Articles / Debian

RSS All articles tagged with Debian

March 06, 2013 10:27 Debian: Security update for PostgreSQL

1

Sumit Soni discovered that PostgreSQL,an object-relational SQL database, could be forced to crash when an internal function was called with invalid arguments, resulting in denial of service.

Updated packages are available from security.debian.org.

March 01, 2013 09:31 Debian: Security update for nginx

0

Juliano Rizzo and Thai Duong discovered a weakness in the TLS/SSL protocol when using compression. This side channel attack, dubbed ‘CRIME’, allows eavesdroppers to gather information to recover the original plaintext in the protocol. This update to nginx disables SSL compression.

Updated packages are available from security.debian.org.

March 01, 2013 09:29 Debian: Security update for lighttpd

0

Several vulnerabilities were discovered in the TLS/SSL protocol. Marsh Ray, Steve Dispensa, and Martin Rex discovered that the TLS and SSLv3 protocols do not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions. This issue is solved in lighttpd by disabling client initiated renegotiation by default. Juliano Rizzo and Thai Duong discovered a weakness in the TLS/SSL protocol when using compression. This side channel attack, dubbed ‘CRIME’, allows eavesdroppers to gather information to recover the original plaintext in the protocol. This update disables compression.

Updated packages are available from security.debian.org.

March 01, 2013 09:27 Debian: Security update for wireshark

0

Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code.

Updated packages are available from security.debian.org.

March 01, 2013 09:24 Debian: Security update for FFmpeg

0

Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. Multiple input validations in the decoders/ demuxers for Shorten, Chines AVS video, VP5, VP6, AVI, AVS and MPEG-1/2 files could lead to the execution of arbitrary code.

Updated packages are available from security.debian.org.

February 27, 2013 10:02 Debian: Security update for openconnect

0

Kevin Cernekee discovered that a malicious VPN gateway can send crafted responses which trigger stack-based buffer overflows. Updated packages are available from security.debian.org.

February 27, 2013 09:59 Debian: Security update for PolarSSL

0

Multiple vulnerabilities have been found in PolarSSL. A timing side channel attack has been found in CBC padding allowing an attacker to recover pieces of plaintext via statistical analysis of crafted packages, known as the “Lucky Thirteen” issue. An array index error might allow remote attackers to cause a denial of service via vectors involving a crafted padding-length value during validation of CBC padding in a TLS session Malformed CBC data in a TLS session could allow remote attackers to conduct distinguishing attacks via statistical analysis of timing side-channel data for crafted packets.

Updated packages are available from security.debian.org.

February 27, 2013 09:58 Debian: Security update for OpenSSL

0

Multiple vulnerabilities have been found in OpenSSL. OpenSSL does not properly perform signature verification for OCSP responses, which allows remote attackers to cause a denial of service via an invalid key. A timing side channel attack has been found in CBC padding allowing an attacker to recover pieces of plaintext via statistical analysis of crafted packages, known as the “Lucky Thirteen” issue.

Updated packages are available from security.debian.org.

February 25, 2013 11:09 Debian: Security update for Ruby on Rails

0

Two vulnerabilities were discovered in Ruby on Rails, a Ruby framework for web application development. The blacklist provided by the attr_protected method could be bypassed with crafted requests, having an application-specific impact. In some applications, the +serialize+ helper in ActiveRecord could be tricked into deserializing arbitrary YAML data, possibly leading to remote code execution.

Updated packages are available from security.debian.org.

February 22, 2013 13:15 Debian: Security update for xen-qemu

0

A buffer overflow was found in the e1000e emulation, which could be triggered when processing jumbo frames. Updated packages are available from security.debian.org.

February 20, 2013 09:06 Debian: Security update for IRCD-Hybrid

0

Bob Nomnomnom reported a Denial of Service vulnerability in IRCD-Hybrid, an Internet Relay Chat server. A remote attacker may use an error in the masks validation and crash the server.

Updated packages are available from security.debian.org.

February 18, 2013 18:13 Debian: Security update for nagios3

0

A buffer overflow problem has been found in nagios3, a host/service/network monitoring and management system. A mailicious client could craft a request to history.cgi and cause application crashes.

Updated packages are available from security.debian.org.

February 18, 2013 18:11 Debian: Security update for Samba

0

Jann Horn had reported two vulnerabilities in Samba, a popular cross-platform network file and printer sharing suite. In particular, these vulnerabilities affect to SWAT, the Samba Web Administration Tool. An attacker can integrate a SWAT page into a malicious web page via a frame or iframe and then overlaid by other content. If an authenticated valid user interacts with this malicious web page, she might perform unintended changes in the Samba settings. An attacker can persuade a valid SWAT user, who is logged in, to click in a malicious link and trigger arbitrary unintended changes in the Samba settings.

Updated packages are available from security.debian.org.

February 18, 2013 17:41 Debian: Security update for libupnp4

0

Multiple stack-based buffer overflows were discovered in libupnp4, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function. An attacker sending carefully crafted SSDP queries to a daemon built on libupnp4 could generate a buffer overflow, overwriting the stack, leading to the daemon crash and possible remote code execution.

Updated packages are available from security.debian.org.

February 15, 2013 16:14 Debian: Security update for libupnp4

0

Multiple stack-based buffer overflows were discovered in libupnp4, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function. An attacker sending carefully crafted SSDP queries to a daemon built on libupnp4 could generate a buffer overflow, overwriting the stack, leading to the daemon crash and possible remote code execution.

February 15, 2013 16:11 Debian: Security update for libupnp

0

Multiple stack-based buffer overflows were discovered in libupnp, a library used for handling the Universal Plug and Play protocol. HD Moore from Rapid7 discovered that SSDP queries where not correctly handled by the unique_service_name() function. An attacker sending carefully crafted SSDP queries to a daemon built on libupnp could generate a buffer overflow, overwriting the stack, leading to the daemon crash and possible remote code execution.

Updated packages are available from security.debian.org.

February 13, 2013 08:14 Ubuntu: Security update for squid

0

It was discovered that squid’s cachemgr.cgi was vulnerable to excessive resource use. A remote attacker could exploit this flaw to perform a denial of service attack on the server and other hosted services. It was discovered that the patch for CVE-2012-5643 was incorrect. A remote attacker could exploit this flaw to perform a denial of service attack.

Updated packages are available from security.ubuntu.com.

February 11, 2013 10:43 Debian: Security update for Ruby on Rails

0

Lawrence Pit discovered that Ruby on Rails, a web development framenwork, is vulnerable to a flaw in the parsing of JSON to YAML. Using a specially crafted payload attackers can trick the backend into decoding a subset of YAML.

Updated packages are available from security.debian.org.

February 08, 2013 10:12 Debian: Security update for ircd-ratbox

0

It was discovered that a bug in the server capability negotiation code of ircd-ratbox could result in denial of service. Updated packages are available from security.debian.org.

February 04, 2013 07:58 Debian: Security update for movabletype

0

An input sanitation problem has been found in upgrade functions of movabletype-opensource, a web-based publishing platform. Using carefully crafted requests to the mt-upgrade.cgi file, it would be possible to inject OS command and SQL queries.

Updated packages are available from security.debian.org.

February 04, 2013 07:55 Debian: Security update for Ganglia

0

Insufficient input sanitization in Ganglia, a web based monitoring system, could lead to remote PHP script execution with permissions of the user running the web browser.

Updated packages are available from security.debian.org.

February 01, 2013 09:21 Debian: Security update for Rails

0

An interpretation conflict can cause the Active Record component of Rails, a web framework for the Ruby programming language, to truncate queries in unexpected ways. This may allow attackers to elevate their privileges.

Updated packages are available from security.debian.org.

January 30, 2013 14:00 Debian: Security update for QEMU

0

It was discovered that the e1000 emulation code in QEMU does not enforce frame size limits in the same way as the real hardware does. This could trigger buffer overflows in the guest operating system driver for that network card, assuming that the host system does not discard such frames (which it will by default).

Updated packages are available from security.debian.org.

January 28, 2013 08:05 Debian: Security update for Asterisk

0

Several vulnerabilities were discovered in Asterisk, a PBX and telephony toolkit, that allow remote attackers to perform denial of service attacks.

Updated packages are available from security.debian.org.

January 28, 2013 07:58 Debian: Security update for Rails

0

It was discovered that Rails, the Ruby web application development framework, performed insufficient validation on input parameters, allowing unintended type conversions. An attacker may use this to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on the application.

Updated packages are available from security.debian.org.

January 25, 2013 09:17 Debian: Security update for Emacs

0

Paul Ling discovered that Emacs insufficiently restricted the evaluation of Lisp code if enable-local-variables is set to “safe”.

Updated packages are available from security.debian.org.

January 23, 2013 15:39 Debian: Security update for Zend Framework

0

Yury Dyachenko discovered that Zend Framework uses the PHP XML parser in an insecure way, allowing attackers to open files and trigger HTTP requests, potentially accessing restricted information.

Updated packages are available from security.debian.org.

January 16, 2013 08:21 Debian: Security update for CUPS

0

Jann Horn discovered that users of the CUPS printing system who are part of the lpadmin group could modify several configuration parameters with security impact. Specifically, this allows an attacker to read or write arbitrary files as root which can be used to elevate privileges.

Updated packages are available from security.debian.org.

January 16, 2013 08:21 Debian: Security update for GnuPG

0

KB Sriram discovered that GnuPG, the GNU Privacy Guard did not sufficiently sanitise public keys on import, which could lead to memory and keyring corruption.

Updated packages are available from security.debian.org.

January 16, 2013 08:20 Debian: Security update for nss

0

Google, Inc. discovered that the TurkTrust certification authority included in the Network Security Service libraries (nss) mis-issued two intermediate CA’s which could be used to generate rogue end-entity certificates. This update explicitly distrusts those two intermediate CA’s. The two existing TurkTrust root CA’s remain active.

Updated packages are available from security.debian.org.

Screenshot

Project Spotlight

SlackPkg

An automated package-management tool for Slackware Linux.

Screenshot

Project Spotlight

onQuery

A advanced event querying engine.