OpenSSH, Mgetty, Kamailio Updates for Debian 8 LTS
Posted on: 09/13/2018 07:41 AM

The following updates has been released for Debian GNU/Linux 8 LTS:

DLA 1500-2: openssh regression update
DLA 1502-1: mgetty security update
DLA 1503-1: kamailio security update

DLA 1500-2: openssh regression update
Package : openssh
Version : 1:6.7p1-5+deb8u7
Debian Bug : 908652


The security update of OpenSSH announced as DLA 1500-1 introduced a bug in
openssh-client: when X11 forwarding is enabled (via system-wide
configuration in ssh_config or via -X command line switch), but no DISPLAY
is set, the client produces a "DISPLAY "(null)" invalid; disabling X11
forwarding" warning. These bug was introduced by the patch set to fix the
CVE-2016-1908 issue. For reference, the following is the relevant section
of the original announcement:

CVE-2016-1908

OpenSSH mishandled untrusted X11 forwarding when the X server disables
the SECURITY extension. Untrusted connections could obtain trusted X11
forwarding privileges. Reported by Thomas Hoger.

For Debian 8 "Jessie", this problem has been fixed in version
1:6.7p1-5+deb8u7.

We recommend that you upgrade your openssh packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS




DLA 1502-1: mgetty security update



Package : mgetty
Version : 1.1.36-2.1+deb8u1
CVE ID : CVE-2018-16741


Two input sanitization failures have been found in the faxrunq and faxq
binaries in mgetty. An attacker could leverage them to insert commands
via shell metacharacters in jobs id and have them executed with the
privilege of the faxrunq/faxq user.

For Debian 8 "Jessie", this problem has been fixed in version
1.1.36-2.1+deb8u1.

We recommend that you upgrade your mgetty packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



DLA 1503-1: kamailio security update



Package : kamailio
Version : 4.2.0-2+deb8u5
CVE ID : CVE-2018-16657
Debian Bug : #908324

It was discovered that there was a denial of service and a potential
arbitrary code execution vulnerability in the kamailio SIP server.

A specially-crafted SIP message with an invalid "Via" header could cause a
segmentation fault and crash Kamailio due to missing input validation.

For Debian 8 "Jessie", this issue has been fixed in kamailio version
4.2.0-2+deb8u5.

We recommend that you upgrade your kamailio packages.








Printed from Linux Compatible (https://www.linuxcompatible.org/news/story/opensshmgettykamailio_updates_for_debian_8_lts.html)