3 Debian Updates
Posted on: 03/20/2017 10:27 AM

The following updates has been released for Debian GNU/Linux:

[DLA-862-1] sitesummary regression update
[DLA 863-1] deluge security update
[DSA 3813-1] r-base security update

[DLA-862-1] sitesummary regression update
Package : sitesummary
Version : 0.1.8+deb7u2
Debian Bug : 852623

The fix for CVE-2016-8743 in apache2 2.2.22-13+deb7u8 (DLA-841-1) caused
#852623 in sitesummary, breaking the sitesummary-upload functionality.
To address this sitesummary-upload needs to be changed to send CRLF (\r\n)
line endings to be compliant with the apache security fixes for HTTP requests.

For Debian 7 "Wheezy", these problems have been fixed in version
0.1.8+deb7u2.

We recommend that you upgrade your sitesummary packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


[DLA 863-1] deluge security update
Package : deluge
Version : 1.3.3-2+nmu1+deb7u1
CVE ID : CVE-2017-7178
Debian Bug : #857903

It was discovered that there was a cross-site request forgery vulnerability in
the WebUI component of the "deluge" Bittorrent client.

For Debian 7 "Wheezy", this issue has been fixed in deluge version
1.3.3-2+nmu1+deb7u1.

We recommend that you upgrade your deluge packages.


[DSA 3813-1] r-base security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3813-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 19, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : r-base
CVE ID : CVE-2016-8714

Cory Duplantis discovered a buffer overflow in the R programming
langauage. A malformed encoding file may lead to the execution of
arbitrary code during PDF generation.

For the stable distribution (jessie), this problem has been fixed in
version 3.1.1-1+deb8u1.

For the upcoming stable distribution (stretch), this problem has been
fixed in version 3.3.3-1.

For the unstable distribution (sid), this problem has been fixed in
version 3.3.3-1.

We recommend that you upgrade your r-base packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/




Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/3_debian_updates_9982.html)