------------------------------------------------------------------------- Debian Stable Updates Announcement SUA 131-1 https://www.debian.org/ email@example.com Adam D. Barratt December 5th, 2017 ------------------------------------------------------------------------- Upcoming Debian 8 Update (8.10) An update to Debian 8 is scheduled for Saturday, December 9th, 2017. As of now it will include the following bug fixes. They can be found in "jessie-proposed-updates", which is carried by all official mirrors. Please note that packages published through security.debian.org are not listed, but will be included if possible. Some of the updates below are also already available through "jessie-updates". Testing and feedback would be appreciated. Bugs should be filed in the Debian Bug Tracking System, but please make the Release Team aware of them by copying "firstname.lastname@example.org" on your mails. The point release will also include a rebuild of debian-installer. Miscellaneous Bugfixes ---------------------- This oldstable update adds a few important corrections to the following packages: Package Reason bareos Fix permissions of bareos-dir logrotate config; fix file corruption when using SHA1 signature base-files Update for the point release bind9 Import upcoming DNSSEC KSK-2017 cups Disable SSLv3 and RC4 by default to address POODLE vulnerability db Do not access DB_CONFIG when db_home is not set [CVE-2017-10140] db5.3 Do not access DB_CONFIG when db_home is not set [CVE-2017-10140] debmirror Tolerate unknown lines in *.diff/Index; mirror DEP-11 metadata files; prefer xz over gz, and cope with either being missing; mirror and validate InRelease files dns-root-data Update root.hints to 2017072601 version; add KSK-2017 to root.key file dput dput.cf: replace security-master.d.o with ftp.upload.security.d.o dwww Fix `Last-Modified' header name elog Update patch 0005_elogd_CVE-2016-6342_fix to grant access as normal user flightgear Fix arbitrary file overwrite vulnerability [CVE-2017-13709] gsoap Fix integer overflow via large XML document [CVE-2017-9765] hexchat Fix segmentation fault following /server command icu Fix double free in createMetazoneMappings() [CVE-2017-14952] kdepim Fix "send Later with Delay bypasses OpenPGP" [CVE-2017-9604] kedpm Fix information leak via command history file [CVE-2017-8296] keyringer Handle subkeys without expiration date and public keys listed multiple times krb5 Security fixes - remote authenticated attackers can crash the KDC [CVE-2017-11368]; kdc crash on restrict_anon_to_tgt [CVE-2016-3120]; remote DOS with ldap for authenticated attackers [CVE-2016-3119]; prevent requires_preauth bypass [CVE-2015-2694] libdatetime-timezone-perl Update included data libdbi Re-enable error handler call in dbi_result_next_row() libembperl-perl Change hard dependency on mod_perl in zembperl.load to Recommends, fixing an installation failure when libapache2-mod-perl2 is not installed libio-socket-ssl-perl Fix segfault using malformed client certificates liblouis Fix multiple stack-based buffer overflows [CVE-2014-8184] libofx Security fixes [CVE-2017-2816 CVE-2017-14731] libwnckmm Tighten dependencies between packages; use jquery.js from libjs-jquery libwpd Security fix [CVE-2017-14226] libx11 Fix "insufficient validation of data from the X server can cause out of boundary memory read (XGetImage()) or write (XListFonts())" [CVE-2016-7942 CVE-2016-7943] libxfixes Fix integer overflow on illegal server response [CVE-2016-7944] libxi Fix "insufficient validation of data from the X server can cause out of boundary memory access or endless loops" [CVE-2016-7945 CVE-2016-7946] libxrandr Avoid out of boundary accesses on illegal responses [CVE-2016-7947 CVE-2016-7948] libxtst Fix "insufficient validation of data from the X server can cause out of boundary memory access or endless loops" [CVE-2016-7951 CVE-2016-7952] libxv Fix protocol handling issues in libXv [CVE-2016-5407] libxvmc Avoid buffer underflow on empty strings [CVE-2016-7953] linux New stable kernel version 3.16.51; new upstream stable release ncurses Fix various crash bugs in the tic library and the tic binary [CVE-2017-10684 CVE-2017-10685 CVE-2017-11112 CVE-2017-11113 CVE-2017-13728 CVE-2017-13729 CVE-2017-13730 CVE-2017-13731 CVE-2017-13732 CVE-2017-13734 CVE-2017-13733] openssh Test configuration before starting or reloading sshd under systemd; make "--" before the hostname terminate argument processing after the hostname too pdns Add missing check on API operations [CVE-2017-15091] pdns-recursor Fix configuration file injection in the API [CVE-2017-15093] postgresql-9.4 New upstream bugfix release python-tablib Securely load YAML [CVE-2017-2810] request-tracker4 Fix regression in previous security release where incorrect SHA256 passwords could trigger an error ruby-ox Avoid crash with invalid XML passed to Oj.parse_obj() [CVE-2017-15928] sam2p Fix several integer overflow or heap-based buffer overflow issues [CVE-2017-14628 CVE-2017-14629 CVE-2017-14630 CVE-2017-14631 CVE-2017-14636 CVE-2017-14637 CVE-2017-16663] slurm-llnl Fix security issue caused by insecure file path handling triggered by the failure of a Prolog script [CVE-2016-10030] sudo Fix arbitrary terminal access [CVE-2017-1000368] syslinux Fix boot problem for old BIOS firmware by correcting C/H/S order tor Add "Bastet" directory authority; update geoip and geoip6 to the October 4 2017 Maxmind GeoLite2 country database; fix a memset() off the end of an array when packing cells transfig Add input sanitisation on FIG files [CVE-2017-16899]; sanitize input of fill patterns tzdata New upstream release unbound Fix install of trust anchor when two anchors are present; include root trust anchor id 20326 weechat "logger: call strftime before replacing buffer local variables" [CVE-2017-14727] A complete list of all accepted and rejected packages together with rationale is on the preparation page for this revision: <https://release.debian.org/proposed-updates/oldstable.html> Removed packages ---------------- The following packages will be removed due to circumstances beyond our control: Package Reason aiccu Useless since shutdown of SixXS libnet-ping-external-perl Unmaintained, security issues If you encounter any issues, please don't hesitate to get in touch with the Debian Release Team at "email@example.com".
Description: This is a digitally signed message part