The following two updates has been released for Debian 7 LTS:
[DLA 601-1] quagga security update
[DLA 603-1] ruby-activesupport-3.2 security update
[DLA 601-1] quagga security update
[DLA 603-1] ruby-activesupport-3.2 security update
[DLA 601-1] quagga security update
Package : quagga
Version : 0.99.22.4-1+wheezy3
CVE ID : CVE-2016-4036 CVE-2016-4049
Debian Bug : 835223, 822787
The quagga package installs world readable sensitive files in /etc/quagga,
and might be subject to denial of service because of lacking packet size
checks.
CVE-2016-4036
The quagga package before 0.99.23-2.6.1 uses weak permissions for
/etc/quagga, which allows local users to obtain sensitive information
by reading files in the directory.
CVE-2016-4049
The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does
not perform size checks when dumping data, which might allow remote
attackers to cause a denial of service (assertion failure and daemon
crash) via a large BGP packet.
For Debian 7 "Wheezy", these problems have been fixed in version
0.99.22.4-1+wheezy3.
We recommend that you upgrade your quagga packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 603-1] ruby-activesupport-3.2 security update
Package : ruby-activesupport-3.2
Version : 3.2.6-6+deb7u2
CVE ID : CVE-2015-3227
The support and utility classes used by the Rails 3.2 framework allow
remote attackers to cause a denial of service (SystemStackError) via a
large XML document depth.
For Debian 7 "Wheezy", these problems have been fixed in version
3.2.6-6+deb7u2.
Additionally this upload adds 'active_support/security_utils' that will
be used by ruby-actionpack-3.2 to address CVE-2015-7576.
We recommend that you upgrade your ruby-activesupport-3.2 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS