Debian Security Advisory DSA-4045-1 security@debian.orghttps://www.debian.org/security/ Moritz MuehlenhoffNovember 21, 2017 https://www.debian.org/security/faq- -------------------------------------------------------------------------Package : vlcCVE ID : CVE-2017-9300 CVE-2017-10699Several vulnerabilities have been found in VLC, the VideoLAN project'smedia player. Processing malformed media files could lead to denial ofservice and potentially the execution of arbitrary code.For the oldstable distribution (jessie), these problems have been fixedin version 2.2.7-1~deb8u1.For the stable distribution (stretch), these problems have been fixed inversion 2.2.7-1~deb9u1.We recommend that you upgrade your vlc packages.For the detailed security status of vlc please refer toits security tracker page at:https://security-tracker.debian.org/tracker/vlcFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/
Secunia Research 2017/10/21 Oracle Outside In Denial of Service Vulnerability======================================================================Table of ContentsAffected Software....................................................1Severity.............................................................2Description of Vulnerability.........................................3Solution.............................................................4Time Table...........................................................5Credits..............................................................6References...........................................................7About Flexera .......................................................8Verification.........................................................9======================================================================1) Affected Software* Oracle Outside In version 8.5.3.0.======================================================================2) SeverityRating: Moderately criticalImpact: Denial of ServiceWhere: From remote======================================================================3) Description of VulnerabilitiySecunia Research has discovered a vulnerability in Oracle Outside In,which can be exploited by malicious people to cause a DoS(Denial of Service).The vulnerability is caused due to an error within the vstif6.dll,which can be exploited to cause an out-of-bounds write memory access.The vulnerability is confirmed in version 8.5.3.======================================================================4) SolutionApply update.https://support.oracle.com/rs?type=doc&id=2296870.1======================================================================5) Time Table2017/03/14 - Vendor notified about vulnerability.2017/03/17 - Vendor supplied bug ticket ID.2017/05/10 - Vendor asks for extention of publishing deadline.2017/05/11 - Replied to vendor with new publishing timeline.2017/05/15 - Vendor supplies information of fix in main codeline.2017/10/17 - Release of vendor patch.2017/10/18 - Release of Secunia Advisory SA76869.2017/11/21 - Public disclosure of Secunia Research Advisory.======================================================================6) CreditsBehzad Najjarpour Jabbari, Secunia Research at Flexera======================================================================7) ReferencesThe Common Vulnerabilities and Exposures (CVE) project has assignedthe CVE-2017-10051 identifier for the vulnerability.======================================================================8) About FlexeraFlexera helps application producers and enterprises increaseapplication usage and the value they derive from their software.http://www.flexerasoftware.com/enterprise/company/about/Flexera delivers market-leading Software Vulnerability Managementsolutions enabling enterprises to proactively identify andremediate software vulnerabilities, effectively reducing the risk ofcostly security breaches.http://www.flexerasoftware.com/enterprise/products/Flexera supports and contributes to the community in severalways. We have always believed that reliable vulnerabilityintelligence and tools to aid identifying and fixing vulnerabilitiesshould be freely available for consumers to ensure that users,who care about their online privacy and security, can stay secure.Only a few vendors address vulnerabilities in a proper way and helpusers get updated and stay secure. End-users (whether privateindividuals or businesses) are otherwise left largely alone, andthat is why back in 2002, Secunia Research started investigating,coordinating disclosure and verifying software vulnerabilities.In 2016, Secunia Research became a part of Flexera and todayour in-house software vulnerability research remains the core ofthe Software Vulnerability Management products at Flexera.https://secuniaresearch.flexerasoftware.com/community/research/The public Secunia Advisory database contains information forresearchers, security enthusiasts, and consumers to lookup individualproducts and vulnerabilities and assess, whether they need to takeany actions to secure their systems or whether a given vulnerabilityhas already been discoveredhttps://secuniaresearch.flexerasoftware.com/community/advisories/======================================================================9) VerificationPlease verify this advisory by visiting the website:https://secuniaresearch.flexerasoftware.com/secunia_research/2017-18/======================================================================
Debian Security Advisory DSA-4046-1 security@debian.orghttps://www.debian.org/security/ Sebastien DelafondNovember 22, 2017 https://www.debian.org/security/faq- -------------------------------------------------------------------------Package : libspring-ldap-javaCVE ID : CVE-2017-8028Tobias Schneider discovered that libspring-ldap-java, a Java libraryfor Spring-based applications using the Lightweight Directory AccessProtocol, would under some circumstances allow authentication with acorrect username but an arbitrary password.For the oldstable distribution (jessie), this problem has been fixedin version 1.3.1.RELEASE-5+deb8u1.We recommend that you upgrade your libspring-ldap-java packages.For the detailed security status of libspring-ldap-java please refer toits security tracker page at:https://security-tracker.debian.org/tracker/libspring-ldap-javaFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/
APPLE-SA-2017-12-13-5 Safari 11.0.2Safari 11.0.2 addresses the following:WebKitAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, andmacOS High Sierra 10.13.2Impact: Processing maliciously crafted web content may lead toarbitrary code executionDescription: Multiple memory corruption issues were addressed withimproved memory handling.CVE-2017-7156: an anonymous researcherCVE-2017-7157: an anonymous researcherCVE-2017-13856: Jeonghoon ShinCVE-2017-13870: an anonymous researcherCVE-2017-13866: an anonymous researcherInstallation note:Safari 11.0.2 may be obtained from the Mac App Store.Information will also be posted to the Apple Security Updatesweb site: https://support.apple.com/kb/HT201222
APPLE-SA-2017-12-13-7 Additional information forAPPLE-SA-2017-12-6-4 tvOS 11.2tvOS 11.2 addresses the following:IOSurfaceAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to execute arbitrary code withkernel privilegesDescription: A memory corruption issue was addressed with improvedmemory handling.CVE-2017-13861: Ian Beer of Google Project ZeroKernelAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to execute arbitrary code withkernel privilegesDescription: A memory corruption issue was addressed with improvedmemory handling.CVE-2017-13862: AppleCVE-2017-13876: Ian Beer of Google Project ZeroCVE-2017-13867: Ian Beer of Google Project ZeroKernelAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to read restricted memoryDescription: An out-of-bounds read was addressed with improved boundschecking.CVE-2017-13833: Brandon AzadKernelAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to read restricted memoryDescription: A type confusion issue was addressed with improvedmemory handling.CVE-2017-13855: Jann Horn of Google Project ZeroKernelAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to read restricted memoryDescription: A validation issue was addressed with improved inputsanitization.CVE-2017-13865: Ian Beer of Google Project ZeroCVE-2017-13868: Brandon AzadCVE-2017-13869: Jann Horn of Google Project ZeroWebKitAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: Processing maliciously crafted web content may lead toarbitrary code executionDescription: Multiple memory corruption issues were addressed withimproved memory handling.CVE-2017-7156: an anonymous researcherCVE-2017-7157: an anonymous researcherCVE-2017-13856: Jeonghoon ShinCVE-2017-13870: an anonymous researcherCVE-2017-13866: an anonymous researcherEntry added December 13, 2017Wi-FiAvailable for: Apple TV (4th generation)Released for Apple TV 4K in tvOS 11.1.Impact: An attacker in Wi-Fi range may force nonce reuse in WPAmulticast/GTK clients (Key Reinstallation Attacks - KRACK)Description: A logic issue existed in the handling of statetransitions. This was addressed with improved state management.CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KULeuvenInstallation note:Apple TV will periodically check for software updates. Alternatively,you may manually check for software updates by selecting"Settings -> System -> Software Update -> Update Software."To check the current version of software, select"Settings -> General -> About."Information will also be posted to the Apple Security Updatesweb site: https://support.apple.com/kb/HT201222
APPLE-SA-2017-12-13-2 tvOS 11.2.1tvOS 11.2.1 is now available and addresses the following:HomeKitAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: A remote attacker may be able to unexpectedly alterapplication stateDescription: A message handling issue was addressed with improvedinput validation.CVE-2017-13903: Tian ZhangInstallation note:Apple TV will periodically check for software updates. Alternatively,you may manually check for software updates by selecting"Settings -> System -> Software Update -> Update Software."To check the current version of software, select"Settings -> General -> About."Information will also be posted to the Apple Security Updatesweb site: https://support.apple.com/kb/HT201222
APPLE-SA-2017-12-13-1 iOS 11.2.1iOS 11.2.1 is now available and addresses the following:HomeKitAvailable for: iPhone 5s and later, iPad Air and later, and iPodtouch 6th generationImpact: A remote attacker may be able to unexpectedly alterapplication stateDescription: A message handling issue was addressed with improvedinput validation.CVE-2017-13903: Tian ZhangInstallation note:This update is available through iTunes and Software Update on youriOS device, and will not appear in your computer's Software Updateapplication, or in the Apple Downloads site. Make sure you have anInternet connection and have installed the latest version of iTunesfrom https://www.apple.com/itunes/iTunes and Software Update on the device will automatically checkApple's update server on its weekly schedule. When an update isdetected, it is downloaded and the option to be installed ispresented to the user when the iOS device is docked. We recommendapplying the update immediately if possible. Selecting Don't Installwill present the option the next time you connect your iOS device.The automatic update process may take up to a week depending on theday that iTunes or the device checks for updates. You may manuallyobtain the update via the Check for Updates button within iTunes, orthe Software Update on your device.To check that the iPhone, iPod touch, or iPad has been updated:* Navigate to Settings* Select General* Select About. The version after applying this updatewill be "11.2.1".Information will also be posted to the Apple Security Updatesweb site: https://support.apple.com/kb/HT201222This message is signed with Apple's Product Security PGP key,and details are available at:https://www.apple.com/support/security/pgp/
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4064-1 security@debian.org
https://www.debian.org/security/ Michael Gilbert
December 12, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : chromium-browser
CVE ID : CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410
CVE-2017-15411 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416
CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420
CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426
CVE-2017-15427
Several vulnerabilities have been discovered in the chromium web browser.
CVE-2017-15407
Ned Williamson discovered an out-of-bounds write issue.
CVE-2017-15408
Ke Liu discovered a heap overflow issue in the pdfium library.
CVE-2017-15409
An out-of-bounds write issue was discovered in the skia library.
CVE-2017-15410
Luat Nguyen discovered a use-after-free issue in the pdfium library.
CVE-2017-15411
Luat Nguyen discovered a use-after-free issue in the pdfium library.
CVE-2017-15413
Gaurav Dewan discovered a type confusion issue.
CVE-2017-15415
Viktor Brange discovered an information disclosure issue.
CVE-2017-15416
Ned Williamson discovered an out-of-bounds read issue.
CVE-2017-15417
Max May discovered an information disclosure issue in the skia
library.
CVE-2017-15418
Kushal Arvind Shah discovered an uninitialized value in the skia
library.
CVE-2017-15419
Jun Kokatsu discoved an information disclosure issue.
CVE-2017-15420
WenXu Wu discovered a URL spoofing issue.
CVE-2017-15423
Greg Hudson discovered an issue in the boringssl library.
CVE-2017-15424
Khalil Zhani discovered a URL spoofing issue.
CVE-2017-15425
xisigr discovered a URL spoofing issue.
CVE-2017-15426
WenXu Wu discovered a URL spoofing issue.
CVE-2017-15427
Junaid Farhan discovered an issue with the omnibox.
For the stable distribution (stretch), these problems have been fixed in
version 63.0.3239.84-1~deb9u1.
We recommend that you upgrade your chromium-browser packages.
For the detailed security status of chromium-browser please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium-browser
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/