Debian 10227 Published by

The following updates has been released for Debian GNU/Linux:

Debian GNU/Linux 7 LTS:
DLA 1320-1: samba security update
DLA 1321-1: firefox-esr security update

Debian GNU/Linux 8 and 9:
DSA 4153-1: firefox-esr security update



DLA 1320-1: samba security update

Package : samba
Version : 3.6.6-6+deb7u16
CVE ID : CVE-2018-1050

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

CVE-2018-1050

It was discovered that Samba is prone to a denial of service
attack when the RPC spoolss service is configured to be run as an
external daemon. Thanks for Jeremy Allison for the patch.

https://www.samba.org/samba/security/CVE-2018-1050.html

For Debian 7 "Wheezy", these problems have been fixed in version
3.6.6-6+deb7u16.

We recommend that you upgrade your samba packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


--
cheers,
Holger



DLA 1321-1: firefox-esr security update




Package : firefox-esr
Version : 52.7.3esr-1~deb7u1
CVE ID : CVE-2018-5148

Jesse Schwartzentruber discovered a use-after-free vulnerability
in Firefox, which could be exploited to trigger an application
crash or arbitrary code execution.

For Debian 7 "Wheezy", these problems have been fixed in version
52.7.3esr-1~deb7u1.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DSA 4153-1: firefox-esr security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-4153-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 27, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2018-5148

It was discovered that a use-after-free in the compositor of Firefox
can result in the execution of arbitrary code.

For the oldstable distribution (jessie), this problem has been fixed
in version 52.7.3esr-1~deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 52.7.3esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/