Debian 9859 Published by

The following updates has been released for Debian:

[DLA 506-1] dhcpcd5 security update
[DSA 3596-1] spice security update



[DLA 506-1] dhcpcd5 security update

Package : dhcpcd5
Version : 5.5.6-1+deb7u2
CVE ID : CVE-2014-7912 CVE-2014-7913
Debian Bug : N/A

Two vulnerabilities were discovered in dhcpcd5 a DHCP client package.
A remote (on a local network) attacker can possibly execute arbitrary
code or cause a denial of service attack by crafted messages.

CVE-2014-7912

The get_option function does not validate the relationship between
length fields and the amount of data, which allows remote DHCP
servers to execute arbitrary code or cause a denial of service
(memory corruption) via a large length value of an option in a
DHCPACK message.

CVE-2014-7913

The print_option function misinterprets the return value of the
snprintf function, which allows remote DHCP servers to execute
arbitrary code or cause a denial of service (memory corruption)
via a crafted message.

For Debian 7 "Wheezy", these problems have been fixed in version
5.5.6-1+deb7u2.

We recommend that you upgrade your dhcpcd5 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DSA 3596-1] spice security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3596-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 06, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : spice
CVE ID : CVE-2016-0749 CVE-2016-2150

Several vulnerabilities were discovered in spice, a SPICE protocol
client and server library. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2016-0749

Jing Zhao of Red Hat discovered a memory allocation flaw, leading to
a heap-based buffer overflow in spice's smartcard interaction. A
user connecting to a guest VM via spice can take advantage of this
flaw to cause a denial-of-service (QEMU process crash), or
potentially to execute arbitrary code on the host with the
privileges of the hosting QEMU process.

CVE-2016-2150

Frediano Ziglio of Red Hat discovered that a malicious guest inside
a virtual machine can take control of the corresponding QEMU process
in the host using crafted primary surface parameters.

For the stable distribution (jessie), these problems have been fixed in
version 0.12.5-1+deb8u3.

We recommend that you upgrade your spice packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/