Debian 10166 Published by

The following two updates has been released for Debian:

[DSA 3320-1] openafs security update
[DSA 3321-1] xmltooling security update



[DSA 3320-1] openafs security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3320-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
July 30, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openafs
CVE ID : CVE-2015-3282 CVE-2015-3283 CVE-2015-3284 CVE-2015-3285
CVE-2015-3287

It was discovered that OpenAFS, the implementation of the distributed
filesystem AFS, contained several flaws that could result in
information leak, denial-of-service or kernel panic.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.6.1-3+deb7u3.

For the stable distribution (jessie), these problems have been fixed in
version 1.6.9-2+deb8u3.

We recommend that you upgrade your openafs packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3321-1] xmltooling security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3321-1 security@debian.org
https://www.debian.org/security/ Alessandro Ghedini
July 30, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xmltooling
CVE ID : CVE-2015-0851
Debian Bug : 793855

The InCommon Shibboleth Training team discovered that XMLTooling, a
C++ XML parsing library, did not properly handle an exception when
parsing well-formed but schema-invalid XML. This could allow remote
attackers to cause a denial of service (crash) via crafted XML data.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1.4.2-5+deb7u1.

For the stable distribution (jessie), this problem has been fixed in
version 1.5.3-2+deb8u1.

For the unstable distribution (sid), this problem will be fixed shortly.

We recommend that you upgrade your xmltooling packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/