Commit 519cf110 authored by Adrian Bunk's avatar Adrian Bunk Committed by Holger Levsen

Add DLAs 1687/1698/1699 with correct pathes

parent 6275c1c0
<define-tag pagetitle>DLA-1687-1 sox</define-tag>
<define-tag report_date>2019-02-24</define-tag>
<define-tag secrefs>CVE-2014-8145</define-tag>
<define-tag packages>sox</define-tag>
<define-tag isvulnerable>yes</define-tag>
<define-tag fixed>yes</define-tag>
<define-tag fixed-section>no</define-tag>
#use wml::debian::security
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>Mike Salvatore discovered that the fixes for these heap-based buffer
overflows had not been properly applied in the Debian package.</p>
<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
14.4.1-5+deb8u1.</p>
<p>We recommend that you upgrade your sox packages.</p>
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2019/dla-1687.data"
# $Id: $
<define-tag pagetitle>DLA-1698-1 file</define-tag>
<define-tag report_date>2019-02-28</define-tag>
<define-tag secrefs>CVE-2019-8905 CVE-2019-8907</define-tag>
<define-tag packages>file</define-tag>
<define-tag isvulnerable>yes</define-tag>
<define-tag fixed>yes</define-tag>
<define-tag fixed-section>no</define-tag>
#use wml::debian::security
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>Potential buffer over-reads in readelf.c have been found in file,
a popular file type guesser.</p>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2019-8905">CVE-2019-8905</a>
<p>We recommend that you upgrade your file packages.</p>
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2019/dla-1698.data"
# $Id: $
<define-tag pagetitle>DLA-1699-1 ldb</define-tag>
<define-tag report_date>2019-03-01</define-tag>
<define-tag secrefs>CVE-2019-3824</define-tag>
<define-tag packages>ldb</define-tag>
<define-tag isvulnerable>yes</define-tag>
<define-tag fixed>yes</define-tag>
<define-tag fixed-section>no</define-tag>
#use wml::debian::security
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>Garming Sam reported an out-of-bounds read in the ldb_wildcard_compare()
function of ldb, a LDAP-like embedded database, resulting in denial of
service.</p>
<p>For Debian 8 <q>Jessie</q>, this problem has been fixed in version
2:1.1.20-0+deb8u2.</p>
<p>We recommend that you upgrade your ldb packages.</p>
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2019/dla-1699.data"
# $Id: $
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment