Debian 9891 Published by

The following Debian updates has been released:

[DLA 1034-1] php5 security update
[DLA 1035-1] qemu security update
[DSA 3916-1] atril security update



[DLA 1034-1] php5 security update

Package : php5
Version : 5.4.45-0+deb7u9
CVE ID : CVE-2016-10397 CVE-2017-11143 CVE-2017-11144
CVE-2017-11145 CVE-2017-11147

Several issues have been discovered in PHP (recursive acronym for PHP:
Hypertext Preprocessor), a widely-used open source general-purpose
scripting language that is especially suited for web development and can
be embedded into HTML.

CVE-2016-10397
Incorrect handling of various URI components in the URL parser could
be used by attackers to bypass hostname-specific URL checks.

CVE-2017-11143
An invalid free in the WDDX deserialization of boolean parameters
could be used by attackers able to inject XML for deserialization to
crash the PHP interpreter.

CVE-2017-11144
The openssl extension PEM sealing code did not check the return value
of the OpenSSL sealing function, which could lead to a crash of the
PHP interpreter.

CVE-2017-11145
Lack of a bounds check in the date extension's timelib_meridian
parsing code could be used by attackers able to supply date strings to
leak information from the interpreter.

CVE-2017-11147
The PHAR archive handler could be used by attackers supplying
malicious archive files to crash the PHP interpreter or potentially
disclose information due to a buffer over-read in the
phar_parse_pharfile function in ext/phar/phar.c.

For Debian 7 "Wheezy", these problems have been fixed in version
5.4.45-0+deb7u9.

We recommend that you upgrade your php5 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DLA 1035-1] qemu security update

Package : qemu
Version : 1.1.2+dfsg-6+deb7u22
CVE ID : CVE-2016-9602 CVE-2016-9603 CVE-2017-7377 CVE-2017-7471
CVE-2017-7493 CVE-2017-7718 CVE-2017-7980 CVE-2017-8086

Several vulnerabilities were discovered in qemu, a fast processor
emulator. The Common Vulnerabilities and Exposures project identifies
the following problems:

CVE-2016-9603

qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator and the VNC
display driver support is vulnerable to a heap buffer overflow
issue. It could occur when Vnc client attempts to update its
display after a vga operation is performed by a guest.

A privileged user/process inside guest could use this flaw to crash
the Qemu process resulting in DoS OR potentially leverage it to
execute arbitrary code on the host with privileges of the Qemu
process.

CVE-2017-7718

qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is
vulnerable to an out-of-bounds access issue. It could occur while
copying VGA data via bitblt functions cirrus_bitblt_rop_fwd_transp_
and/or cirrus_bitblt_rop_fwd_.

A privileged user inside guest could use this flaw to crash the
Qemu process resulting in DoS.

CVE-2017-7980

qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is
vulnerable to an out-of-bounds r/w access issues. It could occur
while copying VGA data via various bitblt functions.

A privileged user inside guest could use this flaw to crash the
Qemu process resulting in DoS OR potentially execute arbitrary code
on a host with privileges of Qemu process on the host.

CVE-2016-9602

Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
Plan 9 File System(9pfs) support, is vulnerable to an improper link
following issue. It could occur while accessing symbolic link files
on a shared host directory.

A privileged user inside guest could use this flaw to access host file
system beyond the shared folder and potentially escalating their
privileges on a host.

CVE-2017-7377

Quick Emulator(Qemu) built with the virtio-9p back-end support is
vulnerable to a memory leakage issue. It could occur while doing a I/O
operation via v9fs_create/v9fs_lcreate routine.

A privileged user/process inside guest could use this flaw to leak
host memory resulting in Dos.

CVE-2017-7471

Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
Plan 9 File System(9pfs) support, is vulnerable to an improper access
control issue. It could occur while accessing files on a shared host
directory.

A privileged user inside guest could use this flaw to access host file
system beyond the shared folder and potentially escalating their
privileges on a host.

CVE-2017-7493

Quick Emulator(Qemu) built with the VirtFS, host directory sharing via
Plan 9 File System(9pfs) support, is vulnerable to an improper access
control issue. It could occur while accessing virtfs metadata files
in mapped-file security mode.

A guest user could use this flaw to escalate their privileges inside
guest.

CVE-2017-8086

Quick Emulator(Qemu) built with the virtio-9p back-end support is
vulnerable to a memory leakage issue. It could occur while querying
file system extended attributes via 9pfs_list_xattr() routine.

A privileged user/process inside guest could use this flaw to leak
host memory resulting in Dos.


For Debian 7 "Wheezy", these problems have been fixed in version
1.1.2+dfsg-6+deb7u22.

We recommend that you upgrade your qemu packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


[DSA 3916-1] atril security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3916-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 21, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : atril
CVE ID : CVE-2017-1000083
Debian Bug : 868500

It was discovered that Atril, the MATE document viewer, made insecure
use of tar when opening tar comic book archives (CBT). Opening a
malicious CBT archive could result in the execution of arbitrary code.
This update disables the CBT format entirely.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.8.1+dfsg1-4+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.16.1-2+deb9u1.

We recommend that you upgrade your atril packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/