Debian Security Advisory DSA-4045-1                   security@debian.orghttps://www.debian.org/security/                       Moritz MuehlenhoffNovember 21, 2017                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : vlcCVE ID         : CVE-2017-9300 CVE-2017-10699Several vulnerabilities have been found in VLC, the VideoLAN project'smedia player. Processing malformed media files could lead to denial ofservice and potentially the execution of arbitrary code.For the oldstable distribution (jessie), these problems have been fixedin version 2.2.7-1~deb8u1.For the stable distribution (stretch), these problems have been fixed inversion 2.2.7-1~deb9u1.We recommend that you upgrade your vlc packages.For the detailed security status of vlc please refer toits security tracker page at:https://security-tracker.debian.org/tracker/vlcFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/
 
 
 
                     Secunia Research 2017/10/21          Oracle Outside In Denial of Service Vulnerability======================================================================Table of ContentsAffected Software....................................................1Severity.............................................................2Description of Vulnerability.........................................3Solution.............................................................4Time Table...........................................................5Credits..............................................................6References...........................................................7About Flexera .......................................................8Verification.........................................................9======================================================================1) Affected Software* Oracle Outside In version 8.5.3.0.======================================================================2) SeverityRating: Moderately criticalImpact: Denial of ServiceWhere:  From remote======================================================================3) Description of VulnerabilitiySecunia Research has discovered a vulnerability in Oracle Outside In,which can be exploited by malicious people to cause a DoS(Denial of Service).The vulnerability is caused due to an error within the vstif6.dll,which can be exploited to cause an out-of-bounds write memory access.The vulnerability is confirmed in version 8.5.3.======================================================================4) SolutionApply update.https://support.oracle.com/rs?type=doc&id=2296870.1======================================================================5) Time Table2017/03/14 - Vendor notified about vulnerability.2017/03/17 - Vendor supplied bug ticket ID.2017/05/10 - Vendor asks for extention of publishing deadline.2017/05/11 - Replied to vendor with new publishing timeline.2017/05/15 - Vendor supplies information of fix in main codeline.2017/10/17 - Release of vendor patch.2017/10/18 - Release of Secunia Advisory SA76869.2017/11/21 - Public disclosure of Secunia Research Advisory.======================================================================6) CreditsBehzad Najjarpour Jabbari, Secunia Research at Flexera======================================================================7) ReferencesThe Common Vulnerabilities and Exposures (CVE) project has assignedthe CVE-2017-10051 identifier for the vulnerability.======================================================================8) About FlexeraFlexera  helps application  producers and enterprises  increaseapplication usage and the value they derive from their software.http://www.flexerasoftware.com/enterprise/company/about/Flexera delivers  market-leading  Software  Vulnerability Managementsolutions  enabling  enterprises  to  proactively  identify  andremediate software vulnerabilities, effectively reducing the risk ofcostly security breaches.http://www.flexerasoftware.com/enterprise/products/Flexera  supports  and  contributes  to  the community in severalways.  We  have  always  believed  that  reliable  vulnerabilityintelligence and tools to aid identifying and fixing vulnerabilitiesshould be  freely available  for  consumers  to ensure that users,who care about their online privacy and security, can stay secure.Only a few vendors address vulnerabilities in a proper way and helpusers get updated  and  stay secure.  End-users (whether privateindividuals or businesses) are otherwise left largely alone,  andthat is why back in 2002, Secunia Research started investigating,coordinating  disclosure  and  verifying software vulnerabilities.In  2016,  Secunia Research  became  a  part  of  Flexera and todayour in-house software vulnerability research remains the core  ofthe  Software  Vulnerability  Management  products  at Flexera.https://secuniaresearch.flexerasoftware.com/community/research/The  public Secunia Advisory database  contains  information  forresearchers, security enthusiasts, and consumers to lookup individualproducts and vulnerabilities and assess, whether they need to takeany actions to secure their systems or whether a given vulnerabilityhas already been discoveredhttps://secuniaresearch.flexerasoftware.com/community/advisories/======================================================================9) VerificationPlease verify this advisory by visiting the website:https://secuniaresearch.flexerasoftware.com/secunia_research/2017-18/======================================================================
 
 
 
Debian Security Advisory DSA-4046-1                   security@debian.orghttps://www.debian.org/security/                       Sebastien DelafondNovember 22, 2017                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : libspring-ldap-javaCVE ID         : CVE-2017-8028Tobias Schneider discovered that libspring-ldap-java, a Java libraryfor Spring-based applications using the Lightweight Directory AccessProtocol, would under some circumstances allow authentication with acorrect username but an arbitrary password.For the oldstable distribution (jessie), this problem has been fixedin version 1.3.1.RELEASE-5+deb8u1.We recommend that you upgrade your libspring-ldap-java packages.For the detailed security status of libspring-ldap-java please refer toits security tracker page at:https://security-tracker.debian.org/tracker/libspring-ldap-javaFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/
 
 
 
APPLE-SA-2017-12-13-5 Safari 11.0.2Safari 11.0.2 addresses the following:WebKitAvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6, andmacOS High Sierra 10.13.2Impact: Processing maliciously crafted web content may lead toarbitrary code executionDescription: Multiple memory corruption issues were addressed withimproved memory handling.CVE-2017-7156: an anonymous researcherCVE-2017-7157: an anonymous researcherCVE-2017-13856: Jeonghoon ShinCVE-2017-13870: an anonymous researcherCVE-2017-13866: an anonymous researcherInstallation note:Safari 11.0.2 may be obtained from the Mac App Store.Information will also be posted to the Apple Security Updatesweb site: https://support.apple.com/kb/HT201222
 
 
 
APPLE-SA-2017-12-13-7 Additional information forAPPLE-SA-2017-12-6-4 tvOS 11.2tvOS 11.2 addresses the following:IOSurfaceAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to execute arbitrary code withkernel privilegesDescription: A memory corruption issue was addressed with improvedmemory handling.CVE-2017-13861: Ian Beer of Google Project ZeroKernelAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to execute arbitrary code withkernel privilegesDescription: A memory corruption issue was addressed with improvedmemory handling.CVE-2017-13862: AppleCVE-2017-13876: Ian Beer of Google Project ZeroCVE-2017-13867: Ian Beer of Google Project ZeroKernelAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to read restricted memoryDescription: An out-of-bounds read was addressed with improved boundschecking.CVE-2017-13833: Brandon AzadKernelAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to read restricted memoryDescription: A type confusion issue was addressed with improvedmemory handling.CVE-2017-13855: Jann Horn of Google Project ZeroKernelAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: An application may be able to read restricted memoryDescription: A validation issue was addressed with improved inputsanitization.CVE-2017-13865: Ian Beer of Google Project ZeroCVE-2017-13868: Brandon AzadCVE-2017-13869: Jann Horn of Google Project ZeroWebKitAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: Processing maliciously crafted web content may lead toarbitrary code executionDescription: Multiple memory corruption issues were addressed withimproved memory handling.CVE-2017-7156: an anonymous researcherCVE-2017-7157: an anonymous researcherCVE-2017-13856: Jeonghoon ShinCVE-2017-13870: an anonymous researcherCVE-2017-13866: an anonymous researcherEntry added December 13, 2017Wi-FiAvailable for: Apple TV (4th generation)Released for Apple TV 4K in tvOS 11.1.Impact: An attacker in Wi-Fi range may force nonce reuse in WPAmulticast/GTK clients (Key Reinstallation Attacks - KRACK)Description: A logic issue existed in the handling of statetransitions. This was addressed with improved state management.CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KULeuvenInstallation note:Apple TV will periodically check for software updates. Alternatively,you may manually check for software updates by selecting"Settings -> System -> Software Update -> Update Software."To check the current version of software, select"Settings -> General -> About."Information will also be posted to the Apple Security Updatesweb site: https://support.apple.com/kb/HT201222
 
 
 
APPLE-SA-2017-12-13-2 tvOS 11.2.1tvOS 11.2.1 is now available and addresses the following:HomeKitAvailable for: Apple TV 4K and Apple TV (4th generation)Impact: A remote attacker may be able to unexpectedly alterapplication stateDescription: A message handling issue was addressed with improvedinput validation.CVE-2017-13903: Tian ZhangInstallation note:Apple TV will periodically check for software updates. Alternatively,you may manually check for software updates by selecting"Settings -> System -> Software Update -> Update Software."To check the current version of software, select"Settings -> General -> About."Information will also be posted to the Apple Security Updatesweb site: https://support.apple.com/kb/HT201222
 
 
 
APPLE-SA-2017-12-13-1 iOS 11.2.1iOS 11.2.1 is now available and addresses the following:HomeKitAvailable for: iPhone 5s and later, iPad Air and later, and iPodtouch 6th generationImpact: A remote attacker may be able to unexpectedly alterapplication stateDescription: A message handling issue was addressed with improvedinput validation.CVE-2017-13903: Tian ZhangInstallation note:This update is available through iTunes and Software Update on youriOS device, and will not appear in your computer's Software Updateapplication, or in the Apple Downloads site. Make sure you have anInternet connection and have installed the latest version of iTunesfrom https://www.apple.com/itunes/iTunes and Software Update on the device will automatically checkApple's update server on its weekly schedule. When an update isdetected, it is downloaded and the option to be installed ispresented to the user when the iOS device is docked. We recommendapplying the update immediately if possible. Selecting Don't Installwill present the option the next time you connect your iOS device.The automatic update process may take up to a week depending on theday that iTunes or the device checks for updates. You may manuallyobtain the update via the Check for Updates button within iTunes, orthe Software Update on your device.To check that the iPhone, iPod touch, or iPad has been updated:* Navigate to Settings* Select General* Select About. The version after applying this updatewill be "11.2.1".Information will also be posted to the Apple Security Updatesweb site: https://support.apple.com/kb/HT201222This message is signed with Apple's Product Security PGP key,and details are available at:https://www.apple.com/support/security/pgp/
 
 
 
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4064-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
December 12, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package        : chromium-browser
CVE ID         : CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410
                 CVE-2017-15411 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416
                 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420
                 CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426
                 CVE-2017-15427
Several vulnerabilities have been discovered in the chromium web browser.
CVE-2017-15407
    Ned Williamson discovered an out-of-bounds write issue.
CVE-2017-15408
    Ke Liu discovered a heap overflow issue in the pdfium library.
CVE-2017-15409
    An out-of-bounds write issue was discovered in the skia library.
CVE-2017-15410
    Luat Nguyen discovered a use-after-free issue in the pdfium library.
CVE-2017-15411
    Luat Nguyen discovered a use-after-free issue in the pdfium library.
CVE-2017-15413
    Gaurav Dewan discovered a type confusion issue.
CVE-2017-15415
    Viktor Brange discovered an information disclosure issue.
CVE-2017-15416
    Ned Williamson discovered an out-of-bounds read issue.
CVE-2017-15417
    Max May discovered an information disclosure issue in the skia
    library.
CVE-2017-15418
    Kushal Arvind Shah discovered an uninitialized value in the skia
    library.
CVE-2017-15419
    Jun Kokatsu discoved an information disclosure issue.
CVE-2017-15420
    WenXu Wu discovered a URL spoofing issue.
CVE-2017-15423
    Greg Hudson discovered an issue in the boringssl library.
CVE-2017-15424
    Khalil Zhani discovered a URL spoofing issue.
CVE-2017-15425
    xisigr discovered a URL spoofing issue.
CVE-2017-15426
    WenXu Wu discovered a URL spoofing issue.
CVE-2017-15427
    Junaid Farhan discovered an issue with the omnibox.
For the stable distribution (stretch), these problems have been fixed in
version 63.0.3239.84-1~deb9u1.
We recommend that you upgrade your chromium-browser packages.
For the detailed security status of chromium-browser please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium-browser
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/