Several security issues have been found in the server components of the
version control system subversion.
Category Archives: Debian
Debian Security Advisories
DSA-3329 linux – security update
Several vulnerabilities have been discovered in the Linux kernel
that may lead to a privilege escalation, denial of service or
information leak.
DSA-3330 activemq – security update
It was discovered that the Apache ActiveMQ message broker is susceptible
to denial of service through an undocumented, remote shutdown command.
DSA-3328 wordpress – security update
Several vulnerabilities have been found in WordPress, the popular
blogging engine.
DSA-3327 squid3 – security update
Alex Rousskov of The Measurement Factory discovered that Squid3, a fully
featured web proxy cache, does not correctly handle CONNECT method peer
responses when configured with cache_peer and operating on explicit
proxy traffic. This could allow remote clients to gain unrestricted
access through a gateway proxy to its backend proxy.
DSA-3326 ghostscript – security update
William Robinet and Stefan Cornelius discovered an integer overflow in
Ghostscript, the GPL PostScript/PDF interpreter, which may result in
denial of service or potentially execution of arbitrary code if a
specially crafted file is opened.
DSA-3323 icu – security update
Several vulnerabilities were discovered in the International Components
for Unicode (ICU) library.
DSA-3325 apache2 – security update
Several vulnerabilities have been found in the Apache HTTPD server.
DSA-3324 icedove – security update
Multiple security issues have been found in Icedove, Debian’s version
of the Mozilla Thunderbird mail client: multiple memory safety errors,
use-after-frees and other implementation errors may lead to the
execution of arbitrary code or denial of service. This update also
addresses a vulnerability in DHE key processing commonly known as
the LogJam
vulnerability.
DSA-3322 ruby-rack – security update
Tomek Rabczak from the NCC Group discovered a flaw in the
normalize_params() method in Rack, a modular Ruby webserver interface.
A remote attacker can use this flaw via specially crafted requests to
cause a `SystemStackError` and potentially cause a denial of service
condition for the service.