The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 LTS:
DLA 1216-1: wordpress security update
Debian GNU/Linux 8 and 9:
DSA 4070-1: enigmail security update
DSA 4071-1: sensible-utils security update
Debian GNU/Linux 9:
DSA 4072-1: bouncycastle security update
Debian GNU/Linux 7 LTS:
DLA 1216-1: wordpress security update
Debian GNU/Linux 8 and 9:
DSA 4070-1: enigmail security update
DSA 4071-1: sensible-utils security update
Debian GNU/Linux 9:
DSA 4072-1: bouncycastle security update
DLA 1216-1: wordpress security update
Package : wordpress
Version : 3.6.1+dfsg-1~deb7u20
CVE ID : CVE-2017-17091 CVE-2017-17092 CVE-2017-17093
CVE-2017-17094
Debian Bug : 883314
Several vulnerabilities were discovered in wordpress, a web blogging
tool. The Common Vulnerabilities and Exposures project identifies the
following issues.
CVE-2017-17091
wp-admin/user-new.php in WordPress sets the newbloguser
key to a string that can be directly derived from the user ID, which
allows remote attackers to bypass intended access restrictions by
entering this string.
CVE-2017-17092
wp-includes/functions.php in WordPress does not require the
unfiltered_html capability for upload of .js files, which might
allow remote attackers to conduct XSS attacks via a crafted file.
CVE-2017-17093
wp-includes/general-template.php in WordPress does not properly
restrict the lang attribute of an HTML element, which might allow
attackers to conduct XSS attacks via the language setting of a site.
CVE-2017-17094
wp-includes/feed.php in WordPress does not properly
restrict enclosures in RSS and Atom fields, which might allow
attackers to conduct XSS attacks via a crafted URL.
For Debian 7 "Wheezy", these problems have been fixed in version
3.6.1+dfsg-1~deb7u20.
We recommend that you upgrade your wordpress packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DSA 4070-1: enigmail security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4070-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 21, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : enigmail
CVE ID : not yet available
Multiple vulnerabilities were discovered in Enigmail, an OpenPGP
extension for Thunderbird, which could result in a loss of
confidentiality, faked signatures, plain text leaks and denial of
service. Additional information can be found under
https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf
For the oldstable distribution (jessie), this problem has been fixed
in version 2:1.9.9-1~deb8u1.
For the stable distribution (stretch), this problem has been fixed in
version 2:1.9.9-1~deb9u1.
We recommend that you upgrade your enigmail packages.
For the detailed security status of enigmail please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/enigmail
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
DSA 4071-1: sensible-utils security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4071-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 21, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : sensible-utils
CVE ID : CVE-2017-17512
Debian Bug : 881767
Gabriel Corona reported that sensible-browser from sensible-utils, a
collection of small utilities used to sensibly select and spawn an
appropriate browser, editor or pager, does not validate strings before
launching the program specified by the BROWSER environment variable,
potentially allowing a remote attacker to conduct argument-injection
attacks if a user is tricked into processing a specially crafted URL.
For the oldstable distribution (jessie), this problem has been fixed
in version 0.0.9+deb8u1.
For the stable distribution (stretch), this problem has been fixed in
version 0.0.9+deb9u1.
We recommend that you upgrade your sensible-utils packages.
For the detailed security status of sensible-utils please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/sensible-utils
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
DSA 4072-1: bouncycastle security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4072-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 21, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : bouncycastle
CVE ID : CVE-2017-13098
Hanno Boeck, Juraj Somorovsky and Craig Young discovered that the
TLS implementation in Bouncy Castle is vulnerable to an adaptive chosen
ciphertext attack against RSA keys.
For the stable distribution (stretch), this problem has been fixed in
version 1.56-1+deb9u1.
We recommend that you upgrade your bouncycastle packages.
For the detailed security status of bouncycastle please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bouncycastle
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/