The following updates has been released for Debian:
Debian GNU/Linux 7 LTS:
DLA 1074-1: poppler security update
DLA 1075-1: wordpress security update
Debian GNU/Linux 9:
DSA 3959-1: libgcrypt20 security update
Debian GNU/Linux 7 LTS:
DLA 1074-1: poppler security update
DLA 1075-1: wordpress security update
Debian GNU/Linux 9:
DSA 3959-1: libgcrypt20 security update
DLA 1074-1: poppler security update
Package : poppler
Version : 0.18.4-6+deb7u2
CVE ID : CVE-2013-4473 CVE-2013-4474 CVE-2017-9775 CVE-2017-9776
CVE-2017-9865
Several buffer and integer overflow issues were discovered in Poppler,
a PDF library, that could lead to application crash or possibly other
unspecified impact via maliciously crafted files.
For Debian 7 "Wheezy", these problems have been fixed in version
0.18.4-6+deb7u2.
We recommend that you upgrade your poppler packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1075-1: wordpress security update
Package : wordpress
Version : 3.6.1+dfsg-1~deb7u16
CVE ID : CVE-2017-9066
Debian Bug : 862816
In WordPress, there is insufficient redirect validation in the
HTTP class, leading to SSRF.
For Debian 7 "Wheezy", these problems have been fixed in version
3.6.1+dfsg-1~deb7u16.
We recommend that you upgrade your wordpress packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DSA 3959-1: libgcrypt20 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3959-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 29, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libgcrypt20
CVE ID : CVE-2017-0379
Debian Bug : 873383
Daniel Genkin, Luke Valenta and Yuval Yarom discovered that Libgcrypt
is prone to a local side-channel attack against the ECDH encryption with
Curve25519, allowing recovery of the private key.
See https://eprint.iacr.org/2017/806 for details.
For the stable distribution (stretch), this problem has been fixed in
version 1.7.6-2+deb9u2.
For the unstable distribution (sid), this problem has been fixed in
version 1.7.9-1.
We recommend that you upgrade your libgcrypt20 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/