[SECURITY] [DLA 1720-1] liblivemedia security update

2019-03-18 Thread Hugo Lefeuvre
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Package: liblivemedia
Version: 2014.01.13-1+deb8u3
CVE ID : CVE-2019-9215
Debian Bug : 924655

It was discovered that liblivemedia, the LIVE555 RTSP server library,
is vulnerable to an invalid memory access when processing the
Authorization header field. Remote attackers could leverage this
vulnerability to possibly trigger code execution or denial of service
(OOB access and application crash) via a crafted HTTP header.

For Debian 8 "Jessie", this problem has been fixed in version
2014.01.13-1+deb8u3.

We recommend that you upgrade your liblivemedia packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEUFZhdgIWqBhwqCvuZYVUZx9w0DQFAlyP98kACgkQZYVUZx9w
0DQ/dAgAl7x/KjMZpvuL1MiK6PSDQUwMxGRS4vnSTOyw0svg+/fDh0jzmcZG2HOp
5NdX0fjfqsfkRLw46BLHwF65rDXhEuxJ8c1GqxxMZ/uZOnXkbfpQFELNYyqpigm7
SkE51CCS1mJILmAuBKuRequ1rrhl7v+lbvoiMOlC99g4o8XJsin3kVmdTdoyZRSc
F6SE63IoXJGMf/JyFWt4aLqaX5VOhBMbjDle/5JJieXr1oNNbtgOfcPzqUzQ1/zg
9KHrV/1KOjOx/bwlupP8oTKEtua4N57k/3WuYskKhApZyVNTXPABEjZnJ5DXUeDm
gn8EfA+F2KTB5jORXx3DrzAUxcW9bw==
=sXeH
-END PGP SIGNATURE-



[SECURITY] [DLA 1719-1] libjpeg-turbo security update

2019-03-18 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: libjpeg-turbo
Version: 1:1.3.1-12+deb8u2
CVE ID : CVE-2018-14498
Debian Bug : #924678

It was discovered that there was a denial of service vulnerability in
the libjpeg-turbo CPU-optimised JPEG image library. A heap-based
buffer over-read could be triggered by a specially-crafted bitmap
(BMP) file.

For Debian 8 "Jessie", this issue has been fixed in libjpeg-turbo
version 1:1.3.1-12+deb8u2.

We recommend that you upgrade your libjpeg-turbo packages.


Regards,

- -- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-

-BEGIN PGP SIGNATURE-
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=2tm6
-END PGP SIGNATURE-



[SECURITY] [DLA 1718-1] sqlalchemy security update

2019-03-18 Thread Sylvain Beucler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Package: sqlalchemy
Version: 0.9.8+dfsg-0.1+deb8u1
CVE ID : CVE-2019-7164 CVE-2019-7548
Debian Bug : 922669


Two vulnerabilities were discovered in SQLALchemy, a Python SQL
Toolkit and Object Relational Mapper.

CVE-2019-7164

SQLAlchemy allows SQL Injection via the order_by parameter.

CVE-2019-7548

SQLAlchemy has SQL Injection when the group_by parameter can be controlled.

The SQLAlchemy project warns that these security fixes break the
seldom-used text coercion feature.

For Debian 8 "Jessie", these problems have been fixed in version
0.9.8+dfsg-0.1+deb8u1.

We recommend that you upgrade your sqlalchemy packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEQic8GuN/xDR88HkSj/HLbo2JBZ8FAlyPnDwACgkQj/HLbo2J
BZ/qqgf9HVfWEeJd9mN/NcJ2/6VILPt7lyDNKuAircBJt4Ya9wTxGpvN3Vknt2ry
Z0oCMBz/z8EHNnlDyJHP4QGKrKXK2obwwVFfaOeel1b4OK6Aj3UMBzbEGypCn7y/
4GzWeQhJcejbhIc8xgJc8/NSqdjeJ7buxV2fny/L+3RNy3UDmLkTqKOaPn0vOau1
N5cOaazYhUvfBmdQCF5cebI5CCOWmpreOGm8QDbwHJAxO6VFtZyMdByQOOYCv80r
kQRuon9ia1qwqyVK8WjkDcV9pZxEI5dH7UN6+Eaum+ZAF+sJ/A3oNcc3iWB9N6JV
KXcPBxTWcIIQJTK+zWOvU1TJ0VTSww==
=JGde
-END PGP SIGNATURE-



[SECURITY] [DLA 1717-1] rdflib security update

2019-03-18 Thread Brian May
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: rdflib
Version: 4.1.2-3+deb8u1
CVE ID : CVE-2019-7653
Debian Bug : #921751


The CLI tools in python-rdflib-tools can load python modules
found in the current directory. This happens because "python -m"
appends the current directory in the python path.

For Debian 8 "Jessie", this problem has been fixed in version
4.1.2-3+deb8u1.

We recommend that you upgrade your rdflib packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEKpwfR8DOwu5vyB4TKpJZkldkSvoFAlyPO24ACgkQKpJZkldk
SvpuLw//S2zb9NiB9sMKVyZkLLLh4++DmJc5CSIdtquSkzfwGOV0AvD4Jr5Ls9nk
v1VjVSNM1Nty93x5XEeAJHZCO+YAUKFTGjMEhn3Mry380UAiZzZquvIR15xohDaT
hhslKlVOgSSM8BhEM42Vyd27zsoZ3DJkFg7kE45f7hEkfz8KKrK8ZAYbF8d3LqmC
TQuhv1vUbOyKgnMVXYQwuX7yLTWyu0CRCc6co2n2K1YZyfb6wIhXzAty8EAFu4SR
Mg75itoOhrx/75drLLn4/T/zttYQL+Zf9rbFYI8En8vW/57o4jnrR9KldBigmjKD
YmNb8ESdmOW06ElDVvJdIY55yCt5Uc0F/2ZV9DrotEdMi0kONznU0A1aqx95CU0R
r/D+yyAM+kVOVsg4Xvm5e0rs/g8UxIbfwrzEYfqqOp/nEdMSW/Gz8A9XtD4N2m5U
XHfSoM7Grm0I0hTRhcbKTID9rIaZYEQpQFyeJ9eEGPcDSTVORRLJIXVfuJ5DyjO9
4GoBLI+QB2Xd4AVObdMFtPFKBVSH/wSFD4+8utlLyWUi5BR+2Gp84m6Z8qMBSTBW
Cc6pg4Aj4yslTKaOjM15B+/gqWwxzE2BMOxP+fP0I5ho5WVFiIq+2HnFW3t3ZHV0
fpk6HBpuyGecbS3lqmTOumc7Gur+rJVfJ+5aBMVfoYh64wcu1dU=
=wwN5
-END PGP SIGNATURE-



[SECURITY] [DLA 1716-1] ikiwiki security update

2019-03-18 Thread Brian May
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: ikiwiki
Version: 3.20141016.4+deb8u1
CVE ID : CVE-2019-9187

The ikiwiki maintainers discovered that the aggregate plugin did not use
LWPx::ParanoidAgent. On sites where the aggregate plugin is enabled, authorized
wiki editors could tell ikiwiki to fetch potentially undesired URIs even if
LWPx::ParanoidAgent was installed:

local files via file: URIs
other URI schemes that might be misused by attackers, such as gopher:
hosts that resolve to loopback IP addresses (127.x.x.x)
hosts that resolve to RFC 1918 IP addresses (192.168.x.x etc.)

This could be used by an attacker to publish information that should not have
been accessible, cause denial of service by requesting "tarpit" URIs that are
slow to respond, or cause undesired side-effects if local web servers implement
"unsafe" GET requests. (CVE-2019-9187)

Additionally, if liblwpx-paranoidagent-perl is not installed, the
blogspam, openid and pinger plugins would fall back to LWP, which is
susceptible to similar attacks. This is unlikely to be a practical problem for
the blogspam plugin because the URL it requests is under the control of the
wiki administrator, but the openid plugin can request URLs controlled by
unauthenticated remote users, and the pinger plugin can request URLs controlled
by authorized wiki editors.

This is addressed in ikiwiki 3.20190228 as follows, with the same fixes
backported to Debian 9 in version 3.20170111.1:

* URI schemes other than http: and https: are not accepted, preventing access
  to file:, gopher:, etc.

* If a proxy is configured in the ikiwiki setup file, it is used for all
  outgoing http: and https: requests. In this case the proxy is responsible for
  blocking any requests that are undesired, including loopback or RFC 1918
  addresses.

* If a proxy is not configured, and liblwpx-paranoidagent-perl is installed, it
  will be used. This prevents loopback and RFC 1918 IP addresses, and sets a
  timeout to avoid denial of service via "tarpit" URIs.

* Otherwise, the ordinary LWP user-agent will be used. This allows requests to
  loopback and RFC 1918 IP addresses, and has less robust timeout behaviour.
  We are not treating this as a vulnerability: if this behaviour is not
  acceptable for your site, please make sure to install LWPx::ParanoidAgent or
  disable the affected plugins.

For Debian 8 "Jessie", this problem has been fixed in version
3.20141016.4+deb8u1.

We recommend that you upgrade your ikiwiki packages. In addition it is also
recommended that you have liblwpx-paranoidagent-perl installed, which listed in
the recommends field of ikiwiki.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEKpwfR8DOwu5vyB4TKpJZkldkSvoFAlyPOxMACgkQKpJZkldk
SvoxIhAAhHxmfgAqOieaGfoB/CvszocV3l43v/W8AWdgKfwp83RE8bf+gzR7Jzp6
mgrItSHBBZebCSPwRoJgLAYD2gtwvt+rWimURA+nDHbKsgcyM6Vv9MWAKDzWweJQ
WlLr5AlPzA85WKAN5+N2yD2MH4jX8CodQWEITf2Y1eJNftm/Ld7hc/+I3Ec1VbPW
JQXqB+JBPKB1KTM2b15/N+lPoczOikHEEZEFzcIfavKE28KiQjvFPgscn69K5/t5
838GqRjIpMHGFUg+KI+UsvArpWuNIKe3f2PZurnBNZ6mcrFDMHHGeYmHFvoMNvZG
OtOmxe6lbwVWnvaj5PjaLiKQjJrt+F//qIqA44kCqOqHhCIuGMy1MYHvq2XYvlC2
nMIKN1wZcRfR8s4zi5+42g4EZdExCatTFZWS2H/CqxSHLGp/jIIftrNMdl1IyQX2
TQdfYi503ve6pe9suiQ/ldyAX9RbPHiQEhloZQ22xbv8Mqwd/icksCAiZINPL5dO
s/1wXPL5p/Mvg8g1lNwUdwcBGV9p8FG+lUnfVXEtyn3/bBIX7zQKpIqp8tT4FqHV
wnai5YzLSR6G8yrpUG5PTEKQiEyzEG5sZn9lCR/xp90OXROadgtrAyY++i5LbRyk
iobz4vRAp5b0JD913B+wpaCWztSaH8g4e7scdTY6737xPI24A7k=
=kwVR
-END PGP SIGNATURE-