The following security updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 Extended LTS:
ELA-179-1: nfs-utils security update
Debian GNU/Linux 8 LTS:
DLA 1965-1: nfs-utils security update
DLA 1966-1: aspell security update
Debian GNU/Linux 7 Extended LTS:
ELA-179-1: nfs-utils security update
Debian GNU/Linux 8 LTS:
DLA 1965-1: nfs-utils security update
DLA 1966-1: aspell security update
ELA-179-1: nfs-utils security update
Package: nfs-utils
Version: 1.2.6-4+deb7u1
Related CVE: CVE-2019-3689
In the nfs-utils package, providing support files for Network File System (NFS) including the rpc.statd daemon, the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.
For Debian 7 Wheezy, these problems have been fixed in version 1.2.6-4+deb7u1.
We recommend that you upgrade your nfs-utils packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
DLA 1965-1: nfs-utils security update
Package : nfs-utils
Version : 1.2.8-9+deb8u1
CVE ID : CVE-2019-3689
Debian Bug : 940848
In the nfs-utils package, providing support files for Network File
System (NFS) including the rpc.statd daemon, the directory
/var/lib/nfs is owned by statd:nogroup. This directory contains files
owned and managed by root. If statd is compromised, it can therefore
trick processes running with root privileges into creating/overwriting
files anywhere on the system.
For Debian 8 "Jessie", this problem has been fixed in version
1.2.8-9+deb8u1.
We recommend that you upgrade your nfs-utils packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1966-1: aspell security update
Package : aspell
Version : 0.60.7~20110707-1.3+deb8u1
CVE ID : CVE-2019-17544
It was discovered that Aspell, the GNU spell checker, incorrectly
handled certain inputs which leads to a stack-based buffer over-read.
An attacker could potentially access sensitive information.
For Debian 8 "Jessie", this problem has been fixed in version
0.60.7~20110707-1.3+deb8u1.
We recommend that you upgrade your aspell packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS