The OVAL Repository5.42013-11-26T06:12:04.566-05:00DSA-2733-1 otrs2 - SQL injectionDebian 6.0Debian 7.0otrs2It was discovered that otrs2, the Open Ticket Request System, does not properly sanitise user-supplied data that is used on SQL queries. An attacker with a valid agent login could exploit this issue to craft SQL queries by injecting arbitrary SQL code through manipulated URLs.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2735-1 iceweasel - severalDebian 7.0iceweaselMultiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: multiple memory safety errors, missing permission checks and other implementation errors may lead to the execution of arbitrary code, cross-site scripting, privilege escalation, bypass of the same-origin policy or the installation of malicious addons.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2723-1 php5 - heap corruptionDebian 6.0Debian 7.0php5It was discovered that PHP could perform an invalid free request when processing crafted XML documents, corrupting the heap and potentially leading to arbitrary code execution. Depending on the PHP application, this vulnerability could be exploited remotely.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2726-1 php-radius - buffer overflowDebian 6.0Debian 7.0php-radiusA buffer overflow has been discovered in the Radius extension for PHP. The function handling Vendor Specific Attributes assumed that the attributes given would always be of valid length. An attacker could use this assumption to trigger a buffer overflow.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2751-1 libmodplug - severalDebian 6.0Debian 7.0libmodplugSeveral vulnerabilities have been discovered in libmodplug, a library for mod music based on ModPlug, that might allow arbitrary code execution when processing specially-crafted ABC files through applications using the library, such as media players.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2727-1 openjdk-6 - severalDebian 6.0Debian 7.0openjdk-6Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2744-1 tiff - severalDebian 6.0Debian 7.0tiffPedro Ribeiro and Huzaifa S. Sidhpurwala discovered multiple vulnerabilities in various tools shipped by the tiff library. Processing a malformed file may lead to denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2731-1 libgcrypt11 - information leakDebian 6.0Debian 7.0libgcrypt11Yarom and Falkner discovered that RSA secret keys in applications using the libgcrypt11 library, for example GnuPG 2.x, could be leaked via a side channel attack, where a malicious local user could obtain private key information from another user on the system.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2730-1 gnupg - information leakDebian 6.0Debian 7.0gnupgYarom and Falkner discovered that RSA secret keys could be leaked via a side channel attack, where a malicious local user could obtain private key information from another user on the system.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2734-1 wireshark - severalDebian 6.0Debian 7.0wiresharkMultiple vulnerabilities were discovered in the dissectors for DVB-CI, GSM??A Common and ASN.1 PER and in the Netmon file parser.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2755-1 python-django - directory traversalDebian 6.0Debian 7.0python-djangoRainer Koirikivi discovered a directory traversal vulnerability with <q>ssi</q> template tags in python-django, a high-level Python web development framework.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2737-1 swift - severalDebian 7.0swiftSeveral vulnerabilities have been discovered in Swift, the Openstack object storage.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2742-1 php5 - interpretation conflictDebian 6.0Debian 7.0php5It was discovered that PHP, a general-purpose scripting language commonly used for web application development, did not properly process embedded NUL characters in the subjectAltName extension of X.509 certificates. Depending on the application and with insufficient CA-level checks, this could be abused for impersonating other users.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2732-1 chromium-browser - severalDebian 7.0chromium-browserSeveral vulnerabilities have been discovered in the Chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2738-1 ruby1.9.1 - severalDebian 6.0Debian 7.0ruby1.9.1Several vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to denial of service and other security problems.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2728-1 bind9 - denial of serviceDebian 6.0Debian 7.0bind9Maxim Shudrak and the HP Zero Day Initiative reported a denial of service vulnerability in BIND, a DNS server. A specially crafted query that includes malformed rdata can cause named daemon to terminate with an assertion failure while rejecting the malformed query.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2725-1 tomcat6 - severalDebian 6.0Debian 7.0tomcat6Two security issues have been found in the Tomcat servlet and JSP engine:Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2673-1 libdmx - severalDebian 6.0Debian 7.0libdmxIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2729-1 openafs - severalDebian 6.0Debian 7.0openafsOpenAFS, the implementation of the distributed filesystem AFS, has been updated to no longer use DES for the encryption of tickets. Additional migration steps are needed to fully set the update into effect. For more information please see the upstream advisory: <a href="http://www.openafs.org/security/OPENAFS-SA-2013-003.txt">OPENAFS-SA-2013-003</a>Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2687-1 libfs - severalDebian 6.0Debian 7.0libfsIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2695-1 chromium-browser - severalDebian 7.0chromium-browserSeveral vulnerabilities have been discovered in the Chromium web browser. Multiple use-after-free, out-of-bounds read, memory safety, and cross-site scripting issues were discovered and corrected.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2749-1 asterisk - severalDebian 6.0Debian 7.0asteriskColin Cuthbertson and Walter Doekes discovered two vulnerabilities in the SIP processing code of Asterisk - an open source PBX and telephony toolkit -, which could result in denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2671-1 request-tracker4 - severalDebian 7.0request-tracker4Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket tracking system.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2703-1 subversion - severalDebian 6.0Debian 7.0subversionSeveral vulnerabilities were discovered in Subversion, a version control system.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2683-1 libxi - severalDebian 6.0Debian 7.0libxiIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2709-1 wireshark - severalDebian 7.0wiresharkMultiple vulnerabilities were discovered in the dissectors for CAPWAP, GMR-1 BCCH, PPP, NBAP, RDP, HTTP, DCP ETSI and in the Ixia IxVeriWave file parser, which could result in denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2715-1 puppet - code executionDebian 6.0Debian 7.0puppetIt was discovered that puppet, a centralized configuration management system, did not correctly handle YAML payloads. A remote attacker could use a specially-crafted payload to execute arbitrary code on the puppet master.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2669-1 linux - severalDebian 7.0linuxSeveral vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leak or privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2697-1 gnutls26 - out-of-bounds array readDebian 7.0gnutls26It was discovered that a malicious client could crash a GNUTLS server and vice versa, by sending TLS records encrypted with a block cipher which contain invalid padding.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2748-1 exactimage - denial of serviceDebian 6.0Debian 7.0exactimageSeveral denial-of-service vulnerabilities were discovered in the dcraw code base, a program for procesing raw format images from digital cameras. This update corrects them in the copy that is embedded in the exactimage package.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2667-1 mysql-5.5 - severalDebian 7.0mysql-5.5Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.5.31, which includes additional changes, such as performance improvements and corrections for data loss defects.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2701-1 krb5 - denial of serviceDebian 6.0Debian 7.0krb5It was discovered that the kpasswd service running on UDP port 464 could respond to response packets, creating a packet loop and a denial of service condition.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2689-1 libxtst - severalDebian 6.0Debian 7.0libxtstIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2675-1 libxvmc - severalDebian 6.0Debian 7.0libxvmcIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2721-1 nginx - nginx security updateDebian 7.0nginxA buffer overflow has been identified in nginx, a small, powerful, scalable web/proxy server, when processing certain chunked transfer encoding requests if proxy_pass to untrusted upstream HTTP servers is used. An attacker may use this flaw to perform denial of service attacks, disclose worker process memory, or possibly execute arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2693-1 libx11 - severalDebian 6.0Debian 7.0libx11Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2707-1 dbus - denial of serviceDebian 7.0dbusAlexandru Cornea discovered a vulnerability in libdbus caused by an implementation bug in _dbus_printf_string_upper_bound(). This vulnerability can be exploited by a local user to crash system services that use libdbus, causing denial of service. Depending on the dbus services running, it could lead to complete system crash.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2685-1 libxp - severalDebian 6.0Debian 7.0libxpIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2681-1 libxcursor - severalDebian 6.0Debian 7.0libxcursorIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2677-1 libxrender - severalDebian 6.0Debian 7.0libxrenderIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2713-1 curl - heap overflowDebian 6.0Debian 7.0curlTimo Sirainen discovered that cURL, an URL transfer library, is prone to a heap overflow vulnerability due to bad checking of the input data in the curl_easy_unescape function.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2736-1 putty - severalDebian 6.0Debian 7.0puttySeveral vulnerabilities where discovered in PuTTY, a Telnet/SSH client for X.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2740-1 python-django - cross-site scripting vulnerabilityDebian 6.0Debian 7.0python-djangoNick Brunn reported a possible cross-site scripting vulnerability in python-django, a high-level Python web development framework.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2717-1 xml-security-c - heap overflowDebian 6.0Debian 7.0xml-security-cJon Erickson of iSIGHT Partners Labs discovered a heap overflow in xml-security-c, an implementation of the XML Digital Security specification. The fix to address <a href="http://security-tracker.debian.org/tracker/CVE-2013-2154">CVE-2013-2154</a> introduced the possibility of a heap overflow in the processing of malformed XPointer expressions in the XML Signature Reference processing code, possibly leading to arbitrary code execution.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2665-1 strongswan - authentication bypassDebian 6.0Debian 7.0strongswanKevin Wojtysiak discovered a vulnerability in strongSwan, an IPsec based VPN solution.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2746-1 icedove - severalDebian 7.0icedoveMultiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, missing permission checks and other implementation errors may lead to the execution of arbitrary code or cross-site scripting.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2705-1 pymongo - denial of serviceDebian 7.0pymongoJibbers McGee discovered that PyMongo, a high-performance schema-free document-oriented data store, is prone to a denial-of-service vulnerability.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2691-1 libxinerama - severalDebian 6.0Debian 7.0libxineramaIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDSA-2679-1 xserver-xorg-video-openchrome - severalDebian 6.0Debian 7.0xserver-xorg-video-openchromeIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDebian 6.0 is installedDebian GNU/Linux 6.0Debian 6.0 is installedSecPod TeamDRAFTINTERIMChandan SACCEPTEDACCEPTEDDSA-2699-1 iceweasel - severalDebian 7.0iceweaselMultiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, missing input sanitising vulnerabilities, use-after-free vulnerabilities, buffer overflows and other programming errors may lead to the execution of arbitrary code, privilege escalation, information leaks or cross-site-scripting.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDDebian 7.0 is installedDebian GNU/Linux 7.0Debian 7.0 is installedSergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDotrs2iceweaselphp5php-radiuslibmodplugopenjdk-6tifflibgcrypt11gnupgwiresharkswiftphp5chromium-browserruby1.9.1bind9tomcat6libdmxopenafslibfschromium-browserasteriskrequest-tracker4subversionlibxiwiresharkpuppetlinuxgnutls26exactimagemysql-5.5krb5libxtstlibxvmcnginxlibx11dbuslibxplibxcursorlibxrendercurlputtypython-djangoxml-security-cstrongswanicedovepymongolibxineramaxserver-xorg-video-openchrome/etcdebian_version^(\d\.\d).*$1iceweasel3.1.7+dfsg1-8+deb7u32.4.9+dfsg1-3+squeeze417.0.8esr-1~deb7u15.4.4-14+deb7u35.3.3-7+squeeze161.2.5-2+squeeze11.2.5-2.3+deb7u11:0.8.8.1-1+squeeze2+git201308281:0.8.8.4-3+deb7u1+git201308286b27-1.12.6-1~deb6u16b27-1.12.6-1~deb7u13.9.4-5+squeeze104.0.2-6+deb7u21.5.0-5+deb7u11.4.5-2+squeeze11.4.12-7+deb7u11.4.10-4+squeeze21.8.2-5wheezy51.2.11-6+squeeze111.4.5-1+deb7u31.2.3-3+squeeze71.4.8-2+deb7u15.4.4-14+deb7u45.3.3-7+squeeze1728.0.1500.95-1~deb7u11.9.3.194-8.1+deb7u11.9.2.0-2+deb6u11:9.8.4.dfsg.P1-6+nmu2+deb7u11:9.7.3.dfsg-1~squeeze116.0.35-1+squeeze36.0.35-6+deb7u11:1.1.2-1+deb7u11:1.1.0-2+squeeze11.6.1-3+deb7u11.4.12.1+dfsg-4+squeeze22:1.0.4-1+deb7u12:1.0.2-1+squeeze127.0.1453.93-1~deb7u11:1.6.2.9-2+squeeze111:1.8.13.1~dfsg-3+deb7u14.0.7-5+deb7u21.6.12dfsg-71.6.17dfsg-4+deb7u32:1.3-82:1.6.1-1+deb7u11.8.2-5wheezy42.6.2-5+squeeze82.7.18-53.2.41-2+deb7u22.12.20-70.8.5-5+deb7u20.8.1-3+deb6u25.5.31+dfsg-0+wheezy11.8.3+dfsg-4squeeze71.10.1+dfsg-5+deb7u12:1.2.1-1+deb7u12:1.1.0-3+squeeze12:1.0.7-1+deb7u12:1.0.5-1+squeeze11.2.1-2.2+wheezy12:1.3.3-4+squeeze12:1.5.0-1+deb7u11.6.8-1+deb7u11:1.0.1-2+deb7u11:1.0.0.xsf1-2+squeeze11:1.1.10-2+squeeze11:1.1.13-1+deb7u11:0.9.6-1+squeeze11:0.9.7-1+deb7u17.26.0-1+wheezy37.21.0-2.1+squeeze40.62-9+deb7u10.60+2010-02-20-1+squeeze21.4.5-1+deb7u11.2.3-3+squeeze61.5.1-3+squeeze31.6.1-5+deb7u24.4.1-5.34.5.2-1.5+deb7u117.0.8-1~deb7u12.2-4+deb7u12:1.1.2-1+deb7u12:1.1-3+squeeze16.01:0.2.904+svn842-2+squeeze11:0.2.906-2+deb7u17.017.0.6esr-1~deb7u1