The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 LTS:
DLA 1320-1: samba security update
DLA 1321-1: firefox-esr security update
Debian GNU/Linux 8 and 9:
DSA 4153-1: firefox-esr security update
Debian GNU/Linux 7 LTS:
DLA 1320-1: samba security update
DLA 1321-1: firefox-esr security update
Debian GNU/Linux 8 and 9:
DSA 4153-1: firefox-esr security update
DLA 1320-1: samba security update
Package : samba
Version : 3.6.6-6+deb7u16
CVE ID : CVE-2018-1050
Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:
CVE-2018-1050
It was discovered that Samba is prone to a denial of service
attack when the RPC spoolss service is configured to be run as an
external daemon. Thanks for Jeremy Allison for the patch.
https://www.samba.org/samba/security/CVE-2018-1050.html
For Debian 7 "Wheezy", these problems have been fixed in version
3.6.6-6+deb7u16.
We recommend that you upgrade your samba packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
--
cheers,
Holger
DLA 1321-1: firefox-esr security update
Package : firefox-esr
Version : 52.7.3esr-1~deb7u1
CVE ID : CVE-2018-5148
Jesse Schwartzentruber discovered a use-after-free vulnerability
in Firefox, which could be exploited to trigger an application
crash or arbitrary code execution.
For Debian 7 "Wheezy", these problems have been fixed in version
52.7.3esr-1~deb7u1.
We recommend that you upgrade your firefox-esr packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DSA 4153-1: firefox-esr security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4153-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 27, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : firefox-esr
CVE ID : CVE-2018-5148
It was discovered that a use-after-free in the compositor of Firefox
can result in the execution of arbitrary code.
For the oldstable distribution (jessie), this problem has been fixed
in version 52.7.3esr-1~deb8u1.
For the stable distribution (stretch), this problem has been fixed in
version 52.7.3esr-1~deb9u1.
We recommend that you upgrade your firefox-esr packages.
For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/