Category Archives: Debian

Debian Security Advisories

DSA-3360 icu – security update

It was discovered that the International Components for Unicode (ICU)
library mishandles converter names starting with x-, which allows
remote attackers to cause a denial of service (read of uninitialized
memory) or possibly have unspecified other impact via a crafted file.

DSA-3359 virtualbox – security update

This update fixes an unspecified security issue in VirtualBox related to
guests using bridged networking via WiFi. Oracle no longer provides
information on specific security vulnerabilities in VirtualBox. To still
support users of the already released Debian releases we’ve decided to
update these to the respective 4.1.40 and 4.3.30 bugfix releases.

DSA-3357 vzctl – security update

It was discovered that vzctl, a set of control tools for the OpenVZ
server virtualisation solution, determined the storage layout of
containers based on the presence of an XML file inside the container.
An attacker with local root privileges in a simfs-based container
could gain control over ploop-based containers. Further information on
the prerequisites of such an attack can be found at
src.openvz.org.

DSA-3356 openldap – security update

Denis Andzakovic discovered that OpenLDAP, a free implementation of the
Lightweight Directory Access Protocol, does not properly handle BER
data. An unauthenticated remote attacker can use this flaw to cause a
denial of service (slapd daemon crash) via a specially crafted packet.

DSA-3354 spice – security update

Frediano Ziglio of Red Hat discovered a race condition flaw in spice’s
worker_update_monitors_config() function, leading to a heap-based memory
corruption. A malicious user in a guest can take advantage of this flaw
to cause a denial of service (QEMU process crash) or, potentially
execute arbitrary code on the host with the privileges of the hosting
QEMU process.