Stephane Chazelas discovered a bug in the environment handling in Perl.
Perl provides a Perl-space hash variable, %ENV, in which environment
variables can be looked up. If a variable appears twice in envp, only
the last value would appear in %ENV, but getenv would return the first.
Perl’s taint security mechanism would be applied to the value in %ENV,
but not to the other rest of the environment. This could result in an
ambiguous environment causing environment variables to be propagated to
subprocesses, despite the protections supposedly offered by taint
checking.
Category Archives: Debian
Debian Security Advisories
DSA-3500 openssl – security update
Several vulnerabilities were discovered in OpenSSL, a Secure Socket Layer
toolkit.
DSA-3495 xymon – security update
Markus Krell discovered that xymon, a network- and
applications-monitoring system, was vulnerable to the following
security issues:
DSA-3496 php-horde-core – security update
It was discovered that php-horde-core, a set of classes providing the
core functionality of the Horde Application Framework, is prone to a
cross-site scripting vulnerability.
DSA-3498 drupal7 – security update
Multiple security vulnerabilities have been found in the Drupal content
management framework. For additional information, please refer to the
upstream advisory at
DSA-3499 pillow – security update
Multiple security vulnerabilities have been found in Pillow, a Python
imaging library, which may result in denial of service or the execution
of arbitrary code if a malformed FLI, PCD or Tiff files is processed.
DSA-3497 php-horde – security update
It was discovered that php-horde, a flexible, modular, general-purpose
web application framework written in PHP, is prone to a cross-site
scripting vulnerability.
DSA-3494 cacti – security update
Two SQL injection vulnerabilities were discovered in cacti, a web
interface for graphing of monitoring systems. Specially crafted input
can be used by an attacker in parameters of the graphs_new.php script to
execute arbitrary SQL commands on the database.
DSA-3493 xerces-c – security update
Gustavo Grieco discovered that xerces-c, a validating XML parser library
for C++, mishandles certain kinds of malformed input documents,
resulting in buffer overflows during processing and error reporting.
These flaws could lead to a denial of service in applications using the
xerces-c library, or potentially, to the execution of arbitrary code.
DSA-3492 gajim – security update
Daniel Gultsch discovered a vulnerability in Gajim, an XMPP/jabber
client. Gajim didn’t verify the origin of roster update, allowing an
attacker to spoof them and potentially allowing her to intercept messages.