Jump to content

Recommended Posts

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2787-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

October 27, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : roundcube

Vulnerability : design error

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6172

Debian Bug : 727668

 

It was discovered that roundcube, a skinnable AJAX based webmail

solution for IMAP servers, does not properly sanitize the _session

parameter in steps/utils/save_pref.inc during saving preferences. The

vulnerability can be exploited to overwrite configuration settings and

subsequently allowing random file access, manipulated SQL queries and

even code execution.

 

roundcube in the oldstable distribution (squeeze) is not affected by

this problem.

 

For the stable distribution (wheezy), this problem has been fixed in

version 0.7.2-9+deb7u1.

 

For the unstable distribution (sid), this problem will be fixed soon.

Link to post
Share on other sites
  • Replies 1.9k
  • Created
  • Last Reply

Top Posters In This Topic

  • sunrat

    1557

  • V.T. Eric Layton

    171

  • securitybreach

    112

  • Bruno

    65

Top Posters In This Topic

Popular Posts

- ------------------------------------------------------------------------- Debian Security Advisory DSA-3093-1 security@debian.org http://www.debian.org/security/

- ------------------------------------------------------------------------- Debian Security Advisory DSA-3401-1 security@debian.org https://www.debian.org/security/

- ------------------------------------------------------------------------- Debian Security Advisory DSA-4123-1 security@debian.org https://www.debian.org/security/

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2786-1 security@debian.org

http://www.debian.org/security/ Michael Gilbert

October 27, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : icu

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-0900 CVE-2013-2924

Debian Bug : 702346 726477

 

The Google Chrome Security Team discovered two issues (a race condition

and a use-after-free issue) in the International Components for Unicode

(ICU) library.

 

For the oldstable distribution (squeeze), these problems have been fixed

in version 4.4.1-8+squeeze2.

 

For the stable distribution (wheezy), which is only affected by

CVE-2013-2924, this problem has been fixed in version 4.8.1.1-12+deb7u1.

 

For the testing distribution (jessie), which is only affected by

CVE-2013-2924, this problem will be fixed soon.

 

For the unstable distribution (sid), which is only affected by

CVE-2013-2924, this problem has been fixed in version 4.8.1.1-13+nmu1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2788-1 security@debian.org

http://www.debian.org/security/ Raphael Geissert

October 31, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : iceweasel

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-5590 CVE-2013-5595 CVE-2013-5597 CVE-2013-5599

CVE-2013-5600 CVE-2013-5601 CVE-2013-5602 CVE-2013-5604

 

Multiple security issues have been found in iceweasel, Debian's version

of the Mozilla Firefox web browser: multiple memory safety errors, and

other implementation errors may lead to the execution of arbitrary

code.

 

The iceweasel version in the oldstable distribution (squeeze) is no

longer supported with security updates.

 

For the stable distribution (wheezy), these problems have been fixed in

version 17.0.10esr-1~deb7u1.

 

For the unstable distribution (sid), these problems will fixed soon.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2789-1 security@debian.org

http://www.debian.org/security/ Yves-Alexis Perez

November 01, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : strongswan

Vulnerability : Denial of service and authorization bypass

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6075

 

A vulnerability has been found in the ASN.1 parser of strongSwan, an IKE

daemon used to establish IPsec protected links.

 

By sending a crafted ID_DER_ASN1_DN ID payload to a vulnerable pluto or

charon daemon, a malicious remote user can provoke a denial of service

(daemon crash) or an authorization bypass (impersonating a different

user, potentially acquiring VPN permissions she doesn't have).

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 4.4.1-5.4.

 

For the stable distribution (wheezy), this problem has been fixed in

version 4.5.2-1.5+deb7u2.

 

For the testing distribution (jessie), this problem has been fixed in

version 5.1.0-3.

 

For the unstable distribution (sid), this problem has been fixed in

version 5.1.0-3.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2791-1 security@debian.org

http://www.debian.org/security/ Florian Weimer

November 04, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : tryton-client

Vulnerability : missing input sanitization

Problem type : remote

Debian-specific: no

 

Cedric Krier discovered that the Tryton client does not sanitize the

file extension supplied by the server when processing reports. As a

result, a malicious server could send a report with a crafted file

extension that causes the client to write any local file to which the

user running the client has write access.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 1.6.1-1+deb6u1.

 

For the stable distribution (wheezy), this problem has been fixed in

version 2.2.3-1+deb7u1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2792-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

November 04, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : wireshark

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6336 CVE-2013-6337 CVE-2013-6338 CVE-2013-6340

 

Multiple vulnerabilities were discovered in the dissectors for IEEE

802.15.4, NBAP, SIP and TCP, which could result in denial of service.

 

The oldstable distribution (squeeze) is only affected by CVE-2013-6340.

This problem has been fixed in version 1.2.11-6+squeeze13.

 

For the stable distribution (wheezy), these problems have been fixed in

version 1.8.2-5wheezy7.

 

For the unstable distribution (sid), these problems have been fixed in

version 1.10.3-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2793-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

November 09, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : libav

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-0844 CVE-2013-0850 CVE-2013-0853 CVE-2013-0854

CVE-2013-0857 CVE-2013-0858 CVE-2013-0866

 

Several security issues have been corrected in multiple demuxers and

decoders of the libav multimedia library. The CVE IDs mentioned above are

just a small portion of the security issues fixed in this update. A full

list of the changes is available at

http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.9

 

For the stable distribution (wheezy), these problems have been fixed in

version 0.8.9-1.

 

For the unstable distribution (sid), these problems have been fixed in

version 9.10-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2794-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

November 10, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : spip

Vulnerability : several

Problem type : remote

Debian-specific: no

Debian Bug : 729172

 

Several vulnerabilities have been found in SPIP, a website engine for

publishing, resulting in cross-site request forgery on logout,

cross-site scripting on author page, and PHP injection.

 

For the oldstable distribution (squeeze), these problems have been fixed

in version 2.1.1-3squeeze7.

 

For the stable distribution (wheezy), these problems have been fixed in

version 2.1.17-1+deb7u2.

 

For the testing distribution (jessie), these problems will be fixed

soon.

 

For the unstable distribution (sid), these problems have been fixed in

version 2.1.24-1.

 

For the experimental distribution, these problems have been fixed in

version 3.0.12-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2795-1 security@debian.org

http://www.debian.org/security/ Michael Gilbert

November 13, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : lighttpd

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4508 CVE-2013-4559 CVE-2013-4560

Debian Bug : 729453

 

Several vulnerabilities have been discovered in the lighttpd web server.

 

CVE-2013-4508

 

It was discovered that lighttpd uses weak ssl ciphers when SNI (Server

Name Indication) is enabled. This issue was solved by ensuring that

stronger ssl ciphers are used when SNI is selected.

 

CVE-2013-4559

 

The clang static analyzer was used to discover privilege escalation

issues due to missing checks around lighttpd's setuid, setgid, and

setgroups calls. Those are now appropriately checked.

 

CVE-2013-4560

 

The clang static analyzer was used to discover a use-after-free issue

when the FAM stat cache engine is enabled, which is now fixed.

 

For the oldstable distribution (squeeze), these problems have been fixed in

version 1.4.28-2+squeeze1.4.

 

For the stable distribution (wheezy), these problems have been fixed in

version 1.4.31-4+deb7u1.

 

For the testing distribution (jessie), these problems will be fixed soon.

 

For the unstable distribution (sid), these problems have been fixed in

version lighttpd_1.4.33-1+nmu1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2796-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

November 13, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : torque

Vulnerability : arbitrary code execution

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4495

Debian Bug : 729333

 

Matt Ezell from Oak Ridge National Labs reported a vulnerability in

torque, a PBS-derived batch processing queueing system.

 

A user could submit executable shell commands on the tail of what is

passed with the -M switch for qsub. This was later passed to a pipe,

making it possible for these commands to be executed as root on the

pbs_server.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 2.4.8+dfsg-9squeeze3.

 

For the stable distribution (wheezy), this problem has been fixed in

version 2.4.16+dfsg-1+deb7u2.

 

For the unstable distribution (sid), this problem has been fixed in

version 2.4.16+dfsg-1.3.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2797-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

November 13, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : icedove

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-5590 CVE-2013-5595 CVE-2013-5597 CVE-2013-5599

CVE-2013-5600 CVE-2013-5601 CVE-2013-5602 CVE-2013-5604

 

Multiple security issues have been found in Icedove, Debian's version of

the Mozilla Thunderbird mail and news client. Multiple memory safety

errors, and other implementation errors may lead to the execution of

arbitrary code.

 

The Icedove version in the oldstable distribution (squeeze) is no longer

supported with full security updates. However, it should be noted that

almost all security issues in Icedove stem from the included browser engine.

These security problems only affect Icedove if scripting and HTML mails

are enabled. If there are security issues specific to Icedove (e.g. a

hypothetical buffer overflow in the IMAP implementation) we'll make an

effort to backport such fixes to oldstable.

 

For the stable distribution (wheezy), these problems have been fixed in

version 17.0.10-1~deb7u1.

 

For the unstable distribution (sid), these problems have been fixed in

version 17.0.10-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2795-2 security@debian.org

http://www.debian.org/security/ Michael Gilbert

November 16, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : lighttpd

Vulnerability : regression

Problem type : remote

Debian-specific: no

Debian Bug : 729480

 

It was discovered discovered that SSL connections with client certificates

stopped working after the DSA-2795-1 update of lighttpd. An upstream

patch has now been applied that provides an appropriate identifier for

client certificate verification.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 1.4.28-2+squeeze1.5.

 

For the stable distribution (wheezy), this problem has been fixed in

version 1.4.31-4+deb7u2.

 

For the testing (jessie) and unstable (sid) distributions, this problem

will be fixed soon.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2797-1 security@debian.org

http://www.debian.org/security/ Michael Gilbert

November 16, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : chromium-browser

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-2931 CVE-2013-6621 CVE-2013-6622 CVE-2013-6623

CVE-2013-6624 CVE-2013-6625 CVE-2013-6626 CVE-2013-6627

CVE-2013-6628 CVE-2013-6629 CVE-2013-6630 CVE-2013-6631

CVE-2013-6632

 

Several vulnerabilities have been discovered in the chromium web browser.

 

CVE-2013-2931

 

The chrome 31 development team found various issues from internal

fuzzing, audits, and other studies.

 

CVE-2013-6621

 

Khalil Zhani discovered a use-after-free issue in speech input

handling.

 

CVE-2013-6622

 

cloudfuzzer discovered a use-after-free issue in HTMLMediaElement.

 

CVE-2013-6623

 

miaubiz discovered an out-of-bounds read in the Blink/Webkit SVG

implementation.

 

CVE-2013-6624

 

Jon Butler discovered a use-after-free issue in id attribute strings.

 

CVE-2013-6625

 

cloudfuzzer discovered a use-after-free issue in the Blink/Webkit

DOM implementation.

 

CVE-2013-6626

 

Chamal de Silva discovered an address bar spoofing issue.

 

CVE-2013-6627

 

skylined discovered an out-of-bounds read in the HTTP stream parser.

 

CVE-2013-6628

 

Antoine Delignat-Lavaud and Karthikeyan Bhargavan of INRIA Paris

discovered that a different (unverified) certificate could be used

after successful TLS renegotiation with a valid certificate.

 

CVE-2013-6629

 

Michal Zalewski discovered an uninitialized memory read in the

libjpeg and libjpeg-turbo libraries.

 

CVE-2013-6630

 

Michal Zalewski discovered another uninitialized memory read in

the libjpeg and libjpeg-turbo libraries.

 

CVE-2013-6631

 

Patrik Höglund discovered a use-free issue in the libjingle library.

 

CVE-2013-6632

 

Pinkie Pie discovered multiple memory corruption issues.

 

For the stable distribution (wheezy), these problems have been fixed in

version 31.0.1650.57-1~deb7u1.

 

For the testing distribution (jessie), these problems will be fixed soon.

 

For the unstable distribution (sid), these problems have been fixed in

version 31.0.1650.57-1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2798-1 security@debian.org

http://www.debian.org/security/ Michael Gilbert

November 17, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : curl

Vulnerability : unchecked ssl certificate host name

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4545

 

Scott Cantor discovered that curl, a file retrieval tool, would disable

the CURLOPT_SSLVERIFYHOST check when the CURLOPT_SSL_VERIFYPEER setting

was disabled. This would also disable ssl certificate host name checks

when it should have only disabled verification of the certificate trust

chain.

 

The default configuration for the curl package is not affected by this

issue since CURLOPT_SSLVERIFYPEER is enabled by default.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 7.21.0-2.1+squeeze5.

 

For the stable distribution (wheezy), this problem has been fixed in

version 7.26.0-1+wheezy5.

 

For the testing (jessie) and unstable (sid) distributions, this problem

has been fixed in version 7.33.0-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2798-2 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

November 20, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : curl

Vulnerability : unchecked ssl certificate host name

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4545

 

The update for curl in DSA-2798-1 uncovered a regression affecting the

curl command line tool behaviour (#729965). This update disables host

verification too when using the --insecure option.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 7.21.0-2.1+squeeze6.

 

For the stable distribution (wheezy), this problem has been fixed in

version 7.26.0-1+wheezy6.

 

For the testing (jessie) and unstable (sid) distributions, the curl

command line tool behaves as expected with the --insecure option.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2801-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

November 21, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : libhttp-body-perl

Vulnerability : design error

Problem type : local (remote)

Debian-specific: no

CVE ID : CVE-2013-4407

Debian Bug : 721634

 

Jonathan Dolle reported a design error in HTTP::Body, a Perl module for

processing data from HTTP POST requests. The HTTP body multipart parser

creates temporary files which preserve the suffix of the uploaded file.

An attacker able to upload files to a service that uses

HTTP::Body::Multipart could potentially execute commands on the server

if these temporary filenames are used in subsequent commands without

further checks.

 

This update restricts the possible suffixes used for the created

temporary files.

 

The oldstable distribution (squeeze) is not affected by this problem.

 

For the stable distribution (wheezy), this problem has been fixed in

version 1.11-1+deb7u1.

 

For the testing distribution (jessie), this problem has been fixed in

version 1.17-2.

 

For the unstable distribution (sid), this problem has been fixed in

version 1.17-2.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2802-1 security@debian.org

http://www.debian.org/security/ Thijs Kinkhorst

November 21, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : nginx

Vulnerability : restriction bypass

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4547

Debian Bug : 730012

 

Ivan Fratric of the Google Security Team discovered a bug in nginx,

a web server, which might allow an attacker to bypass security

restrictions by using a specially crafted request.

 

The oldstable distribution (squeeze) is not affected by this problem.

 

For the stable distribution (wheezy), this problem has been fixed in

version 1.2.1-2.2+wheezy2.

 

For the unstable distribution (sid), this problem has been fixed in

version 1.4.4-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2800-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

November 25, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : nss

Vulnerability : buffer overflow

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-5605

 

Andrew Tinits reported a potentially exploitable buffer overflow in the

Mozilla Network Security Service library (nss). With a specially crafted

request a remote attacker could cause a denial of service or possibly

execute arbitrary code.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 3.12.8-1+squeeze7.

 

For the stable distribution (wheezy), this problem has been fixed in

version 2:3.14.5-1.

 

For the testing distribution (jessie), this problem has been fixed in

version 2:3.15.3-1.

 

For the unstable distribution (sid), this problem has been fixed in

version 2:3.15.3-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2803-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

November 26, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : quagga

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-2236 CVE-2013-6051

Debian Bug : 730513 726724

 

Multiple vulnerabilities were discovered in Quagga, a BGP/OSPF/RIP

routing daemon:

 

CVE-2013-2236

 

A buffer overflow was found in the OSPF API-server (exporting the LSDB

and allowing announcement of Opaque-LSAs).

 

CVE-2013-6051

 

bgpd could be crashed through BGP updates. This only affects Wheezy/stable.

 

For the oldstable distribution (squeeze), these problems have been fixed in

version 0.99.20.1-0+squeeze5.

 

For the stable distribution (wheezy), these problems have been fixed in

version 0.99.22.4-1+wheezy1.

 

For the unstable distribution (sid), these problems have been fixed in

version 0.99.22.4-1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2804-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

November 26, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : drupal7

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6385 CVE-2013-6386 CVE-2013-6387 CVE-2013-6388

CVE-2013-6389

 

Multiple vulnerabilities have been discovered in Drupal, a fully-featured

content management framework: Cross-site request forgery, insecure

pseudo random number generation, code execution, incorrect security token

validation and cross-site scripting.

 

In order to avoid the remote code execution vulnerability, it is

recommended to create a .htaccess file (or an equivalent configuration

directive in case you are not using Apache to serve your Drupal sites)

in each of your sites'"files" directories (both public and private, in

case you have both configured).

 

Please refer to the NEWS file provided with this update and the upstream

advisory at https://drupal.org/SA-CORE-2013-003 for further information.

 

For the stable distribution (wheezy), these problems have been fixed in

version 7.14-2+deb7u1.

 

For the unstable distribution (sid), these problems have been fixed in

version 7.24-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2805-1 security@debian.org

http://www.debian.org/security/ Luciano Bello

November 27, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : sup-mail

Vulnerability : command injection

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4478 CVE-2013-4479

Debian Bug : 728232

 

joernchen of Phenoelit discovered two command injection flaws in Sup, a

console-based email client. An attacker might execute arbitrary command

if the user opens a maliciously crafted email.

 

CVE-2013-4478

 

Sup wrongly handled the filename of attachments.

 

CVE-2013-4479

 

Sup did not sanitize the content-type of attachments.

 

For the oldstable distribution (squeeze), these problems have been fixed in

version 0.11-2+nmu1+deb6u1.

 

For the stable distribution (wheezy), these problems have been fixed in

version 0.12.1+git20120407.aaa852f-1+deb7u1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2806-1 security@debian.org

http://www.debian.org/security/ Thijs Kinkhorst

November 29, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : nbd

Vulnerability : privilege escalation

Problem type : remote

Debian-specific: no

 

It was discovered that nbd-server, the server for the Network Block

Device protocol, did incorrect parsing of the access control lists,

allowing access to any hosts with an IP address sharing a prefix with

an allowed address.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 1:2.9.16-8+squeeze1.

 

For the stable distribution (wheezy), this problem has been fixed in

version 1:3.2-4~deb7u4.

 

For the unstable distribution (sid), this problem will be fixed soon.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2807-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

November 30, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : links2

Vulnerability : integer overflow

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6050

 

Mikulas Patocka discovered an integer overflow in the parsing of HTML

tables in the Links web browser. This can only be exploited when running

Links in graphical mode.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 2.3~pre1-1+squeeze2.

 

For the stable distribution (wheezy), this problem has been fixed in

version 2.7-1+deb7u1.

 

For the testing distribution (jessie), this problem has been fixed in

version 2.8-1.

 

For the unstable distribution (sid), this problem has been fixed in

version 2.8-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2808-1 security@debian.org

http://www.debian.org/security/ Raphael Geissert

December 03, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : openjpeg

Vulnerability : several

Problem type : local (remote)

Debian-specific: no

CVE ID : CVE-2013-1447 CVE-2013-6045 CVE-2013-6052 CVE-2013-6054

 

Several vulnerabilities have been discovered in OpenJPEG, a JPEG 2000

image library, that may lead to denial of service (CVE-2013-1447) via

application crash or high memory consumption, possible code execution

through heap buffer overflows (CVE-2013-6045), information disclosure

(CVE-2013-6052), or yet another heap buffer overflow that only appears

to affect OpenJPEG 1.3 (CVE-2013-6054).

 

For the oldstable distribution (squeeze), these problems have been fixed in

version 1.3+dfsg-4+squeeze2.

 

For the stable distribution (wheezy), these problems have been fixed in

version 1.3+dfsg-4.7.

 

For the testing distribution (jessie), and the unstable distribution (sid),

these problems will be fixed soon.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2809-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

December 04, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : ruby1.8

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-1821 CVE-2013-4073 CVE-2013-4164

Debian Bug : 702526 714541 730189

 

Several vulnerabilities have been discovered in the interpreter for the

Ruby language. The Common Vulnerabilities and Exposures project

identifies the following problems:

 

CVE-2013-1821

 

Ben Murphy discovered that unrestricted entity expansion in REXML

can lead to a Denial of Service by consuming all host memory.

 

CVE-2013-4073

 

William (B.J.) Snow Orvis discovered a vulnerability in the hostname

checking in Ruby's SSL client that could allow man-in-the-middle

attackers to spoof SSL servers via a crafted certificate issued by a

trusted certification authority.

 

CVE-2013-4164

 

Charlie Somerville discovered that Ruby incorrectly handled floating

point number conversion. If an application using Ruby accepted

untrusted input strings and converted them to floating point

numbers, an attacker able to provide such input could cause the

application to crash or, possibly, execute arbitrary code with the

privileges of the application.

 

For the oldstable distribution (squeeze), these problems have been fixed in

version 1.8.7.302-2squeeze2.

 

For the stable distribution (wheezy), these problems have been fixed in

version 1.8.7.358-7.1+deb7u1.

 

For the unstable distribution (sid), these problems have been fixed in

version 1.8.7.358-9.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2810-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

December 04, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : ruby1.9.1

Vulnerability : heap overflow

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4164

Debian Bug : 730178

 

Charlie Somerville discovered that Ruby incorrectly handled floating

point number conversion. If an application using Ruby accepted untrusted

input strings and converted them to floating point numbers, an attacker

able to provide such input could cause the application to crash or,

possibly, execute arbitrary code with the privileges of the application.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 1.9.2.0-2+deb6u2.

 

For the stable distribution (wheezy), this problem has been fixed in

version 1.9.3.194-8.1+deb7u2.

 

For the unstable distribution (sid), this problem has been fixed in

version 1.9.3.484-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2811-1 security@debian.org

http://www.debian.org/security/ Michael Gilbert

December 07, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : chromium-browser

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6634 CVE-2013-6635 CVE-2013-6636 CVE-2013-6637

CVE-2013-6638 CVE-2013-6639 CVE-2013-6640

 

Several vulnerabilities have been discovered in the chromium web browser.

 

CVE-2013-6634

 

Andrey Labunets discovered that the wrong URL was used during

validation in the one-click sign on helper.

 

CVE-2013-6635

 

cloudfuzzer discovered use-after-free issues in the InsertHTML and

Indent DOM editing commands.

 

CVE-2013-6636

 

Bas Venis discovered an address bar spoofing issue.

 

CVE-2013-6637

 

The chrome 31 development team discovered and fixed multiple issues

with potential security impact.

 

CVE-2013-6638

 

Jakob Kummerow of the Chromium project discoved a buffer overflow in

the v8 javascript library.

 

CVE-2013-6639

 

Jakob Kummerow of the Chromium project discoved an out-of-bounds

write in the v8 javascript library.

 

CVE-2013-6640

 

Jakob Kummerow of the Chromium project discoved an out-of-bounds

read in the v8 javascript library.

 

For the stable distribution (wheezy), these problems have been fixed in

version 31.0.1650.63-1~deb7u1.

 

For the testing distribution (jessie), these problems will be fixed soon.

 

For the unstable distribution (sid), these problems have been fixed in

version 31.0.1650.63-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2812-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

December 09, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : samba

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4408 CVE-2013-4475

 

Two security issues were found in Samba, a SMB/CIFS file, print, and

login server:

 

CVE-2013-4408

 

It was discovered that multiple buffer overflows in the processing

of DCE-RPC packets may lead to the execution of arbitrary code.

 

CVE-2013-4475

 

Hemanth Thummala discovered that ACLs were not checked when opening

files with alternate data streams. This issue is only exploitable

if the VFS modules vfs_streams_depot and/or vfs_streams_xattr are

used.

 

For the oldstable distribution (squeeze), these problems have been fixed in

version 3.5.6~dfsg-3squeeze11.

 

For the stable distribution (wheezy), these problems have been fixed in

version 3.6.6-6+deb7u2.

 

For the unstable distribution (sid), these problems will be fixed soon.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2813-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

December 09, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : gimp

Vulnerability : several

Problem type : local(remote)

Debian-specific: no

CVE ID : CVE-2013-1913 CVE-2013-1978

 

Murray McAllister discovered multiple integer and buffer overflows in the

XWD plugin in Gimp, which can result in the execution of arbitrary code.

 

For the oldstable distribution (squeeze), these problems have been fixed

in version 2.6.10-1+squeeze4. This update also fixes CVE-2012-3403,

CVE-2012-3481 and CVE-2012-5576.

 

For the stable distribution (wheezy), these problems have been fixed in

version 2.8.2-2+deb7u1.

 

For the unstable distribution (sid), these problems will be fixed soon.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2814-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

December 09, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : varnish

Vulnerability : denial of service

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4484

Debian Bug : 728989

 

A denial of service vulnerability was reported in varnish, a state of

the art, high-performance web accelerator. With some configurations of

varnish a remote attacker could mount a denial of service (child-process

crash and temporary caching outage) via a GET request with trailing

whitespace characters and no URI.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 2.1.3-8+deb6u1.

 

For the stable distribution (wheezy), this problem has been fixed in

version 3.0.2-2+deb7u1.

 

For the unstable distribution (sid), this problem has been fixed in

version 3.0.5-1.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2815-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

December 09, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : munin

Vulnerability : denial of service

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6048 CVE-2013-6359

 

Christoph Biedl discovered two denial of service vulnerabilities in

munin, a network-wide graphing framework. The Common Vulnerabilities and

Exposures project identifies the following problems:

 

CVE-2013-6048

 

The Munin::Master::Node module of munin does not properly validate

certain data a node sends. A malicious node might exploit this to

drive the munin-html process into an infinite loop with memory

exhaustion on the munin master.

 

CVE-2013-6359

 

A malicious node, with a plugin enabled using "multigraph" as a

multigraph service name, can abort data collection for the entire

node the plugin runs on.

 

For the stable distribution (wheezy), these problems have been fixed in

version 2.0.6-4+deb7u2.

 

For the testing distribution (jessie), these problems have been fixed in

version 2.0.18-1.

 

For the unstable distribution (sid), these problems have been fixed in

version 2.0.18-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2816-1 security@debian.org

http://www.debian.org/security/ Thijs Kinkhorst

December 12, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : php5

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6420 CVE-2013-6712

Debian Bug : 731112 731895

 

Several vulnerabilities were found in PHP, a general-purpose scripting

language commonly used for web application development. The Common

Vulnerabilities and Exposures project identifies the following issues:

 

CVE-2013-6420

 

Stefan Esser reported possible memory corruption in

openssl_x509_parse().

 

CVE-2013-6712

 

Creating DateInterval objects from parsed ISO dates was

not properly restricted, which allowed to cause a

denial of service.

 

In addition, the update for Debian 7 "Wheezy" contains several bugfixes

originally targeted for the upcoming Wheezy point release.

 

For the oldstable distribution (squeeze), these problems have been fixed in

version 5.3.3-7+squeeze18.

 

For the stable distribution (wheezy), these problems have been fixed in

version 5.4.4-14+deb7u7.

 

For the unstable distribution (sid), these problems have been fixed in

version 5.5.6+dfsg-2.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2817-1 security@debian.org

http://www.debian.org/security/ Luciano Bello

December 14, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : libtar

Vulnerability : Integer overflow

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4397

Debian Bug : 725938

 

Timo Warns reported multiple integer overflow vulnerabilities in libtar,

a library for manipulating tar archives, which can result in the

execution of arbitrary code.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 1.2.11-6+deb6u1.

 

For the stable distribution (wheezy), this problem has been fixed in

version 1.2.16-1+deb7u1.

 

For the testing distribution (jessie), this problem has been fixed in

version 1.2.20-1.

 

For the unstable distribution (sid), this problem has been fixed in

version 1.2.20-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2818-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

December 16, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : mysql-5.5

Vulnerability : several

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-1861 CVE-2013-2162 CVE-2013-3783 CVE-2013-3793

CVE-2013-3802 CVE-2013-3804 CVE-2013-3809 CVE-2013-3812

CVE-2013-3839 CVE-2013-5807

Debian Bug : 711600 732306

 

Several issues have been discovered in the MySQL database server. The

vulnerabilities are addressed by upgrading MySQL to a new upstream

version, 5.5.33, which includes additional changes, such as performance

improvements, bug fixes, new features, and possibly incompatible

changes. Please see the MySQL 5.5 Release Notes for further details:

 

http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-32.html

http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-33.html

 

In addition this update fixes two issues affecting specifically the

mysql-5.5 Debian package:

 

A race condition in the post-installation script of the mysql-server-5.5

package creates the configuration file "/etc/mysql/debian.cnf" with

world-readable permissions before restricting the permissions, which

allows local users to read the file and obtain sensitive information

such as credentials for the debian-sys-maint to perform

administration tasks. (CVE-2013-2162)

 

Matthias Reichl reported that the mysql-5.5 package misses the patches

applied previous in Debian's mysql-5.1 to drop the database "test" and

the permissions that allow anonymous access, without a password, from

localhost to the "test" database and any databases starting with

"test_". This update reintroduces these patches for the mysql-5.5

package.

 

Existing databases and permissions are not touched. Please refer to the

NEWS file provided with this update for further information.

 

For the stable distribution (wheezy), these problems have been fixed in

version 5.5.33+dfsg-0+wheezy1.

 

For the unstable distribution (sid), the Debian specific problems will

be fixed soon.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2819-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

December 16, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : iceape

 

Security support for Iceape, the Debian-branded version of the Seamonkey

suite needed to be stopped before the end of the regular security

maintenance life cycle.

 

We recommend to migrate to Iceweasel for the web browser functionality

and to Icedove for the e-mail bits. Iceweasel and Icedove are based

on the same codebase and will continue to be supported with security

updates. Alternatively you can switch to the binaries provided by

Mozilla available at http://www.seamonkey-project.org/releases/

 

Further information about Debian Security Advisories, how to apply

these updates to your system and frequently asked questions can be

found at: http://www.debian.org/security/

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2820-1 security@debian.org

http://www.debian.org/security/ Raphael Geissert

December 17, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : nspr

Vulnerability : integer overflow

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-5607

 

It was discovered that NSPR, Netscape Portable Runtime library, could

crash an application using the library when parsing a certificate that

causes an integer overflow. This flaw only affects 64-bit systems.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 4.8.6-1+squeeze1.

 

For the stable distribution (wheezy), this problem has been fixed in

version 2:4.9.2-1+deb7u1.

 

For the testing distribution (jessie), and the unstable distribution

(sid), this problem has been fixed in version 2:4.10.2-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2821-1 security@debian.org

http://www.debian.org/security/ Thijs Kinkhorst

December 18, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : gnupg

Vulnerability : side channel attack

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-4576

 

Genkin, Shamir and Tromer discovered that RSA key material could

be extracted by using the sound generated by the computer during the

decryption of some chosen ciphertexts.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 1.4.10-4+squeeze4.

 

For the stable distribution (wheezy), this problem has been fixed in

version 1.4.12-7+deb7u3.

 

For the unstable distribution (sid), this problem has been fixed in

version 1.4.15-2.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2822-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

December 18, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : xorg-server

Vulnerability : integer underflow

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6424

 

Bryan Quigley discovered an integer underflow in the Xorg X server which

could lead to denial of service or the execution of arbitrary code.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 1.7.7-18.

 

For the stable distribution (wheezy), this problem has been fixed in

version 1.12.4-6+deb7u2.

 

For the unstable distribution (sid), this problem will be fixed soon.

 

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2823-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

December 18, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : pixman

Vulnerability : integer underflow

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6425

 

Bryan Quigley discovered an integer underflow in Pixman which could lead

to denial of service or the execution of arbitrary code.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 0.16.4-1+deb6u1.

 

For the stable distribution (wheezy), this problem has been fixed in

version 0.26.0-4+deb7u1.

 

For the unstable distribution (sid), this problem has been fixed in

version 0.30.2-2.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2824-1 security@debian.org

http://www.debian.org/security/ Salvatore Bonaccorso

December 19, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : curl

Vulnerability : unchecked tls/ssl certificate host name

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6422

 

Marc Deslauriers discovered that curl, a file retrieval tool, would

mistakenly skip verifying the CN and SAN name fields when digital

signature verification was disabled in the libcurl GnuTLS backend.

 

The default configuration for the curl package is not affected by this

issue since the digital signature verification is enabled by default.

 

The oldstable distribution (squeeze) is not affected by this problem.

 

For the stable distribution (wheezy), this problem has been fixed in

version 7.26.0-1+wheezy7.

 

For the unstable distribution (sid), this problem has been fixed in

version 7.34.0-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2825-1 security@debian.org

http://www.debian.org/security/ Moritz Muehlenhoff

December 20, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : wireshark

Vulnerability : several

Problem type : local(remote)

Debian-specific: no

CVE ID : CVE-2013-7113 CVE-2013-7114

 

Laurent Butti and Garming Sam discored multiple vulnerabilities in the

dissectors for NTLMSSPv2 and BSSGP, which could lead to denial of service

or the execution of arbitrary code.

 

For the stable distribution (wheezy), these problems have been fixed in

version 1.8.2-5wheezy9.

 

For the unstable distribution (sid), these problems have been fixed in

version 1.10.4-1.

Link to post
Share on other sites

- -------------------------------------------------------------------------

Debian Security Advisory DSA-2826-1 security@debian.org

http://www.debian.org/security/ Yves-Alexis Perez

December 22, 2013 http://www.debian.org/security/faq

- -------------------------------------------------------------------------

 

Package : denyhosts

Vulnerability : Remote denial of ssh service

Problem type : remote

Debian-specific: no

CVE ID : CVE-2013-6890

 

Helmut Grohne discovered that denyhosts, a tool preventing SSH

brute-force attacks, could be used to perform remote denial of service

against the SSH daemon. Incorrectly specified regular expressions used

to detect brute force attacks in authentication logs could be exploited

by a malicious user to forge crafted login names in order to make

denyhosts ban arbitrary IP addresses.

 

For the oldstable distribution (squeeze), this problem has been fixed in

version 2.6-7+deb6u2.

 

For the stable distribution (wheezy), this problem has been fixed in

version 2.6-10+deb7u2.

 

For the testing distribution (jessie), this problem has been fixed in

version 2.6-10.1.

 

For the unstable distribution (sid), this problem has been fixed in

version 2.6-10.1.

Link to post
Share on other sites

×
×
  • Create New...