sunrat Posted October 27, 2013 Share Posted October 27, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2787-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso October 27, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : roundcube Vulnerability : design error Problem type : remote Debian-specific: no CVE ID : CVE-2013-6172 Debian Bug : 727668 It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, does not properly sanitize the _session parameter in steps/utils/save_pref.inc during saving preferences. The vulnerability can be exploited to overwrite configuration settings and subsequently allowing random file access, manipulated SQL queries and even code execution. roundcube in the oldstable distribution (squeeze) is not affected by this problem. For the stable distribution (wheezy), this problem has been fixed in version 0.7.2-9+deb7u1. For the unstable distribution (sid), this problem will be fixed soon. Link to comment Share on other sites More sharing options...
sunrat Posted October 28, 2013 Share Posted October 28, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2786-1 security@debian.org http://www.debian.org/security/ Michael Gilbert October 27, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : icu Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-0900 CVE-2013-2924 Debian Bug : 702346 726477 The Google Chrome Security Team discovered two issues (a race condition and a use-after-free issue) in the International Components for Unicode (ICU) library. For the oldstable distribution (squeeze), these problems have been fixed in version 4.4.1-8+squeeze2. For the stable distribution (wheezy), which is only affected by CVE-2013-2924, this problem has been fixed in version 4.8.1.1-12+deb7u1. For the testing distribution (jessie), which is only affected by CVE-2013-2924, this problem will be fixed soon. For the unstable distribution (sid), which is only affected by CVE-2013-2924, this problem has been fixed in version 4.8.1.1-13+nmu1. Link to comment Share on other sites More sharing options...
sunrat Posted October 31, 2013 Share Posted October 31, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2788-1 security@debian.org http://www.debian.org/security/ Raphael Geissert October 31, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : iceweasel Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-5590 CVE-2013-5595 CVE-2013-5597 CVE-2013-5599 CVE-2013-5600 CVE-2013-5601 CVE-2013-5602 CVE-2013-5604 Multiple security issues have been found in iceweasel, Debian's version of the Mozilla Firefox web browser: multiple memory safety errors, and other implementation errors may lead to the execution of arbitrary code. The iceweasel version in the oldstable distribution (squeeze) is no longer supported with security updates. For the stable distribution (wheezy), these problems have been fixed in version 17.0.10esr-1~deb7u1. For the unstable distribution (sid), these problems will fixed soon. Link to comment Share on other sites More sharing options...
sunrat Posted November 1, 2013 Share Posted November 1, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2789-1 security@debian.org http://www.debian.org/security/ Yves-Alexis Perez November 01, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : strongswan Vulnerability : Denial of service and authorization bypass Problem type : remote Debian-specific: no CVE ID : CVE-2013-6075 A vulnerability has been found in the ASN.1 parser of strongSwan, an IKE daemon used to establish IPsec protected links. By sending a crafted ID_DER_ASN1_DN ID payload to a vulnerable pluto or charon daemon, a malicious remote user can provoke a denial of service (daemon crash) or an authorization bypass (impersonating a different user, potentially acquiring VPN permissions she doesn't have). For the oldstable distribution (squeeze), this problem has been fixed in version 4.4.1-5.4. For the stable distribution (wheezy), this problem has been fixed in version 4.5.2-1.5+deb7u2. For the testing distribution (jessie), this problem has been fixed in version 5.1.0-3. For the unstable distribution (sid), this problem has been fixed in version 5.1.0-3. Link to comment Share on other sites More sharing options...
sunrat Posted November 4, 2013 Share Posted November 4, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2791-1 security@debian.org http://www.debian.org/security/ Florian Weimer November 04, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tryton-client Vulnerability : missing input sanitization Problem type : remote Debian-specific: no Cedric Krier discovered that the Tryton client does not sanitize the file extension supplied by the server when processing reports. As a result, a malicious server could send a report with a crafted file extension that causes the client to write any local file to which the user running the client has write access. For the oldstable distribution (squeeze), this problem has been fixed in version 1.6.1-1+deb6u1. For the stable distribution (wheezy), this problem has been fixed in version 2.2.3-1+deb7u1. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2792-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso November 04, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wireshark Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-6336 CVE-2013-6337 CVE-2013-6338 CVE-2013-6340 Multiple vulnerabilities were discovered in the dissectors for IEEE 802.15.4, NBAP, SIP and TCP, which could result in denial of service. The oldstable distribution (squeeze) is only affected by CVE-2013-6340. This problem has been fixed in version 1.2.11-6+squeeze13. For the stable distribution (wheezy), these problems have been fixed in version 1.8.2-5wheezy7. For the unstable distribution (sid), these problems have been fixed in version 1.10.3-1. Link to comment Share on other sites More sharing options...
sunrat Posted November 10, 2013 Share Posted November 10, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2793-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff November 09, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libav Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-0844 CVE-2013-0850 CVE-2013-0853 CVE-2013-0854 CVE-2013-0857 CVE-2013-0858 CVE-2013-0866 Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library. The CVE IDs mentioned above are just a small portion of the security issues fixed in this update. A full list of the changes is available at http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.9 For the stable distribution (wheezy), these problems have been fixed in version 0.8.9-1. For the unstable distribution (sid), these problems have been fixed in version 9.10-1. Link to comment Share on other sites More sharing options...
sunrat Posted November 11, 2013 Share Posted November 11, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2794-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso November 10, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : spip Vulnerability : several Problem type : remote Debian-specific: no Debian Bug : 729172 Several vulnerabilities have been found in SPIP, a website engine for publishing, resulting in cross-site request forgery on logout, cross-site scripting on author page, and PHP injection. For the oldstable distribution (squeeze), these problems have been fixed in version 2.1.1-3squeeze7. For the stable distribution (wheezy), these problems have been fixed in version 2.1.17-1+deb7u2. For the testing distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 2.1.24-1. For the experimental distribution, these problems have been fixed in version 3.0.12-1. Link to comment Share on other sites More sharing options...
sunrat Posted November 13, 2013 Share Posted November 13, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2795-1 security@debian.org http://www.debian.org/security/ Michael Gilbert November 13, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : lighttpd Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-4508 CVE-2013-4559 CVE-2013-4560 Debian Bug : 729453 Several vulnerabilities have been discovered in the lighttpd web server. CVE-2013-4508 It was discovered that lighttpd uses weak ssl ciphers when SNI (Server Name Indication) is enabled. This issue was solved by ensuring that stronger ssl ciphers are used when SNI is selected. CVE-2013-4559 The clang static analyzer was used to discover privilege escalation issues due to missing checks around lighttpd's setuid, setgid, and setgroups calls. Those are now appropriately checked. CVE-2013-4560 The clang static analyzer was used to discover a use-after-free issue when the FAM stat cache engine is enabled, which is now fixed. For the oldstable distribution (squeeze), these problems have been fixed in version 1.4.28-2+squeeze1.4. For the stable distribution (wheezy), these problems have been fixed in version 1.4.31-4+deb7u1. For the testing distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version lighttpd_1.4.33-1+nmu1. Link to comment Share on other sites More sharing options...
sunrat Posted November 14, 2013 Share Posted November 14, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2796-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso November 13, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : torque Vulnerability : arbitrary code execution Problem type : remote Debian-specific: no CVE ID : CVE-2013-4495 Debian Bug : 729333 Matt Ezell from Oak Ridge National Labs reported a vulnerability in torque, a PBS-derived batch processing queueing system. A user could submit executable shell commands on the tail of what is passed with the -M switch for qsub. This was later passed to a pipe, making it possible for these commands to be executed as root on the pbs_server. For the oldstable distribution (squeeze), this problem has been fixed in version 2.4.8+dfsg-9squeeze3. For the stable distribution (wheezy), this problem has been fixed in version 2.4.16+dfsg-1+deb7u2. For the unstable distribution (sid), this problem has been fixed in version 2.4.16+dfsg-1.3. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2797-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff November 13, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : icedove Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-5590 CVE-2013-5595 CVE-2013-5597 CVE-2013-5599 CVE-2013-5600 CVE-2013-5601 CVE-2013-5602 CVE-2013-5604 Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, and other implementation errors may lead to the execution of arbitrary code. The Icedove version in the oldstable distribution (squeeze) is no longer supported with full security updates. However, it should be noted that almost all security issues in Icedove stem from the included browser engine. These security problems only affect Icedove if scripting and HTML mails are enabled. If there are security issues specific to Icedove (e.g. a hypothetical buffer overflow in the IMAP implementation) we'll make an effort to backport such fixes to oldstable. For the stable distribution (wheezy), these problems have been fixed in version 17.0.10-1~deb7u1. For the unstable distribution (sid), these problems have been fixed in version 17.0.10-1. Link to comment Share on other sites More sharing options...
sunrat Posted November 17, 2013 Share Posted November 17, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2795-2 security@debian.org http://www.debian.org/security/ Michael Gilbert November 16, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : lighttpd Vulnerability : regression Problem type : remote Debian-specific: no Debian Bug : 729480 It was discovered discovered that SSL connections with client certificates stopped working after the DSA-2795-1 update of lighttpd. An upstream patch has now been applied that provides an appropriate identifier for client certificate verification. For the oldstable distribution (squeeze), this problem has been fixed in version 1.4.28-2+squeeze1.5. For the stable distribution (wheezy), this problem has been fixed in version 1.4.31-4+deb7u2. For the testing (jessie) and unstable (sid) distributions, this problem will be fixed soon. Link to comment Share on other sites More sharing options...
sunrat Posted November 18, 2013 Share Posted November 18, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2797-1 security@debian.org http://www.debian.org/security/ Michael Gilbert November 16, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : chromium-browser Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-2931 CVE-2013-6621 CVE-2013-6622 CVE-2013-6623 CVE-2013-6624 CVE-2013-6625 CVE-2013-6626 CVE-2013-6627 CVE-2013-6628 CVE-2013-6629 CVE-2013-6630 CVE-2013-6631 CVE-2013-6632 Several vulnerabilities have been discovered in the chromium web browser. CVE-2013-2931 The chrome 31 development team found various issues from internal fuzzing, audits, and other studies. CVE-2013-6621 Khalil Zhani discovered a use-after-free issue in speech input handling. CVE-2013-6622 cloudfuzzer discovered a use-after-free issue in HTMLMediaElement. CVE-2013-6623 miaubiz discovered an out-of-bounds read in the Blink/Webkit SVG implementation. CVE-2013-6624 Jon Butler discovered a use-after-free issue in id attribute strings. CVE-2013-6625 cloudfuzzer discovered a use-after-free issue in the Blink/Webkit DOM implementation. CVE-2013-6626 Chamal de Silva discovered an address bar spoofing issue. CVE-2013-6627 skylined discovered an out-of-bounds read in the HTTP stream parser. CVE-2013-6628 Antoine Delignat-Lavaud and Karthikeyan Bhargavan of INRIA Paris discovered that a different (unverified) certificate could be used after successful TLS renegotiation with a valid certificate. CVE-2013-6629 Michal Zalewski discovered an uninitialized memory read in the libjpeg and libjpeg-turbo libraries. CVE-2013-6630 Michal Zalewski discovered another uninitialized memory read in the libjpeg and libjpeg-turbo libraries. CVE-2013-6631 Patrik Höglund discovered a use-free issue in the libjingle library. CVE-2013-6632 Pinkie Pie discovered multiple memory corruption issues. For the stable distribution (wheezy), these problems have been fixed in version 31.0.1650.57-1~deb7u1. For the testing distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 31.0.1650.57-1. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2798-1 security@debian.org http://www.debian.org/security/ Michael Gilbert November 17, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : curl Vulnerability : unchecked ssl certificate host name Problem type : remote Debian-specific: no CVE ID : CVE-2013-4545 Scott Cantor discovered that curl, a file retrieval tool, would disable the CURLOPT_SSLVERIFYHOST check when the CURLOPT_SSL_VERIFYPEER setting was disabled. This would also disable ssl certificate host name checks when it should have only disabled verification of the certificate trust chain. The default configuration for the curl package is not affected by this issue since CURLOPT_SSLVERIFYPEER is enabled by default. For the oldstable distribution (squeeze), this problem has been fixed in version 7.21.0-2.1+squeeze5. For the stable distribution (wheezy), this problem has been fixed in version 7.26.0-1+wheezy5. For the testing (jessie) and unstable (sid) distributions, this problem has been fixed in version 7.33.0-1. Link to comment Share on other sites More sharing options...
sunrat Posted November 21, 2013 Share Posted November 21, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2798-2 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso November 20, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : curl Vulnerability : unchecked ssl certificate host name Problem type : remote Debian-specific: no CVE ID : CVE-2013-4545 The update for curl in DSA-2798-1 uncovered a regression affecting the curl command line tool behaviour (#729965). This update disables host verification too when using the --insecure option. For the oldstable distribution (squeeze), this problem has been fixed in version 7.21.0-2.1+squeeze6. For the stable distribution (wheezy), this problem has been fixed in version 7.26.0-1+wheezy6. For the testing (jessie) and unstable (sid) distributions, the curl command line tool behaves as expected with the --insecure option. Link to comment Share on other sites More sharing options...
sunrat Posted November 22, 2013 Share Posted November 22, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2801-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso November 21, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libhttp-body-perl Vulnerability : design error Problem type : local (remote) Debian-specific: no CVE ID : CVE-2013-4407 Debian Bug : 721634 Jonathan Dolle reported a design error in HTTP::Body, a Perl module for processing data from HTTP POST requests. The HTTP body multipart parser creates temporary files which preserve the suffix of the uploaded file. An attacker able to upload files to a service that uses HTTP::Body::Multipart could potentially execute commands on the server if these temporary filenames are used in subsequent commands without further checks. This update restricts the possible suffixes used for the created temporary files. The oldstable distribution (squeeze) is not affected by this problem. For the stable distribution (wheezy), this problem has been fixed in version 1.11-1+deb7u1. For the testing distribution (jessie), this problem has been fixed in version 1.17-2. For the unstable distribution (sid), this problem has been fixed in version 1.17-2. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2802-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst November 21, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : nginx Vulnerability : restriction bypass Problem type : remote Debian-specific: no CVE ID : CVE-2013-4547 Debian Bug : 730012 Ivan Fratric of the Google Security Team discovered a bug in nginx, a web server, which might allow an attacker to bypass security restrictions by using a specially crafted request. The oldstable distribution (squeeze) is not affected by this problem. For the stable distribution (wheezy), this problem has been fixed in version 1.2.1-2.2+wheezy2. For the unstable distribution (sid), this problem has been fixed in version 1.4.4-1. Link to comment Share on other sites More sharing options...
sunrat Posted November 26, 2013 Share Posted November 26, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2800-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso November 25, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : nss Vulnerability : buffer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2013-5605 Andrew Tinits reported a potentially exploitable buffer overflow in the Mozilla Network Security Service library (nss). With a specially crafted request a remote attacker could cause a denial of service or possibly execute arbitrary code. For the oldstable distribution (squeeze), this problem has been fixed in version 3.12.8-1+squeeze7. For the stable distribution (wheezy), this problem has been fixed in version 2:3.14.5-1. For the testing distribution (jessie), this problem has been fixed in version 2:3.15.3-1. For the unstable distribution (sid), this problem has been fixed in version 2:3.15.3-1. Link to comment Share on other sites More sharing options...
sunrat Posted November 27, 2013 Share Posted November 27, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2803-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff November 26, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : quagga Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-2236 CVE-2013-6051 Debian Bug : 730513 726724 Multiple vulnerabilities were discovered in Quagga, a BGP/OSPF/RIP routing daemon: CVE-2013-2236 A buffer overflow was found in the OSPF API-server (exporting the LSDB and allowing announcement of Opaque-LSAs). CVE-2013-6051 bgpd could be crashed through BGP updates. This only affects Wheezy/stable. For the oldstable distribution (squeeze), these problems have been fixed in version 0.99.20.1-0+squeeze5. For the stable distribution (wheezy), these problems have been fixed in version 0.99.22.4-1+wheezy1. For the unstable distribution (sid), these problems have been fixed in version 0.99.22.4-1. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2804-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff November 26, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : drupal7 Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-6385 CVE-2013-6386 CVE-2013-6387 CVE-2013-6388 CVE-2013-6389 Multiple vulnerabilities have been discovered in Drupal, a fully-featured content management framework: Cross-site request forgery, insecure pseudo random number generation, code execution, incorrect security token validation and cross-site scripting. In order to avoid the remote code execution vulnerability, it is recommended to create a .htaccess file (or an equivalent configuration directive in case you are not using Apache to serve your Drupal sites) in each of your sites'"files" directories (both public and private, in case you have both configured). Please refer to the NEWS file provided with this update and the upstream advisory at https://drupal.org/SA-CORE-2013-003 for further information. For the stable distribution (wheezy), these problems have been fixed in version 7.14-2+deb7u1. For the unstable distribution (sid), these problems have been fixed in version 7.24-1. Link to comment Share on other sites More sharing options...
sunrat Posted November 28, 2013 Share Posted November 28, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2805-1 security@debian.org http://www.debian.org/security/ Luciano Bello November 27, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : sup-mail Vulnerability : command injection Problem type : remote Debian-specific: no CVE ID : CVE-2013-4478 CVE-2013-4479 Debian Bug : 728232 joernchen of Phenoelit discovered two command injection flaws in Sup, a console-based email client. An attacker might execute arbitrary command if the user opens a maliciously crafted email. CVE-2013-4478 Sup wrongly handled the filename of attachments. CVE-2013-4479 Sup did not sanitize the content-type of attachments. For the oldstable distribution (squeeze), these problems have been fixed in version 0.11-2+nmu1+deb6u1. For the stable distribution (wheezy), these problems have been fixed in version 0.12.1+git20120407.aaa852f-1+deb7u1. Link to comment Share on other sites More sharing options...
sunrat Posted November 29, 2013 Share Posted November 29, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2806-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst November 29, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : nbd Vulnerability : privilege escalation Problem type : remote Debian-specific: no It was discovered that nbd-server, the server for the Network Block Device protocol, did incorrect parsing of the access control lists, allowing access to any hosts with an IP address sharing a prefix with an allowed address. For the oldstable distribution (squeeze), this problem has been fixed in version 1:2.9.16-8+squeeze1. For the stable distribution (wheezy), this problem has been fixed in version 1:3.2-4~deb7u4. For the unstable distribution (sid), this problem will be fixed soon. Link to comment Share on other sites More sharing options...
sunrat Posted December 1, 2013 Share Posted December 1, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2807-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff November 30, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : links2 Vulnerability : integer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2013-6050 Mikulas Patocka discovered an integer overflow in the parsing of HTML tables in the Links web browser. This can only be exploited when running Links in graphical mode. For the oldstable distribution (squeeze), this problem has been fixed in version 2.3~pre1-1+squeeze2. For the stable distribution (wheezy), this problem has been fixed in version 2.7-1+deb7u1. For the testing distribution (jessie), this problem has been fixed in version 2.8-1. For the unstable distribution (sid), this problem has been fixed in version 2.8-1. Link to comment Share on other sites More sharing options...
sunrat Posted December 3, 2013 Share Posted December 3, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2808-1 security@debian.org http://www.debian.org/security/ Raphael Geissert December 03, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : openjpeg Vulnerability : several Problem type : local (remote) Debian-specific: no CVE ID : CVE-2013-1447 CVE-2013-6045 CVE-2013-6052 CVE-2013-6054 Several vulnerabilities have been discovered in OpenJPEG, a JPEG 2000 image library, that may lead to denial of service (CVE-2013-1447) via application crash or high memory consumption, possible code execution through heap buffer overflows (CVE-2013-6045), information disclosure (CVE-2013-6052), or yet another heap buffer overflow that only appears to affect OpenJPEG 1.3 (CVE-2013-6054). For the oldstable distribution (squeeze), these problems have been fixed in version 1.3+dfsg-4+squeeze2. For the stable distribution (wheezy), these problems have been fixed in version 1.3+dfsg-4.7. For the testing distribution (jessie), and the unstable distribution (sid), these problems will be fixed soon. Link to comment Share on other sites More sharing options...
sunrat Posted December 5, 2013 Share Posted December 5, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2809-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso December 04, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ruby1.8 Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-1821 CVE-2013-4073 CVE-2013-4164 Debian Bug : 702526 714541 730189 Several vulnerabilities have been discovered in the interpreter for the Ruby language. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-1821 Ben Murphy discovered that unrestricted entity expansion in REXML can lead to a Denial of Service by consuming all host memory. CVE-2013-4073 William (B.J.) Snow Orvis discovered a vulnerability in the hostname checking in Ruby's SSL client that could allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate issued by a trusted certification authority. CVE-2013-4164 Charlie Somerville discovered that Ruby incorrectly handled floating point number conversion. If an application using Ruby accepted untrusted input strings and converted them to floating point numbers, an attacker able to provide such input could cause the application to crash or, possibly, execute arbitrary code with the privileges of the application. For the oldstable distribution (squeeze), these problems have been fixed in version 1.8.7.302-2squeeze2. For the stable distribution (wheezy), these problems have been fixed in version 1.8.7.358-7.1+deb7u1. For the unstable distribution (sid), these problems have been fixed in version 1.8.7.358-9. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2810-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso December 04, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ruby1.9.1 Vulnerability : heap overflow Problem type : remote Debian-specific: no CVE ID : CVE-2013-4164 Debian Bug : 730178 Charlie Somerville discovered that Ruby incorrectly handled floating point number conversion. If an application using Ruby accepted untrusted input strings and converted them to floating point numbers, an attacker able to provide such input could cause the application to crash or, possibly, execute arbitrary code with the privileges of the application. For the oldstable distribution (squeeze), this problem has been fixed in version 1.9.2.0-2+deb6u2. For the stable distribution (wheezy), this problem has been fixed in version 1.9.3.194-8.1+deb7u2. For the unstable distribution (sid), this problem has been fixed in version 1.9.3.484-1. Link to comment Share on other sites More sharing options...
sunrat Posted December 8, 2013 Share Posted December 8, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2811-1 security@debian.org http://www.debian.org/security/ Michael Gilbert December 07, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : chromium-browser Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-6634 CVE-2013-6635 CVE-2013-6636 CVE-2013-6637 CVE-2013-6638 CVE-2013-6639 CVE-2013-6640 Several vulnerabilities have been discovered in the chromium web browser. CVE-2013-6634 Andrey Labunets discovered that the wrong URL was used during validation in the one-click sign on helper. CVE-2013-6635 cloudfuzzer discovered use-after-free issues in the InsertHTML and Indent DOM editing commands. CVE-2013-6636 Bas Venis discovered an address bar spoofing issue. CVE-2013-6637 The chrome 31 development team discovered and fixed multiple issues with potential security impact. CVE-2013-6638 Jakob Kummerow of the Chromium project discoved a buffer overflow in the v8 javascript library. CVE-2013-6639 Jakob Kummerow of the Chromium project discoved an out-of-bounds write in the v8 javascript library. CVE-2013-6640 Jakob Kummerow of the Chromium project discoved an out-of-bounds read in the v8 javascript library. For the stable distribution (wheezy), these problems have been fixed in version 31.0.1650.63-1~deb7u1. For the testing distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 31.0.1650.63-1. Link to comment Share on other sites More sharing options...
sunrat Posted December 10, 2013 Share Posted December 10, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2812-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff December 09, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : samba Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-4408 CVE-2013-4475 Two security issues were found in Samba, a SMB/CIFS file, print, and login server: CVE-2013-4408 It was discovered that multiple buffer overflows in the processing of DCE-RPC packets may lead to the execution of arbitrary code. CVE-2013-4475 Hemanth Thummala discovered that ACLs were not checked when opening files with alternate data streams. This issue is only exploitable if the VFS modules vfs_streams_depot and/or vfs_streams_xattr are used. For the oldstable distribution (squeeze), these problems have been fixed in version 3.5.6~dfsg-3squeeze11. For the stable distribution (wheezy), these problems have been fixed in version 3.6.6-6+deb7u2. For the unstable distribution (sid), these problems will be fixed soon. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2813-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff December 09, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : gimp Vulnerability : several Problem type : local(remote) Debian-specific: no CVE ID : CVE-2013-1913 CVE-2013-1978 Murray McAllister discovered multiple integer and buffer overflows in the XWD plugin in Gimp, which can result in the execution of arbitrary code. For the oldstable distribution (squeeze), these problems have been fixed in version 2.6.10-1+squeeze4. This update also fixes CVE-2012-3403, CVE-2012-3481 and CVE-2012-5576. For the stable distribution (wheezy), these problems have been fixed in version 2.8.2-2+deb7u1. For the unstable distribution (sid), these problems will be fixed soon. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2814-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso December 09, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : varnish Vulnerability : denial of service Problem type : remote Debian-specific: no CVE ID : CVE-2013-4484 Debian Bug : 728989 A denial of service vulnerability was reported in varnish, a state of the art, high-performance web accelerator. With some configurations of varnish a remote attacker could mount a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI. For the oldstable distribution (squeeze), this problem has been fixed in version 2.1.3-8+deb6u1. For the stable distribution (wheezy), this problem has been fixed in version 3.0.2-2+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 3.0.5-1. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2815-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso December 09, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : munin Vulnerability : denial of service Problem type : remote Debian-specific: no CVE ID : CVE-2013-6048 CVE-2013-6359 Christoph Biedl discovered two denial of service vulnerabilities in munin, a network-wide graphing framework. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-6048 The Munin::Master::Node module of munin does not properly validate certain data a node sends. A malicious node might exploit this to drive the munin-html process into an infinite loop with memory exhaustion on the munin master. CVE-2013-6359 A malicious node, with a plugin enabled using "multigraph" as a multigraph service name, can abort data collection for the entire node the plugin runs on. For the stable distribution (wheezy), these problems have been fixed in version 2.0.6-4+deb7u2. For the testing distribution (jessie), these problems have been fixed in version 2.0.18-1. For the unstable distribution (sid), these problems have been fixed in version 2.0.18-1. Link to comment Share on other sites More sharing options...
sunrat Posted December 13, 2013 Share Posted December 13, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2816-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst December 12, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : php5 Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-6420 CVE-2013-6712 Debian Bug : 731112 731895 Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2013-6420 Stefan Esser reported possible memory corruption in openssl_x509_parse(). CVE-2013-6712 Creating DateInterval objects from parsed ISO dates was not properly restricted, which allowed to cause a denial of service. In addition, the update for Debian 7 "Wheezy" contains several bugfixes originally targeted for the upcoming Wheezy point release. For the oldstable distribution (squeeze), these problems have been fixed in version 5.3.3-7+squeeze18. For the stable distribution (wheezy), these problems have been fixed in version 5.4.4-14+deb7u7. For the unstable distribution (sid), these problems have been fixed in version 5.5.6+dfsg-2. Link to comment Share on other sites More sharing options...
sunrat Posted December 15, 2013 Share Posted December 15, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2817-1 security@debian.org http://www.debian.org/security/ Luciano Bello December 14, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libtar Vulnerability : Integer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2013-4397 Debian Bug : 725938 Timo Warns reported multiple integer overflow vulnerabilities in libtar, a library for manipulating tar archives, which can result in the execution of arbitrary code. For the oldstable distribution (squeeze), this problem has been fixed in version 1.2.11-6+deb6u1. For the stable distribution (wheezy), this problem has been fixed in version 1.2.16-1+deb7u1. For the testing distribution (jessie), this problem has been fixed in version 1.2.20-1. For the unstable distribution (sid), this problem has been fixed in version 1.2.20-1. Link to comment Share on other sites More sharing options...
sunrat Posted December 16, 2013 Share Posted December 16, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2818-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso December 16, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : mysql-5.5 Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-1861 CVE-2013-2162 CVE-2013-3783 CVE-2013-3793 CVE-2013-3802 CVE-2013-3804 CVE-2013-3809 CVE-2013-3812 CVE-2013-3839 CVE-2013-5807 Debian Bug : 711600 732306 Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.5.33, which includes additional changes, such as performance improvements, bug fixes, new features, and possibly incompatible changes. Please see the MySQL 5.5 Release Notes for further details: http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-32.html http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-33.html In addition this update fixes two issues affecting specifically the mysql-5.5 Debian package: A race condition in the post-installation script of the mysql-server-5.5 package creates the configuration file "/etc/mysql/debian.cnf" with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as credentials for the debian-sys-maint to perform administration tasks. (CVE-2013-2162) Matthias Reichl reported that the mysql-5.5 package misses the patches applied previous in Debian's mysql-5.1 to drop the database "test" and the permissions that allow anonymous access, without a password, from localhost to the "test" database and any databases starting with "test_". This update reintroduces these patches for the mysql-5.5 package. Existing databases and permissions are not touched. Please refer to the NEWS file provided with this update for further information. For the stable distribution (wheezy), these problems have been fixed in version 5.5.33+dfsg-0+wheezy1. For the unstable distribution (sid), the Debian specific problems will be fixed soon. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2819-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff December 16, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : iceape Security support for Iceape, the Debian-branded version of the Seamonkey suite needed to be stopped before the end of the regular security maintenance life cycle. We recommend to migrate to Iceweasel for the web browser functionality and to Icedove for the e-mail bits. Iceweasel and Icedove are based on the same codebase and will continue to be supported with security updates. Alternatively you can switch to the binaries provided by Mozilla available at http://www.seamonkey-project.org/releases/ Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Link to comment Share on other sites More sharing options...
sunrat Posted December 17, 2013 Share Posted December 17, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2820-1 security@debian.org http://www.debian.org/security/ Raphael Geissert December 17, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : nspr Vulnerability : integer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2013-5607 It was discovered that NSPR, Netscape Portable Runtime library, could crash an application using the library when parsing a certificate that causes an integer overflow. This flaw only affects 64-bit systems. For the oldstable distribution (squeeze), this problem has been fixed in version 4.8.6-1+squeeze1. For the stable distribution (wheezy), this problem has been fixed in version 2:4.9.2-1+deb7u1. For the testing distribution (jessie), and the unstable distribution (sid), this problem has been fixed in version 2:4.10.2-1. Link to comment Share on other sites More sharing options...
sunrat Posted December 18, 2013 Share Posted December 18, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2821-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst December 18, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : gnupg Vulnerability : side channel attack Problem type : remote Debian-specific: no CVE ID : CVE-2013-4576 Genkin, Shamir and Tromer discovered that RSA key material could be extracted by using the sound generated by the computer during the decryption of some chosen ciphertexts. For the oldstable distribution (squeeze), this problem has been fixed in version 1.4.10-4+squeeze4. For the stable distribution (wheezy), this problem has been fixed in version 1.4.12-7+deb7u3. For the unstable distribution (sid), this problem has been fixed in version 1.4.15-2. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2822-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff December 18, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : xorg-server Vulnerability : integer underflow Problem type : remote Debian-specific: no CVE ID : CVE-2013-6424 Bryan Quigley discovered an integer underflow in the Xorg X server which could lead to denial of service or the execution of arbitrary code. For the oldstable distribution (squeeze), this problem has been fixed in version 1.7.7-18. For the stable distribution (wheezy), this problem has been fixed in version 1.12.4-6+deb7u2. For the unstable distribution (sid), this problem will be fixed soon. - ------------------------------------------------------------------------- Debian Security Advisory DSA-2823-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff December 18, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : pixman Vulnerability : integer underflow Problem type : remote Debian-specific: no CVE ID : CVE-2013-6425 Bryan Quigley discovered an integer underflow in Pixman which could lead to denial of service or the execution of arbitrary code. For the oldstable distribution (squeeze), this problem has been fixed in version 0.16.4-1+deb6u1. For the stable distribution (wheezy), this problem has been fixed in version 0.26.0-4+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 0.30.2-2. Link to comment Share on other sites More sharing options...
sunrat Posted December 20, 2013 Share Posted December 20, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2824-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso December 19, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : curl Vulnerability : unchecked tls/ssl certificate host name Problem type : remote Debian-specific: no CVE ID : CVE-2013-6422 Marc Deslauriers discovered that curl, a file retrieval tool, would mistakenly skip verifying the CN and SAN name fields when digital signature verification was disabled in the libcurl GnuTLS backend. The default configuration for the curl package is not affected by this issue since the digital signature verification is enabled by default. The oldstable distribution (squeeze) is not affected by this problem. For the stable distribution (wheezy), this problem has been fixed in version 7.26.0-1+wheezy7. For the unstable distribution (sid), this problem has been fixed in version 7.34.0-1. Link to comment Share on other sites More sharing options...
sunrat Posted December 22, 2013 Share Posted December 22, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2825-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff December 20, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wireshark Vulnerability : several Problem type : local(remote) Debian-specific: no CVE ID : CVE-2013-7113 CVE-2013-7114 Laurent Butti and Garming Sam discored multiple vulnerabilities in the dissectors for NTLMSSPv2 and BSSGP, which could lead to denial of service or the execution of arbitrary code. For the stable distribution (wheezy), these problems have been fixed in version 1.8.2-5wheezy9. For the unstable distribution (sid), these problems have been fixed in version 1.10.4-1. Link to comment Share on other sites More sharing options...
sunrat Posted December 23, 2013 Share Posted December 23, 2013 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2826-1 security@debian.org http://www.debian.org/security/ Yves-Alexis Perez December 22, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : denyhosts Vulnerability : Remote denial of ssh service Problem type : remote Debian-specific: no CVE ID : CVE-2013-6890 Helmut Grohne discovered that denyhosts, a tool preventing SSH brute-force attacks, could be used to perform remote denial of service against the SSH daemon. Incorrectly specified regular expressions used to detect brute force attacks in authentication logs could be exploited by a malicious user to forge crafted login names in order to make denyhosts ban arbitrary IP addresses. For the oldstable distribution (squeeze), this problem has been fixed in version 2.6-7+deb6u2. For the stable distribution (wheezy), this problem has been fixed in version 2.6-10+deb7u2. For the testing distribution (jessie), this problem has been fixed in version 2.6-10.1. For the unstable distribution (sid), this problem has been fixed in version 2.6-10.1. Link to comment Share on other sites More sharing options...
Recommended Posts