Debian 10158 Published by

The following updates has been released for Debian:

Debian GNU/Linux 7 LTS:
DLA 1074-1: poppler security update
DLA 1075-1: wordpress security update

Debian GNU/Linux 9:
DSA 3959-1: libgcrypt20 security update



DLA 1074-1: poppler security update




Package : poppler
Version : 0.18.4-6+deb7u2
CVE ID : CVE-2013-4473 CVE-2013-4474 CVE-2017-9775 CVE-2017-9776
CVE-2017-9865

Several buffer and integer overflow issues were discovered in Poppler,
a PDF library, that could lead to application crash or possibly other
unspecified impact via maliciously crafted files.

For Debian 7 "Wheezy", these problems have been fixed in version
0.18.4-6+deb7u2.

We recommend that you upgrade your poppler packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DLA 1075-1: wordpress security update




Package : wordpress
Version : 3.6.1+dfsg-1~deb7u16
CVE ID : CVE-2017-9066
Debian Bug : 862816

In WordPress, there is insufficient redirect validation in the
HTTP class, leading to SSRF.

For Debian 7 "Wheezy", these problems have been fixed in version
3.6.1+dfsg-1~deb7u16.

We recommend that you upgrade your wordpress packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DSA 3959-1: libgcrypt20 security update




- -------------------------------------------------------------------------
Debian Security Advisory DSA-3959-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 29, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libgcrypt20
CVE ID : CVE-2017-0379
Debian Bug : 873383

Daniel Genkin, Luke Valenta and Yuval Yarom discovered that Libgcrypt
is prone to a local side-channel attack against the ECDH encryption with
Curve25519, allowing recovery of the private key.

See https://eprint.iacr.org/2017/806 for details.

For the stable distribution (stretch), this problem has been fixed in
version 1.7.6-2+deb9u2.

For the unstable distribution (sid), this problem has been fixed in
version 1.7.9-1.

We recommend that you upgrade your libgcrypt20 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/