The OVAL Repository5.72015-09-03T09:00:47.754-04:00DSA-2991-1 -- modsecurity-apache - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7modsecurity-apacheMartin Holst Swende discovered a flaw in the way chunked requests are handled in ModSecurity, an Apache module whose purpose is to tighten the Web application security. A remote attacker could use this flaw to bypass intended mod_security restrictions by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header, allowing to send requests containing content that should have been removed by mod_security.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2989-1 -- apache2 - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7apache2Several security issues were found in the Apache HTTP server.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2984-1 -- acpi-support - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7acpi-supportCESG discovered a root escalation flaw in the acpi-support package. An unprivileged user can inject the DBUS_SESSION_BUS_ADDRESS environment variable to run arbitrary commands as root user via the policy-funcs script.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2992-1 -- linux - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7linuxSeveral vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2990-1 -- cups - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7cupsIt was discovered that the web interface in CUPS, the Common UNIX Printing System, incorrectly validated permissions on rss files and directory index files. A local attacker could possibly use this issue to bypass file permissions and read arbitrary files, possibly leading to a privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2994-1 -- nss - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7nssSeveral vulnerabilities have been discovered in nss, the Mozilla Network Security Service library.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2985-1 -- mysql-5.5 - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7mysql-5.5Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.38. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for further details.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2993-1 -- tor - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7torSeveral issues have been discovered in Tor, a connection-based low-latency anonymous communication system, resulting in information leaks.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2995-1 -- lzo2 - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7lzo2Don A. Bailey from Lab Mouse Security discovered an integer overflow flaw in the way the lzo library decompressed certain archives compressed with the LZO algorithm. An attacker could create a specially crafted LZO-compressed input that, when decompressed by an application using the lzo library, would cause that application to crash or, potentially, execute arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2986-1 -- iceweasel - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7iceweaselMultiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors and use-after-frees may lead to the execution of arbitrary code or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2988-1 -- transmission - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7transmissionBen Hawkes discovered that incorrect handling of peer messages in the Transmission bittorrent client could result in denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2987-1 -- openjdk-7 - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7openjdk-7Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2996-1 -- icedove - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7icedoveMultiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client: Multiple memory safety errors and use-after-frees may lead to the execution of arbitrary code or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2971-1 -- dbus - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7dbusSeveral vulnerabilities have been discovered in dbus, an asynchronous inter-process communication system.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2983-1 -- drupal7 - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7drupal7Multiple security issues have been discovered in the Drupal content management system, ranging from denial of service to cross-site scripting. More information can be found at <a href="https://www.drupal.org/SA-CORE-2014-003">https://www.drupal.org/SA-CORE-2014-003</a>.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2979-1 -- fail2ban - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7fail2banTwo vulnerabilities were discovered in Fail2ban, a solution to ban hosts that cause multiple authentication errors. When using Fail2ban to monitor Postfix or Cyrus IMAP logs, improper input validation in log parsing could enable a remote attacker to trigger an IP ban on arbitrary addresses, resulting in denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2972-1 -- linux - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7linuxAndy Lutomirski discovered that the ptrace syscall was not verifying the RIP register to be valid in the ptrace API on x86_64 processors. An unprivileged user could use this flaw to crash the kernel (resulting in denial of service) or for privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2973-1 -- vlc - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7vlcMultiple buffer overflows have been found in the VideoLAN media player. Processing malformed subtitles or movie files could lead to denial of service and potentially the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2975-1 -- phpmyadmin - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7phpmyadminSeveral vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2978-1 -- libxml2 - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7libxml2Daniel P. Berrange discovered a denial of service vulnerability in libxml2 entity substitution.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2982-1 -- ruby-activerecord-3.2 - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7ruby-activerecord-3.2Sean Griffin discovered two vulnerabilities in the PostgreSQL adapter for Active Record which could lead to SQL injection.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2925-1 rxvt-unicode - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7rxvt-unicodePhillip Hallam-Baker discovered that window property values could be queried in rxvt-unicode, resulting in the potential execution of arbitrary commands.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2915-1 dpkg - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7dpkgJakub Wilk discovered that dpkg did not correctly parse C-style filename quoting, allowing for paths to be traversed when unpacking a source package - leading to the creation of files outside the directory of the source being unpacked.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2927-1 libxfont - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxfontIlja van Sprundel of IOActive discovered several security issues in theX.Org libXfont library, which may allow a local, authenticated user to attempt to raise privileges; or a remote attacker who can control the font server to attempt to execute code with the privileges of the X server.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2915-2 dpkg - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7dpkgJakub Wilk discovered that dpkg did not correctly parse C-style filename quoting, allowing for paths to be traversed when unpacking a source package - leading to the creation of files outside the directory of the source being unpacked.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2981-1 -- polarssl - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7polarsslA flaw was discovered in PolarSSL, a lightweight crypto and SSL/TLS library, which can be exploited by a remote unauthenticated attacker to mount a denial of service against PolarSSL servers that offer GCM ciphersuites. Potentially clients are affected too if a malicious server decides to execute the denial of service attack against its clients.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2976-1 -- eglibc - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7eglibcStephane Chazelas discovered that the GNU C library, glibc, processed ".." path segments in locale-related environment variables, possibly allowing attackers to circumvent intended restrictions, such as ForceCommand in OpenSSH, assuming that they can supply crafted locale settings.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2974-1 -- php5 - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7php5Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2977-1 -- libav - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7libavDon A. Baley discovered an integer overflow in the lzo compression handler which could result in the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2921-1 xbuffy - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7xbuffyMichael Niedermayer discovered a vulnerability in xbuffy, an utility for displaying message count in mailbox and newsgroup accounts.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2922-1 strongswan - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7strongswanA vulnerability has been found in the ASN.1 parser of strongSwan, anIKE/IPsec suite used to establish IPsec protected links.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2934-1 python-django - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7python-djangoSeveral vulnerabilities were discovered in Django, a high-level Python web development framework.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2912-1 openjdk-6 - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7openjdk-6Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2910-1 qemu-kvm - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7qemu-kvmMichael S. Tsirkin of Red Hat discovered a buffer overflow flaw in the way qemu processed MAC addresses table update requests from the guest.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2902-1 curl - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7curlTwo vulnerabilities have been discovered in cURL, an URL transfer library.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2980-1 -- openjdk-6 - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7openjdk-6Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the executionof arbitrary code, breakouts of the Java sandbox, information disclosure or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria MikhnoINTERIMACCEPTEDACCEPTEDDSA-2901-1 wordpress - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7wordpressSeveral vulnerabilities were discovered in Wordpress, a web blogging tool.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2916-1 libmms - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libmmsAlex Chapman discovered that a buffer overflow in processing <q>MMS over HTTP</q> messages could result in the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2904-1 virtualbox - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7virtualbox-osevirtualboxFrancisco Falcon discovered that missing input sanitising in the 3Dacceleration code in VirtualBox could lead to the execution of arbitrary code on the host system.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2917-1 super - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7superJohn Lightsey of the Debian Security Audit project discovered that the super package did not check for setuid failures, allowing local users to increase the privileges on kernel versions which do not guard against RLIMIT_NPROC attacks.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2894-1 openssh - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7opensshTwo vulnerabilities were discovered in OpenSSH, an implementation of the SSH protocol suite.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2884-1 libyaml - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libyamlIvan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitterlibrary. A remote attacker could provide a specially-crafted YAMLdocument that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2886-1 libxalan2-java - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxalan2-javaNicolas Gregoire discovered several vulnerabilities in libxalan2-java, a Java library for XSLT processing. Crafted XSLT programs couldaccess system properties or load arbitrary classes, resulting ininformation disclosure and, potentially, arbitrary code execution.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2891-1 mediawiki - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7mediawikimediawiki-extensionsSeveral vulnerabilities were discovered in MediaWiki, a wiki engine.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2890-1 libspring-java - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7libspring-javaTwo vulnerabilities were discovered in libspring-java, the Debianpackage for the Java Spring framework.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2872-1 udisks - buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7udisksFlorian Weimer discovered a buffer overflow in udisks's mount path parsing code which may result in privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2874-1 mutt - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7muttBeatrice Torracca and Evgeni Golov discovered a buffer overflow in the mutt mail reader. Malformed RFC2047 header lines could result in denial of service or potentially the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2883-1 chromium-browser - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2899-1 openafs - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7openafsMichael Meffie discovered that in OpenAFS, a distributed file system, an attacker with the ability to connect to an OpenAFS fileserver can trigger a buffer overflow, crashing the fileserver, and potentially permitting the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2877-1 lighttpd - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7lighttpdSeveral vulnerabilities were discovered in the lighttpd web server.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2889-1 postfixadmin - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7postfixadminAn SQL injection vulnerability was discovered in postfixadmin, a webadministration interface for the Postfix Mail Transport Agent, whichallowed authenticated users to make arbitrary manipulations to thedatabase.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2869-1 gnutls26 - incorrect certificate verificationDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7gnutls26Nikos Mavrogiannopoulos of Red Hat discovered an X.509 certificate verification issue in GnuTLS, an SSL/TLS library. A certificate validation could be reported successfully even in cases were an error would prevent all verification steps to be performed.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2882-1 extplorer - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7extplorerMultiple cross-site scripting (XSS) vulnerabilities have been discovered in extplorer, a web file explorer and manager using Ext JS.A remote attacker can inject arbitrary web script or HTML code via a crafted string in the URL to application.js.php, admin.php, copy_move.php,functions.php, header.php and upload.php.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2870-1 libyaml-libyaml-perl - heap-based buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libyaml-libyaml-perlFlorian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially-crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2903-1 strongswan - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7strongswanAn authentication bypass vulnerability was found in charon, the daemon handling IKEv2 in strongSwan, an IKE/IPsec suite. The state machine handling the security association (IKE_SA) handled some state transitions incorrectly.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2879-1 libssh - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libsshIt was discovered that libssh, a tiny C SSH library, did not reset the state of the PRNG after accepting a connection. A server mode application that forks itself to handle incoming connections could see its children sharing the same PRNG state, resulting in a cryptographic weakness and possibly the recovery of the private key.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2909-1 qemu - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7qemuMichael S. Tsirkin of Red Hat discovered a buffer overflow flaw in the way qemu processed MAC addresses table update requests from the guest.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2881-1 iceweasel - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7iceweaselMultiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, out of bound reads, use-after-frees and other implementation errors may lead to the execution of arbitrary code, information disclosure, denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2862-1 chromium-browser - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2892-1 a2ps - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7a2psSeveral vulnerabilities have been found in a2ps, an <q>Anything to PostScript</q> converter and pretty-printer.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2871-1 wireshark - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7wiresharkMultiple vulnerabilities were discovered in Wireshark.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2878-1 virtualbox - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7virtualbox-osevirtualboxMatthew Daley discovered multiple vulnerabilities in VirtualBox, a x86virtualisation solution, resulting in denial of service, privilege escalation and an information leak.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2875-1 cups-filters - security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7cups-filtersFlorian Weimer of the Red Hat Product Security Team discovered multiple vulnerabilities in the pdftoopvp CUPS filter, which could result in the execution of arbitrary code if a malformed PDF file is processed.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2898-1 imagemagick - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7imagemagickSeveral buffer overflows were found in Imagemagick, a suite of image manipulation programs. Processing malformed PSD files could lead to the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2885-1 libyaml-libyaml-perl - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libyaml-libyaml-perlIvan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2863-1 libtar - directory traversalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libtarA directory traversal attack was reported against libtar, a C library for manipulating tar archives. The application does not validate the filenames inside the tar archive, allowing to extract files in arbitrary path. An attacker can craft a tar file to override files beyond thetar_extract_glob and tar_extract_all prefix parameter.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2865-1 postgresql-9.1 - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7postgresql-9.1Various vulnerabilities were discovered in PostgreSQL.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2867-1 otrs2 - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7otrs2Several vulnerabilities were discovered in otrs2, the Open Ticket Request System.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2873-1 file - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7fileSeveral vulnerabilities have been found in file, a file type classification tool.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2868-1 php5 - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7php5It was discovered that file, a file type classification tool, contains a flaw in the handling of <q>indirect</q> magic rules in the libmagic library, which leads to an infinite recursion when trying to determine the file type of certain files.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2866-1 gnutls26 - certificate verification flawDebian GNU/Linux 7Debian GNU/kFreeBSD 7gnutls26Suman Jana reported that GnuTLS, deviating from the documented behavior, considers a version 1 intermediate certificate as a CA certificate by default.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2861-1 file - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7fileIt was discovered that file, a file type classification tool, contains a flaw in the handling of <q>indirect</q> magic rules in the libmagic library, which leads to an infinite recursion when trying to determine the file type of certain files.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2893-1 openswan - security updateDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7openswanTwo vulnerabilities were fixed in Openswan, an IKE/IPsec implementation for Linux.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2843-1 graphviz - buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7graphvizTwo buffer overflow vulnerabilities were reported in Graphviz, a rich collection of graph drawing tools.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2858-1 iceweasel - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7iceweaselMultiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, use-after-frees, too-verbose error messages and missing permission checks may lead to the execution of arbitrary code, the bypass of security checks or information disclosure. This update also addresses security issues in the bundled version of the NSS crypto library.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2860-1 parcimonie - information disclosureDebian GNU/Linux 7Debian GNU/kFreeBSD 7parcimonieHolger Levsen discovered that parcimonie, a privacy-friendly helper to refresh a GnuPG keyring, is affected by a design problem that undermines the usefulness of this piece of software in the intended threat model.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2854-1 mumble - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7mumbleSeveral issues have been discovered in mumble, a low latency VoIP client.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2859-1 pidgin - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7pidginMultiple vulnerabilities have been discovered in Pidgin, a multi-protocol instant messaging client.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2849-1 curl - information disclosureDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7curlParas Sethia discovered that libcurl, a client-side URL transfer library, would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2848-1 mysql-5.5 - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7mysql-5.5Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.35. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for further details.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2842-1 libspring-java - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7libspring-javaAlvaro Munoz discovered a XML External Entity (XXE) injection in the Spring Framework which can be used for conducting CSRF and DoS attacks on other sites.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2857-1 libspring-java - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7libspring-javaIt was discovered by the Spring development team that the fix for the XML External Entity (XXE) Injection(<a href="http://security-tracker.debian.org/tracker/CVE-2013-4152">CVE-2013-4152</a>) in the Spring Framework was incomplete.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2852-1 libgadu - heap-based buffer overflowDebian GNU/Linux 7Debian GNU/Linux 6.0Debian GNU/kFreeBSD 7Debian GNU/kFreeBSD 6.0libgaduYves Younan and Ryan Pentney discovered that libgadu, a library for accessing the Gadu-Gadu instant messaging service, contained an integer overflow leading to a buffer overflow. Attackers which impersonate the server could crash clients and potentially execute arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2855-1 libav - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7libavSeveral security issues have been corrected in multiple demuxers an decoders of the libav multimedia library. The IDs mentioned above are just a portion of the security issues fixed in this update. A full list of the changes is available at<a href="http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.10">http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.10</a>Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2856-1 libcommons-fileupload-java - CVE-2014-0050Debian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libcommons-fileupload-javaIt was discovered that the Apache Commons FileUpload package for Java could enter an infinite loop while processing a multipart request with a crafted Content-Type, resulting in a denial-of-service condition.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2847-1 drupal7 - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7drupal7Multiple vulnerabilities have been discovered in Drupal, a fully-featured content management framework.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2846-1 libvirt - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7libvirtMultiple security issues have been found in Libvirt, a virtualization abstraction library.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2850-1 libyaml - heap-based buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libyamlFlorian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially-crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2830-1 ruby-i18n - cross-site scriptingDebian GNU/Linux 7Debian GNU/kFreeBSD 7ruby-i18nPeter McLarnan discovered that the internationalisation component of Ruby on Rails does not properly encode parameters in generated HTML code, resulting in a cross-site scripting vulnerability. This update corrects the underlying vulnerability in the i18n gem, as provided by the ruby-i18n package.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2841-1 movabletype-opensource - cross-site scriptingDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7movabletype-opensourceA cross-site scripting vulnerability was discovered in the rich text editor of the Movable Type blogging engine.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2837-1 openssl - programming errorDebian GNU/Linux 7Debian GNU/kFreeBSD 7opensslAnton Johansson discovered that an invalid TLS handshake package could crash OpenSSL with a NULL pointer dereference.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2833-1 openssl - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7opensslhttp://marc.info/?l=openssl-announce&m=138747119822324&w=2 for further information) and no longer uses the RdRand feature available on some Intel CPUs as a sole source of entropy unless explicitly requested.]]>Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2838-1 libxfont - buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxfontIt was discovered that a buffer overflow in the processing of Glyph Bitmap Distribution fonts (BDF) could result in the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2836-1 devscripts - arbitrary code executionDebian GNU/Linux 7Debian GNU/kFreeBSD 7devscriptsSeveral vulnerabilities have been discovered in uscan, a tool to scan upstream sites for new releases of packages, which is part of the devscripts package. An attacker controlling a website from which uscan would attempt to download a source tarball could execute arbitrary code with the privileges of the user running uscan.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2831-1 puppet - insecure temporary filesDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7puppetAn unsafe use of temporary files was discovered in Puppet, a tool for centralized configuration management. An attacker can exploit this vulnerability and overwrite an arbitrary file in the system.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2820-1 nspr - integer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7nsprIt was discovered that NSPR, Netscape Portable Runtime library, could crash an application using the library when parsing a certificate that causes an integer overflow. This flaw only affects 64-bit systems.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2826-1 deny hosts - Remote denial of ssh serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7denyhostsHelmut Grohne discovered that deny hosts, a tool preventing SSH brute-force attacks, could be used to perform remote denial of service against the SSH daemon. Incorrectly specified regular expressions used to detect brute force attacks in authentication logs could be exploited by a malicious user to forge crafted login names in order to make deny hosts ban arbitrary IP addresses.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2834-1 typo3-src - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7typo3-srcSeveral vulnerabilities were discovered in TYPO3, a content management system. This update addresses cross-site scripting, information disclosure, mass assignment, open redirection and insecure unserialize vulnerabilities and corresponds to <a href="http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/">TYPO3-CORE-SA-2013-004</a>.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2825-1 wireshark - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7wiresharkLaurent Butti and Garming Sam discovered multiple vulnerabilities in the dissectors for NTLMSSPv2 and BSSGP, which could lead to denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2832-1 memcached - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7memcachedMultiple vulnerabilities have been found in memcached, a high-performance memory object caching system.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2840-1 srtp - buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7srtpFernando Russ from Groundworks Technologies reported a buffer overflow flaw in srtp, Cisco's reference implementation of the Secure Real-time Transport Protocol (SRTP), in how the crypto_policy_set_from_profile_for_rtp() function applies cryptographic profiles to an srtp_policy. A remote attacker could exploit this vulnerability to crash an application linked against libsrtp, resulting in a denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2835-1 asterisk - buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7asteriskJan Juergens discovered a buffer overflow in the parser for SMS messages in Asterisk.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2817-1 libtar - Multiple integer overflowsDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libtarTimo Warns reported multiple integer overflow vulnerabilities in libtar, a library for manipulating tar archives, which can result in the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2827-1 libcommons-fileupload-java - arbitrary file upload via deserializationDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libcommons-fileupload-javaIt was discovered that Apache Commons FileUpload, a package to make it easy to add robust, high-performance, file upload capability to servlets and web applications, incorrectly handled file names with NULL bytes in serialized instances. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2812-1 samba - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7sambaTwo security issues were found in Samba, a SMB/CIFS file, print, and login server.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2822-1 xorg-server - integer underflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7xorg-serverBryan Quigley discovered an integer underflow in the Xorg X server which could lead to denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2818-1 mysql-5.5 - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7mysql-5.5Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.5.33, which includes additional changes, such as performance improvements, bug fixes, new features, and possibly incompatible changes. Please see the MySQL 5.5 Release Notes for further details.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2811-1 chromium-browser - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2821-1 gnupg - side channel attackDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7gnupgGenkin, Shamir and Tromer discovered that RSA key material could be extracted by using the sound generated by the computer during the decryption of some chosen cipher texts.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2815-1 munin - denial of serviceDebian GNU/Linux 7Debian GNU/kFreeBSD 7muninChristoph Biedl discovered two denial of service vulnerabilities in munin, a network-wide graphing framework.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2839-1 spice - denial of serviceDebian GNU/Linux 7Debian GNU/kFreeBSD 7spiceMultiple vulnerabilities have been found in spice, a SPICE protocol client and server library.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2816-1 php5 - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7php5Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2814-1 varnish - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7varnishA denial of service vulnerability was reported in varnish, a state of the art, high-performance web accelerator. With some configurations of varnish a remote attacker could mount a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2813-1 gimp - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7gimpMurray McAllister discovered multiple integer and buffer overflows in the XWD plugin in Gimp, which can result in the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2829-1 hplip - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7hplipMultiple vulnerabilities have been found in the HP Linux Printing and Imaging System: Insecure temporary files, insufficient permission checks in PackageKit and the insecure hp-upgrade service has been disabled.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2795-1 lighttpd - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7lighttpdSeveral vulnerabilities have been discovered in the lighttpd web server.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2793-1 libav - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7libavSeveral security issues have been corrected in multiple demuxers and decoders of the libav multimedia library. The CVE IDs mentioned above are just a small portion of the security issues fixed in this update. A full list of the changes is available at <a href="http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.9">http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.9</a>Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2805-1 sup-mail - remote command injectionDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7sup-mailjoernchen of Phenoelit discovered two command injection flaws in Sup, a console-based email client. An attacker might execute arbitrary command if the user opens a maliciously crafted email.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2824-1 curl - unchecked tls/ssl certificate host nameDebian GNU/Linux 7Debian GNU/kFreeBSD 7curlMarc Deslauriers discovered that curl, a file retrieval tool, would mistakenly skip verifying the CN and SAN name fields when digital signature verification was disabled in the libcurl GnuTLS backend.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2754-1 exactimage - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7exactimageIt was discovered that exactimage, a fast image processing library, does not correctly handle error conditions of the embedded copy of dcraw. This could result in a crash or other behaviour in an application using the library due to an uninitialised variable being passed to longjmp.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2704-1 mesa - out of bounds accessDebian GNU/Linux 7Debian GNU/kFreeBSD 7mesaIt was discovered that applications using the mesa library, a free implementation of the OpenGL API, may crash or execute arbitrary code due to an out of bounds memory access in the library. This vulnerability only affects systems with Intel chipsets.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2706-1 chromium-browser - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the Chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2743-1 kfreebsd-9 - severalDebian GNU/kFreeBSD 7kfreebsd-9Several vulnerabilities have been discovered in the FreeBSD kernel that may lead to a privilege escalation or information leak.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2797-1 icedove - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7icedoveMultiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, and other implementation errors may lead to the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2658-1 postgresql-9.1 - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7postgresql-9.1Several vulnerabilities were discovered in PostgreSQL database server.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2747-1 cacti - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7cactiTwo vulnerabilities were discovered in Cacti, a web interface for graphing of monitoring systemsSergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2823-1 pixman - integer underflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7pixmanBryan Quigley discovered an integer underflow in Pixman which could lead to denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2768-1 icedtea-web - heap-based buffer overflowDebian GNU/Linux 7Debian GNU/kFreeBSD 7icedtea-webA heap-based buffer overflow vulnerability was found in icedtea-web, a web browser plugin for running applets written in the Java programming language. If a user were tricked into opening a malicious website, an attacker could cause the plugin to crash or possibly execute arbitrary code as the user invoking the program.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2774-1 gnupg2 - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7gnupg2Two vulnerabilities were discovered in GnuPG 2, the GNU privacy guard, a free PGP replacement.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2779-1 libxml2 - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxml2Aki Helin of OUSPG discovered many out-of-bounds read issues in libxml2, the GNOME project's XML parser library, which can lead to denial of service issues when handling XML documents that end abruptly.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2688-1 libxres - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxresIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2716-1 iceweasel - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7iceweaselMultiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, use-after-free vulnerabilities, missing permission checks, incorrect memory handling and other implementation errors may lead to the execution of arbitrary code, privilege escalation, information disclosure or cross-site request forgery.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2758-1 python-django - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7python-djangoIt was discovered that python-django, a high-level Python web develompent framework, is prone to a denial of service vulnerability via large passwords.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2802-1 nginx - restriction bypassDebian GNU/Linux 7Debian GNU/kFreeBSD 7nginxIvan Fratric of the Google Security Team discovered a bug in nginx, a web server, which might allow an attacker to bypass security restrictions by using a specially crafted request.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2770-1 torque - authentication bypassDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7torqueJohn Fitzpatrick of MWR InfoSecurity discovered an authentication bypass vulnerability in torque, a PBS-derived batch processing queueing system.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2724-1 chromium-browser - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the Chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2674-1 libxv - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxvIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2666-1 xen - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7xenMultiple vulnerabilities have been discovered in the Xen hypervisor.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2750-1 imagemagick - buffer overflowDebian GNU/Linux 7Debian GNU/kFreeBSD 7imagemagickAnton Kortunov reported a heap corruption in ImageMagick, a program collection and library for converting and manipulating image files. Crafted GIF files could cause ImageMagick to crash, potentially leading to arbitrary code execution.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2712-1 otrs2 - privilege escalationDebian GNU/Linux 7Debian GNU/kFreeBSD 7otrs2It was discovered that users with a valid agent login could use crafted URLs to bypass access control restrictions and read tickets to which they should not have access.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2771-1 nas - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7nasHamid Zamani discovered multiple security problems (buffer overflows, format string vulnerabilities and missing input sanitising), which could lead to the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2682-1 libxext - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxextIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2792-1 wireshark - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7wiresharkMultiple vulnerabilities were discovered in the dissectors for IEEE 802.15.4, NBAP, SIP and TCP, which could result in denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2778-1 libapache2-mod-fcgid - heap-based buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libapache2-mod-fcgidRobert Matthews discovered that the Apache FCGID module, a FastCGI implementation for Apache HTTP Server, fails to perform adequate boundary checks on user-supplied input. This may allow a remote attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2710-1 xml-security-c - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7xml-security-cJames Forshaw from Context Information Security discovered several vulnerabilities in xml-security-c, an implementation of the XML Digital Security specification.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2698-1 tiff - buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7tiffMultiple issues were discovered in the TIFF tools, a set of utilities for TIFF image file manipulation and conversion.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2782-1 polarssl - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7polarsslMultiple security issues have been discovered in PolarSSL, a lightweight crypto and SSL/TLS library:Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2808-1 openjpeg - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7openjpegCVE-2013-1447) via application crash or high memory consumption, possible code execution through heap buffer overflows (CVE-2013-6045), information disclosure (CVE-2013-6052), or yet another heap buffer overflow that only appears to affect OpenJPEG 1.3 (CVE-2013-6054).]]>Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2789-1 strongswan - Denial of service and authorisation bypassDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7strongswanA vulnerability has been found in the ASN.1 parser of strongSwan, an IKE daemon used to establish IPsec protected links.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2720-1 icedove - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7icedoveMultiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, use-after-free vulnerabilities, missing permission checks, incorrect memory handling and other implementation errors may lead to the execution of arbitrary code, privilege escalation, information disclosure or cross-site request forgery.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2767-1 proftpd-dfsg - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7proftpd-dfsgKingcope discovered that the mod_sftp and mod_sftp_pam modules of proftpd, a powerful modular FTP/SFTP/FTPS server, are not properly validating input, before making pool allocations. An attacker can use this flaw to conduct denial of service attacks against the system running proftpd (resource exhaustion).Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2672-1 kfreebsd-9 - interpretation conflictDebian GNU/kFreeBSD 7kfreebsd-9Adam Nowacki discovered that the new FreeBSD NFS implementation processes a crafted READDIR request which instructs to operate a file system on a file node as if it were a directory node, leading to a kernel crash or potentially arbitrary code execution.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2678-1 mesa - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7mesaIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2741-1 chromium-browser - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the Chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2777-1 systemd - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7systemdMultiple security issues in systemd have been discovered by Sebastian Krahmer and Florian Weimer: Insecure interaction with DBUS could lead to the bypass of Policykit restrictions and privilege escalation or denial of service through an integer overflow in journald and missing input sanitising in the processing of X keyboard extension (XKB) files.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2680-1 libxt - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxtIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2684-1 libxrandr - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxrandrIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2788-1 iceweasel - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7iceweaselMultiple security issues have been found in iceweasel, Debian's version of the Mozilla Firefox web browser: multiple memory safety errors, and other implementation errors may lead to the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2786-1 icu - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7icuThe Google Chrome Security Team discovered two issues (a race condition and a use-after-free issue) in the International Components for Unicode (ICU) library.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2798-1 curl - unchecked ssl certificate host nameDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7curlScott Cantor discovered that curl, a file retrieval tool, would disable the CURLOPT_SSLVERIFYHOST check when the CURLOPT_SSL_VERIFYPEER setting was disabled. This would also disable ssl certificate host name checks when it should have only disabled verification of the certificate trust chain.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2740-2 python-django - regressionDebian GNU/Linux 7Debian GNU/kFreeBSD 7python-djangoNick Brunn reported a possible cross-site scripting vulnerability in python-django, a high-level Python web development framework.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2809-1 ruby1.8 - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7ruby1.8Several vulnerabilities have been discovered in the interpreter for the Ruby language.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2752-1 phpbb3 - too wide permissionsDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7phpbb3Andreas Beckmann discovered that phpBB, a web forum, as installed in Debian, sets incorrect permissions for cached files, allowing a malicious local user to overwrite them.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2764-1 libvirt - programming errorDebian GNU/Linux 7Debian GNU/kFreeBSD 7libvirtDaniel P. Berrange discovered that incorrect memory handling in the remoteDispatchDomainMemoryStats() function could lead to denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2700-1 wireshark - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7wiresharkMultiple vulnerabilities were discovered in the dissectors for GTPv2, ASN.1 BER, PPP CCP, DCP ETSI, MPEG DSM-CC and Websocket, which could result in denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2690-1 libxxf86dga - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxxf86dgaIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2803-1 quagga - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7quaggaMultiple vulnerabilities were discovered in Quagga, a BGP/OSPF/RIP routing daemon.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2794-1 spip - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7spipSeveral vulnerabilities have been found in SPIP, a website engine for publishing, resulting in cross-site request forgery on logout, cross-site scripting on author page, and PHP injection.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2806-1 nbd - privilege escalationDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7nbdIt was discovered that nbd-server, the server for the Network Block Device protocol, did incorrect parsing of the access control lists, allowing access to any hosts with an IP address sharing a prefix with an allowed address.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2676-1 libxfixes - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxfixesIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2759-1 iceweasel - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7iceweaselMultiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows may lead to the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2773-1 gnupg - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7gnupgTwo vulnerabilities were discovered in GnuPG, the GNU privacy guard, a free PGP replacement.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2702-1 telepathy-gabble - TLS verification bypassDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7telepathy-gabbleMaksim Otstavnov discovered that the Wocky submodule used by telepathy-gabble, the Jabber/XMPP connection manager for the Telepathy framework, does not respect the tls-required flag on legacy Jabber servers. A network intermediary could use this vulnerability to bypass TLS verification and perform a man-in-the-middle attack.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2739-1 cacti - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7cactiTwo security issues (SQL injection and command line injection via SNMP settings) were found in Cacti, a web interface for graphing of monitoring systems.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2745-1 linux - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7linuxSeveral vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leak or privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2762-1 icedove - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7icedoveMultiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors and buffer overflows may lead to the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2756-1 wireshark - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7wiresharkMultiple vulnerabilities were discovered in the dissectors for LDAP, RTPS and NBAP and in the Netmon file parser, which could result in denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2801-1 libhttp-body-perl - design errorDebian GNU/Linux 7Debian GNU/kFreeBSD 7libhttp-body-perlJonathan Dolle reported a design error in HTTP::Body, a Perl module for processing data from HTTP POST requests. The HTTP body multipart parser creates temporary files which preserve the suffix of the uploaded file. An attacker able to upload files to a service that uses HTTP::Body::Multipart could potentially execute commands on the server if these temporary filenames are used in subsequent commands without further checks.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2796-1 torque - arbitrary code executionDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7torqueMatt Ezell from Oak Ridge National Labs reported a vulnerability in torque, a PBS-derived batch processing queueing system.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2804-1 drupal7 - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7drupal7Multiple vulnerabilities have been discovered in Drupal, a fully-featured content management framework: Cross-site request forgery, insecure pseudo random number generation, code execution, incorrect security token validation and cross-site scripting.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2785-1 chromium-browser - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2772-1 typo3-src - cross-site scriptingDebian GNU/Linux 7Debian GNU/kFreeBSD 7typo3-srcMarkus Pieton and Vytautas Paulikas discovered that the embedded video and audio player in the TYPO3 web content management system is suspectible to cross-site-scripting.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2696-1 otrs2 - privilege escalationDebian GNU/Linux 7Debian GNU/kFreeBSD 7otrs2A vulnerability has been discovered in the Open Ticket Request System, which can be exploited by malicious users to disclose potentially sensitive information.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2810-1 ruby1.9.1 - heap overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7ruby1.9.1Charlie Somerville discovered that Ruby incorrectly handled floating point number conversion. If an application using Ruby accepted untrusted input strings and converted them to floating point numbers, an attacker able to provide such input could cause the application to crash or, possibly, execute arbitrary code with the privileges of the application.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2753-1 mediawiki - cross-site request forgery token disclosureDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7mediawikiIt was discovered that in Mediawiki, a wiki engine, several API modules allowed anti-CSRF tokens to be accessed via JSONP. These tokens protect against cross site request forgeries and are confidential.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2757-1 wordpress - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7wordpressSeveral vulnerabilities were identified in Wordpress, a web blogging tool. As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the Wordpress package to the latest upstream version instead of backporting the patches.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2763-1 pyopenssl - hostname check bypassingDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7pyopensslIt was discovered that PyOpenSSL, a Python wrapper around the OpenSSL library, does not properly handle certificates with NULL characters in the Subject Alternative Name field.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2791-1 tryton-client - missing input sanitisationDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7tryton-clientCedric Krier discovered that the Tryton client does not sanitise the file extension supplied by the server when processing reports. As a result, a malicious server could send a report with a crafted file extension that causes the client to write any local file to which the user running the client has write access.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2799-1 chromium-browser - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2694-1 spip - privilege escalationDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7spipA privilege escalation vulnerability has been found in SPIP, a website engine for publishing, which allows anyone to take control of the website.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2686-1 libxcb - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxcbIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2765-1 davfs2 - privilege escalationDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7davfs2Davfs2, a filesystem client for WebDAV, calls the function system() insecurely while is setuid root. This might allow a privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2714-1 kfreebsd-9 - programming errorDebian GNU/kFreeBSD 7kfreebsd-9Konstantin Belousov and Alan Cox discovered that insufficient permission checks in the memory management of the FreeBSD kernel could lead to privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2760-1 chrony - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7chronyFlorian Weimer discovered two security problems in the Chrony time synchronisation software (buffer overflows and use of uninitialised data in command replies).Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2781-1 python-crypto - PRNG not correctly reseeded in some situationsDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7python-cryptoA cryptographic vulnerability was discovered in the pseudo random number generator in python-crypto.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2718-1 wordpress - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7wordpressSeveral vulnerabilities were identified in WordPress, a web blogging tool. As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the wordpress package to the latest upstream version instead of backporting the patches.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2708-1 fail2ban - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7fail2banKrzysztof Katowicz-Kowalewski discovered a vulnerability in Fail2ban, a log monitoring and system which can act on attack by preventing hosts to connect to specified services using the local firewall.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2448-1 inspircd - buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7inspircdIt was discovered that a heap-based buffer overflow in InspIRCd could allow remote attackers to execute arbitrary code via a crafted DNS query.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2692-1 libxxf86vm - severalDebian GNU/Linux 7Debian GNU/Linux 6.0Debian GNU/kFreeBSD 7Debian GNU/kFreeBSD 6.0libxxf86vmIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2790-1 nss - uninitialised memory readDebian GNU/Linux 7Debian GNU/kFreeBSD 7nssA flaw was found in the way the Mozilla Network Security Service library (nss) read uninitialised data when there was a decryption failure. A remote attacker could use this flaw to cause a denial of service (application crash) for applications linked with the nss library.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2784-1 xorg-server - use-after-freeDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7xorg-serverPedro Ribeiro discovered a use-after-free in the handling of ImageText requests in the Xorg X server, which could result in denial of service or privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2761-1 puppet - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7puppetSeveral vulnerabilities were discovered in puppet, a centralized configuration management system.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2722-1 openjdk-7 - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7openjdk-7Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2807-1 links2 - integer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7links2Mikulas Patocka discovered an integer overflow in the parsing of HTML tables in the Links web browser. This can only be exploited when running Links in graphical mode.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2775-1 ejabberd - insecure SSL usageDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7ejabberdIt was discovered that ejabberd, a Jabber/XMPP server, uses SSLv2 and weak ciphers for communication, which are considered insecure. The software offers no runtime configuration options to disable these. This update disables the use of SSLv2 and weak ciphers.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2787-1 roundcube - design errorDebian GNU/Linux 7Debian GNU/kFreeBSD 7roundcubeIt was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, does not properly sanitise the _session parameter in steps/utils/save_pref.inc during saving preferences. The vulnerability can be exploited to overwrite configuration settings and subsequently allowing random file access, manipulated SQL queries and even code execution.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2800-1 nss - buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7nssAndrew Tinits reported a potentially exploitable buffer overflow in the Mozilla Network Security Service library (nss). With a specially crafted request a remote attacker could cause a denial of service or possibly execute arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2733-1 otrs2 - SQL injectionDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7otrs2It was discovered that otrs2, the Open Ticket Request System, does not properly sanitise user-supplied data that is used on SQL queries. An attacker with a valid agent login could exploit this issue to craft SQL queries by injecting arbitrary SQL code through manipulated URLs.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2735-1 iceweasel - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7iceweaselMultiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: multiple memory safety errors, missing permission checks and other implementation errors may lead to the execution of arbitrary code, cross-site scripting, privilege escalation, bypass of the same-origin policy or the installation of malicious addons.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2723-1 php5 - heap corruptionDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7php5It was discovered that PHP could perform an invalid free request when processing crafted XML documents, corrupting the heap and potentially leading to arbitrary code execution. Depending on the PHP application, this vulnerability could be exploited remotely.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2726-1 php-radius - buffer overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7php-radiusA buffer overflow has been discovered in the Radius extension for PHP. The function handling Vendor Specific Attributes assumed that the attributes given would always be of valid length. An attacker could use this assumption to trigger a buffer overflow.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2751-1 libmodplug - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libmodplugSeveral vulnerabilities have been discovered in libmodplug, a library for mod music based on ModPlug, that might allow arbitrary code execution when processing specially-crafted ABC files through applications using the library, such as media players.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2727-1 openjdk-6 - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7openjdk-6Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2744-1 tiff - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7tiffPedro Ribeiro and Huzaifa S. Sidhpurwala discovered multiple vulnerabilities in various tools shipped by the tiff library. Processing a malformed file may lead to denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2731-1 libgcrypt11 - information leakDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libgcrypt11Yarom and Falkner discovered that RSA secret keys in applications using the libgcrypt11 library, for example GnuPG 2.x, could be leaked via a side channel attack, where a malicious local user could obtain private key information from another user on the system.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2730-1 gnupg - information leakDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7gnupgYarom and Falkner discovered that RSA secret keys could be leaked via a side channel attack, where a malicious local user could obtain private key information from another user on the system.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2734-1 wireshark - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7wiresharkMultiple vulnerabilities were discovered in the dissectors for DVB-CI, GSM A Common and ASN.1 PER and in the Netmon file parser.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2755-1 python-django - directory traversalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7python-djangoRainer Koirikivi discovered a directory traversal vulnerability with <q>ssi</q> template tags in python-django, a high-level Python web development framework.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2737-1 swift - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7swiftSeveral vulnerabilities have been discovered in Swift, the Openstack object storage.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2742-1 php5 - interpretation conflictDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7php5It was discovered that PHP, a general-purpose scripting language commonly used for web application development, did not properly process embedded NUL characters in the subjectAltName extension of X.509 certificates. Depending on the application and with insufficient CA-level checks, this could be abused for impersonating other users.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2732-1 chromium-browser - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the Chromium web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2738-1 ruby1.9.1 - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7ruby1.9.1Several vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to denial of service and other security problems.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2728-1 bind9 - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7bind9Maxim Shudrak and the HP Zero Day Initiative reported a denial of service vulnerability in BIND, a DNS server. A specially crafted query that includes malformed rdata can cause named daemon to terminate with an assertion failure while rejecting the malformed query.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2725-1 tomcat6 - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7tomcat6Two security issues have been found in the Tomcat servlet and JSP engine:Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2673-1 libdmx - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libdmxIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2729-1 openafs - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7openafsOpenAFS, the implementation of the distributed filesystem AFS, has been updated to no longer use DES for the encryption of tickets. Additional migration steps are needed to fully set the update into effect. For more information please see the upstream advisory: <a href="http://www.openafs.org/security/OPENAFS-SA-2013-003.txt">OPENAFS-SA-2013-003</a>Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2687-1 libfs - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libfsIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2695-1 chromium-browser - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7chromium-browserSeveral vulnerabilities have been discovered in the Chromium web browser. Multiple use-after-free, out-of-bounds read, memory safety, and cross-site scripting issues were discovered and corrected.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2749-1 asterisk - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7asteriskColin Cuthbertson and Walter Doekes discovered two vulnerabilities in the SIP processing code of Asterisk - an open source PBX and telephony toolkit -, which could result in denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2671-1 request-tracker4 - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7request-tracker4Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket tracking system.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2703-1 subversion - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7subversionSeveral vulnerabilities were discovered in Subversion, a version control system.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2683-1 libxi - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxiIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2709-1 wireshark - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7wiresharkMultiple vulnerabilities were discovered in the dissectors for CAPWAP, GMR-1 BCCH, PPP, NBAP, RDP, HTTP, DCP ETSI and in the Ixia IxVeriWave file parser, which could result in denial of service or the execution of arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2715-1 puppet - code executionDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7puppetIt was discovered that puppet, a centralized configuration management system, did not correctly handle YAML payloads. A remote attacker could use a specially-crafted payload to execute arbitrary code on the puppet master.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2669-1 linux - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7linuxSeveral vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leak or privilege escalation.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2697-1 gnutls26 - out-of-bounds array readDebian GNU/Linux 7Debian GNU/kFreeBSD 7gnutls26It was discovered that a malicious client could crash a GNUTLS server and vice versa, by sending TLS records encrypted with a block cipher which contain invalid padding.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2748-1 exactimage - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7exactimageSeveral denial-of-service vulnerabilities were discovered in the dcraw code base, a program for processing raw format images from digital cameras. This update corrects them in the copy that is embedded in the exactimage package.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2667-1 mysql-5.5 - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7mysql-5.5Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.5.31, which includes additional changes, such as performance improvements and corrections for data loss defects.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2701-1 krb5 - denial of serviceDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7krb5It was discovered that the kpasswd service running on UDP port 464 could respond to response packets, creating a packet loop and a denial of service condition.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2689-1 libxtst - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxtstIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2675-1 libxvmc - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxvmcIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2721-1 nginx - nginx security updateDebian GNU/Linux 7Debian GNU/kFreeBSD 7nginxA buffer overflow has been identified in nginx, a small, powerful, scalable web/proxy server, when processing certain chunked transfer encoding requests if proxy_pass to untrusted upstream HTTP servers is used. An attacker may use this flaw to perform denial of service attacks, disclose worker process memory, or possibly execute arbitrary code.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2693-1 libx11 - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libx11Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2707-1 dbus - denial of serviceDebian GNU/Linux 7Debian GNU/kFreeBSD 7dbusAlexandru Cornea discovered a vulnerability in libdbus caused by an implementation bug in _dbus_printf_string_upper_bound(). This vulnerability can be exploited by a local user to crash system services that use libdbus, causing denial of service. Depending on the dbus services running, it could lead to complete system crash.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2685-1 libxp - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxpIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2681-1 libxcursor - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxcursorIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2677-1 libxrender - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxrenderIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2713-1 curl - heap overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7curlTimo Sirainen discovered that cURL, an URL transfer library, is prone to a heap overflow vulnerability due to bad checking of the input data in the curl_easy_unescape function.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2736-1 putty - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7puttySeveral vulnerabilities where discovered in PuTTY, a Telnet/SSH client for X.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2740-1 python-django - cross-site scripting vulnerabilityDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7python-djangoNick Brunn reported a possible cross-site scripting vulnerability in python-django, a high-level Python web development framework.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2717-1 xml-security-c - heap overflowDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7xml-security-cJon Erickson of iSIGHT Partners Labs discovered a heap overflow in xml-security-c, an implementation of the XML Digital Security specification. The fix to address <a href="http://security-tracker.debian.org/tracker/CVE-2013-2154">CVE-2013-2154</a> introduced the possibility of a heap overflow in the processing of malformed XPointer expressions in the XML Signature Reference processing code, possibly leading to arbitrary code execution.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2665-1 strongswan - authentication bypassDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7strongswanKevin Wojtysiak discovered a vulnerability in strongSwan, an IPsec based VPN solution.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2746-1 icedove - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7icedoveMultiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, missing permission checks and other implementation errors may lead to the execution of arbitrary code or cross-site scripting.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2705-1 pymongo - denial of serviceDebian GNU/Linux 7Debian GNU/kFreeBSD 7pymongoJibbers McGee discovered that PyMongo, a high-performance schema-free document-oriented data store, is prone to a denial-of-service vulnerability.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2691-1 libxinerama - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7libxineramaIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2679-1 xserver-xorg-video-openchrome - severalDebian GNU/Linux 6.0Debian GNU/Linux 7Debian GNU/kFreeBSD 6.0Debian GNU/kFreeBSD 7xserver-xorg-video-openchromeIlja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDebian 6.0 is installedDebian 6.0Debian 6.0 (squeeze) is installedSecPod TeamDRAFTINTERIMChandan SACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDSA-2699-1 iceweasel - severalDebian GNU/Linux 7Debian GNU/kFreeBSD 7iceweaselMultiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, missing input sanitising vulnerabilities, use-after-free vulnerabilities, buffer overflows and other programming errors may lead to the execution of arbitrary code, privilege escalation, information leaks or cross-site-scripting.Sergey ArtykhovDRAFTINTERIMACCEPTEDMaria KedovskayaINTERIMSergey ArtykhovACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDDebian GNU/Linux is installedDebian GNU/LinuxDebian GNU/Linux is installedMaria MikhnoDRAFTINTERIMACCEPTEDACCEPTEDDebian GNU/kFreeBSD is installedDebian GNU/kFreeBSDDebian GNU/kFreeBSD is installedMaria MikhnoDRAFTINTERIMACCEPTEDACCEPTEDDebian 7 is installedDebian 7Debian 7 (wheezy) is installedMaria KedovskayaDRAFTINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDmodsecurity-apacheapache2acpi-supportcupsnsstorlzo2transmissionicedovedbusfail2banlinuxvlcphpmyadminlibxml2ruby-activerecord-3.2rxvt-unicodedpkgeglibcxbuffypython-djangoqemu-kvmopenjdk-6wordpresslibmmssuperopensshlibxalan2-javamediawiki-extensionsmediawikiudisksmuttopenafslighttpdpostfixadminextplorerstrongswanlibsshqemua2psvirtualbox-osevirtualboxcups-filtersimagemagicklibyaml-libyaml-perlpostgresql-9.1otrs2gnutls26fileopenswangraphviziceweaselparcimoniemumblepidginlibspring-javalibgadulibvirtlibyamlruby-i18nmovabletype-opensourceopenssllibxfontdevscriptspuppetnsprdenyhoststypo3-srcwiresharkmemcachedsrtpasterisklibtarlibcommons-fileupload-javasambaxorg-serverchromium-browsergnupgmuninspicephp5varnishgimphpliplighttpdlibavsup-mailcurlexactimagekfreebsd-9postgresql-9.1cactipixmanicedtea-webgnupg2libxml2libxresnginxlibxvxenimagemagicknaslibxextlibapache2-mod-fcgidxml-security-ctiffpolarsslopenjpegstrongswanicedoveproftpd-dfsgmesasystemdlibxtlibxrandriceweaselicucurlpython-djangoruby1.8phpbb3libvirtwiresharklibxxf86dgaquaggaspipnbdlibxfixesiceweaselgnupgtelepathy-gabblecactilinuxicedovewiresharklibhttp-body-perltorquedrupal7typo3-srcotrs2ruby1.9.1mediawikipyopenssltryton-clientchromium-browserspiplibxcbdavfs2kfreebsd-9chronypython-cryptowordpressfail2baninspircdlibxxf86vmxorg-serverpuppetopenjdk-7links2ejabberdroundcubenssotrs2iceweaselphp5php-radiuslibmodplugopenjdk-6tifflibgcrypt11gnupgwiresharkswiftphp5chromium-browserruby1.9.1bind9tomcat6libdmxopenafslibfschromium-browserasteriskrequest-tracker4subversionlibxiwiresharkpuppetlinuxgnutls26exactimagemysql-5.5krb5libxtstlibxvmcnginxlibx11dbuslibxplibxcursorlibxrendercurlputtypython-djangoxml-security-cstrongswanicedovepymongolibxinerama/etcdebian_version^(\d\.\d).*$1xserver-xorg-video-openchrome/etcos-release^NAME="(.*)"$1/etcdebian_version^(\d).*$1iceweasel0:2.6.6-6+deb7u20:2.2.22-13+deb7u30:0.140-5+deb7u10:3.2.60-1+deb7u30:1.5.3-5+deb7u42:3.14.5-1+deb7u10:5.5.38-0+wheezy10:0.2.4.23-1~deb7u10:2.06-1+deb7u10:24.7.0esr-1~deb7u10:2.52-3+nmu20:7u65-2.5.1-2~deb7u10:24.7.0-1~deb7u10:1.6.8-1+deb7u30:7.14-2+deb7u50:0.8.6-3wheezy30:3.2.60-1+deb7u10:2.0.3-5+deb7u14:3.4.11.1-2+deb7u10:2.8.0+dfsg1-7+wheezy10:3.2.6-5+deb7u10:9.15-2+deb7u10:9.07-2+deb6u10:1.15.9-00:1.16.13-01:1.4.5-41:1.4.1-50:1.16.14-00:1.15.10-00:1.2.9-1~deb7u30:2.13-38+deb7u30:5.4.4-14+deb7u126:0.8.13-10:3.3.bl.3.dfsg-8+deb7u10:3.3.bl.3.dfsg-8+deb6u10:4.5.2-1.5+deb7u40:4.4.1-5.60:1.4.5-1+deb7u70:1.2.3-3+squeeze100:6b31-1.13.3-1~deb7u10:6b31-1.13.3-1~deb6u10:0.12.5+dfsg-5+squeeze110:1.1.2+dfsg-6+deb7u10:7.21.0-2.1+squeeze80:7.26.0-1+wheezy90:6b32-1.13.4-1~deb7u10:3.6.1+dfsg-1~deb6u20:3.6.1+dfsg-1~deb7u20:0.6.2-3+deb7u10:0.6-1+squeeze20:4.1.18-dfsg-2+deb7u30:3.2.10-dfsg-1+squeeze30:3.30.0-3+squeeze20:3.30.0-6+deb7u11:6.0p1-4+deb7u11:5.5p1-6+squeeze50:0.1.4-2+deb7u40:0.1.3-1+deb6u40:2.7.1-5+deb6u10:2.7.1-7+deb7u10:3.5~deb7u1-01:1.19.14+dfsg-0+deb7u10:3.0.6.RELEASE-6+deb7u30:1.0.1+git20100614-3squeeze10:1.0.4-7wheezy10:1.5.21-6.2+deb7u20:1.5.20-9+squeeze30:33.0.1750.152-1~deb7u10:1.6.1-3+deb7u20:1.4.12.1+dfsg-4+squeeze30:1.4.31-4+deb7u30:1.4.28-2+squeeze1.60:2.3.5-2+deb7u10:2.8.6-1+squeeze30:2.12.20-8+deb7u10:2.1.0b6+dfsg.2-1+squeeze20:2.1.0b6+dfsg.3-4+deb7u10:0.33-1+squeeze20:0.38-3+deb7u10:4.5.2-1.5+deb7u30:4.4.1-5.50:0.4.5-3+squeeze20:0.5.4-1+deb7u10:0.12.5+dfsg-3squeeze40:1.1.2+dfsg-6a+deb7u10:24.4.0esr-1~deb7u20:32.0.1700.123-1~deb7u11:4.14-1.1+deb6u11:4.14-1.1+deb7u10:1.8.2-5wheezy100:1.2.11-6+squeeze140:3.2.10-dfsg-1+squeeze20:4.1.18-dfsg-2+deb7u20:1.0.18-2.1+deb7u18:6.7.7.10-5+deb7u38:6.6.0.4-3+squeeze40:0.33-1+squeeze30:0.38-3+deb7u20:1.2.16-1+deb7u20:1.2.11-6+deb6u20:9.1.12-0wheezy10:3.1.7+dfsg1-8+deb7u40:2.4.9+dfsg1-3+squeeze50:5.11-2+deb7u20:5.04-5+squeeze40:5.3.3-7+squeeze190:5.4.4-14+deb7u80:2.12.20-80:5.04-5+squeeze30:5.11-2+deb7u11:2.6.37-3+deb7u11:2.6.28+dfsg-5+squeeze20:2.26.3-5+squeeze20:2.26.3-14+deb7u10:24.3.0esr-1~deb7u10:0.7.1-1+deb7u10:1.2.3-349-g315b5f5-2.2+deb7u10:2.10.9-1~deb7u10:7.21.0-2.1+squeeze70:7.26.0-1+wheezy80:5.5.35+dfsg-0+wheezy10:3.0.6.RELEASE-6+deb7u10:3.0.6.RELEASE-6+deb7u21:1.9.0-2+squeeze21:1.11.2-1+deb7u16:0.8.10-10:1.2.2-1+deb7u20:1.2.2-1+deb6u20:7.14-2+deb7u20:0.9.12.3-10:0.1.4-2+deb7u20:0.1.3-1+deb6u20:0.6.0-3+deb7u10:4.3.8+dfsg-0+squeeze40:5.1.4+dfsg-4+deb7u10:1.0.1e-2+deb7u30:1.0.1e-2+deb7u11:1.4.5-31:1.4.1-40:2.12.6+deb7u2-00:2.6.2-5+squeeze90:2.7.23-1~deb7u22:4.9.2-1+deb7u10:4.8.6-1+squeeze10:2.6-7+deb6u20:2.6-10+deb7u20:4.3.9+dfsg1-1+squeeze90:4.5.19+dfsg1-5+wheezy20:1.8.2-5wheezy90:1.4.13-0.2+deb7u10:1.4.5-1+deb6u10:1.4.4+20100615~dfsg-2+deb7u10:1.4.4~dfsg-6+deb6u11:1.6.2.9-2+squeeze121:1.8.13.1~dfsg1-3+deb7u30:1.2.16-1+deb7u10:1.2.11-6+deb6u10:1.2.2-1+deb7u10:1.2.2-1+deb6u12:3.5.6~dfsg-3squeeze112:3.6.6-6+deb7u22:1.7.7-182:1.12.4-6+deb7u20:5.5.33+dfsg-0+wheezy10:31.0.1650.63-1~deb7u10:1.4.12-7+deb7u30:1.4.10-4+squeeze40:2.0.6-4+deb7u20:0.11.0-1+deb7u10:5.3.3-7+squeeze180:5.4.4-14+deb7u70:3.0.2-2+deb7u10:2.1.3-8+deb6u10:2.8.2-2+deb7u10:2.6.10-1+squeeze40:3.10.6-2+squeeze20:3.12.6-3.1+deb7u10:1.4.28-2+squeeze1.40:1.4.31-4+deb7u16:0.8.9-10:0.12.1+git20120407.aaa852f-1+deb7u10:0.11-2+nmu1+deb6u10:7.26.0-1+wheezy70:0.8.1-3+deb6u30:0.8.5-5+deb7u30:8.0.5-4+deb7u20:27.0.1453.110-1~deb7u10:9.0-10+deb70.30:17.0.10-1~deb7u10:9.1.9-0wheezy10:0.8.8a+dfsg-5+deb7u20:0.8.7g-1+squeeze30:0.16.4-1+deb6u10:0.26.0-4+deb7u10:1.4-3~deb7u20:2.0.19-2+deb7u10:2.0.14-2+squeeze20:2.7.8.dfsg-2+squeeze80:2.8.0+dfsg1-7+nmu22:1.0.6-1+deb7u12:1.0.4-1+squeeze0:17.0.7esr-1~deb7u10:1.2.3-3+squeeze80:1.4.5-1+deb7u40:1.2.1-2.2+wheezy20:2.4.16+dfsg-1+deb7u10:2.4.8+dfsg-9squeeze20:28.0.1500.71-1~deb7u12:1.0.5-1+squeeze12:1.0.7-1+deb7u10:4.0.1-5.110:4.1.4-3+deb7u18:6.7.7.10-5+deb7u20:3.1.7+dfsg1-8+deb7u20:1.9.3-5wheezy10:1.9.2-4squeeze12:1.1.2-1+squeeze12:1.3.1-2+deb7u10:1.2.11-6+squeeze130:1.8.2-5wheezy71:2.3.6-1.2+deb7u11:2.3.6-1+squeeze20:1.6.1-5+deb7u10:1.5.1-3+squeeze20:3.9.4-5+squeeze90:4.0.2-6+deb7u10:1.2.9-1~deb6u10:1.2.9-1~deb7u10:1.3+dfsg-4+squeeze20:1.3+dfsg-4.70:4.4.1-5.40:4.5.2-1.5+deb7u20:17.0.7-1~deb7u10:1.3.4a-5+deb7u10:1.3.3a-6squeeze70:9.0-10+deb70.10:8.0.5-4+deb7u10:7.7.1-60:29.0.1547.57-1~deb7u10:44-11+deb7u41:1.1.3-1+deb7u11:1.0.7-1+squeeze12:1.3.2-2+deb7u12:1.3.0-3+squeeze10:17.0.10esr-1~deb7u10:4.8.1.1-12+deb7u10:4.4.1-8+squeeze20:7.21.0-2.1+squeeze50:7.26.0-1+wheezy50:1.4.5-1+deb7u20:1.8.7.358-7.1+deb7u10:1.8.7.302-2squeeze20:3.0.7-PL1-4+squeeze10:3.0.10-4+deb7u10:0.9.12-11+deb7u40:1.8.2-5wheezy32:1.1.1-2+squeeze12:1.1.3-2+deb7u10:0.99.22.4-1+wheezy10:0.99.20.1-0+squeeze50:2.1.17-1+deb7u20:2.1.1-3squeeze71:3.2-4~deb7u41:2.9.16-8+squeeze11:5.0-4+deb7u11:4.0.5-1+squeeze10:17.0.9esr-1~deb7u10:1.4.12-7+deb7u20:1.4.10-4+squeeze30:0.16.5-1+deb7u10:0.9.15-1+squeeze20:0.8.8a+dfsg-5+deb7u10:0.8.7g-1+squeeze20:3.2.46-1+deb7u10:17.0.9-1~deb7u10:1.2.11-6+squeeze120:1.8.2-5wheezy60:1.11-1+deb7u10:2.4.16+dfsg-1+deb7u20:2.4.8+dfsg-9squeeze30:7.14-2+deb7u10:30.0.1599.101-1~deb7u10:4.5.19+dfsg1-5+wheezy10:3.1.7+dfsg1-8+deb7u10:1.9.2.0-2+deb6u20:1.9.3.194-8.1+deb7u21:1.19.5-1+deb7u11:1.15.5-2squeeze60:3.6.1+dfsg-1~deb6u10:3.6.1+dfsg-1~deb7u10:0.13-2+deb7u10:0.10-1+squeeze10:1.6.1-1+deb6u10:2.2.3-1+deb7u10:31.0.1650.57-1~deb7u10:2.1.17-1+deb7u10:2.1.1-3squeeze60:1.6-1+squeeze10:1.8.1-2+deb7u10:1.4.6-1.1+deb7u10:1.4.6-1.1+squeeze10:9.0-10+deb70.20:1.24-3+squeeze10:1.24-3.1+deb7u20:2.6-4+deb7u10:2.1.0-2+squeeze20:3.5.2+dfsg-1~deb6u10:3.5.2+dfsg-1~deb7u10:0.8.6-3wheezy20:0.8.4-3+squeeze20:1.1.22+dfsg-4+squeeze10:1.1.22+dfsg-4+wheezy11:1.1.2-1+deb7u11:1.1.0-2+squeeze12:3.14.4-12:1.7.7-172:1.12.4-6+deb7u10:2.7.23-1~deb7u10:7u25-2.3.10-1~deb7u10:2.7-1+deb7u10:2.3~pre1-1+squeeze20:2.1.10-4+deb7u10:2.1.5-3+squeeze20:0.7.2-9+deb7u12:3.14.5-10:3.12.8-1+squeeze70:3.1.7+dfsg1-8+deb7u30:2.4.9+dfsg1-3+squeeze40:17.0.8esr-1~deb7u10:5.4.4-14+deb7u30:5.3.3-7+squeeze160:1.2.5-2+squeeze10:1.2.5-2.3+deb7u11:0.8.8.1-1+squeeze2+git201308281:0.8.8.4-3+deb7u1+git201308280:6b27-1.12.6-1~deb6u10:6b27-1.12.6-1~deb7u10:3.9.4-5+squeeze100:4.0.2-6+deb7u20:1.5.0-5+deb7u10:1.4.5-2+squeeze10:1.4.12-7+deb7u10:1.4.10-4+squeeze20:1.8.2-5wheezy50:1.2.11-6+squeeze110:1.4.5-1+deb7u30:1.2.3-3+squeeze70:1.4.8-2+deb7u10:5.4.4-14+deb7u40:5.3.3-7+squeeze170:28.0.1500.95-1~deb7u10:1.9.3.194-8.1+deb7u10:1.9.2.0-2+deb6u11:9.8.4.dfsg.P1-6+nmu2+deb7u11:9.7.3.dfsg-1~squeeze110:6.0.35-1+squeeze30:6.0.35-6+deb7u11:1.1.2-1+deb7u11:1.1.0-2+squeeze10:1.6.1-3+deb7u10:1.4.12.1+dfsg-4+squeeze22:1.0.4-1+deb7u12:1.0.2-1+squeeze10:27.0.1453.93-1~deb7u11:1.6.2.9-2+squeeze111:1.8.13.1~dfsg-3+deb7u10:4.0.7-5+deb7u20:1.6.12dfsg-70:1.6.17dfsg-4+deb7u32:1.3-82:1.6.1-1+deb7u10:1.8.2-5wheezy40:2.6.2-5+squeeze80:2.7.18-50:3.2.41-2+deb7u20:2.12.20-70:0.8.5-5+deb7u20:0.8.1-3+deb6u20:5.5.31+dfsg-0+wheezy10:1.8.3+dfsg-4squeeze70:1.10.1+dfsg-5+deb7u12:1.2.1-1+deb7u12:1.1.0-3+squeeze12:1.0.7-1+deb7u12:1.0.5-1+squeeze10:1.2.1-2.2+wheezy12:1.3.3-4+squeeze12:1.5.0-1+deb7u10:1.6.8-1+deb7u11:1.0.1-2+deb7u11:1.0.0.xsf1-2+squeeze11:1.1.10-2+squeeze11:1.1.13-1+deb7u11:0.9.6-1+squeeze11:0.9.7-1+deb7u10:7.26.0-1+wheezy30:7.21.0-2.1+squeeze40:0.62-9+deb7u10:0.60+2010-02-20-1+squeeze20:1.4.5-1+deb7u10:1.2.3-3+squeeze60:1.5.1-3+squeeze30:1.6.1-5+deb7u20:4.4.1-5.30:4.5.2-1.5+deb7u10:17.0.8-1~deb7u10:2.2-4+deb7u12:1.1.2-1+deb7u12:1.1-3+squeeze16.01:0.2.904+svn842-2+squeeze11:0.2.906-2+deb7u1Debian GNU/LinuxDebian GNU/kFreeBSD70:17.0.6esr-1~deb7u1