrade your nfs-utils packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

DLA 1966-1: aspell security update

Package : aspell
Version : 0.60.7~20110707-1.3+deb8u1
CVE ID : CVE-2019-17544

It was discovered that Aspell, the GNU spell checker, incorrectly
handled certain inputs which leads to a stack-based buffer over-read.
An attacker could potentially access sensitive information.

For Debian 8 "Jessie", this problem has been fixed in version
0.60.7~20110707-1.3+deb8u1.

We recommend that you upgrade your aspell packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS