Multiple security issues have been found in the Xen virtualisation
solution:
Category Archives: Debian
Debian Security Advisories
DSA-3283 cups – security update
It was discovered that CUPS, the Common UNIX Printing System, is
vulnerable to a remotely triggerable privilege escalation via cross-site
scripting and bad print job submission used to replace cupsd.conf on the
CUPS server.
DSA-3282 strongswan – security update
Alexander E. Patrakov discovered an issue in strongSwan, an IKE/IPsec
suite used to establish IPsec protected links.
DSA-3280 php5 – security update
Multiple vulnerabilities have been discovered in PHP:
DSA-3281 – Debian Security Team PGP/GPG key change notice
This is a notice that the Debian Security Team has changed its PGP/GPG
contact key because of a periodic regular key rollover.
DSA-3279 redis – security update
It was discovered that redis, a persistent key-value database, could
execute insecure Lua bytecode by way of the EVAL command. This could
allow remote attackers to break out of the Lua sandbox and execute
arbitrary code.
DSA-3278 libapache-mod-jk – security update
An information disclosure flaw due to incorrect JkMount/JkUnmount
directives processing was found in the Apache 2 module mod_jk to forward
requests from the Apache web server to Tomcat. A JkUnmount rule for a
subtree of a previous JkMount rule could be ignored. This could allow a
remote attacker to potentially access a private artifact in a tree that
would otherwise not be accessible to them.
DSA-3277 wireshark – security update
Multiple vulnerabilities were discovered in the dissectors/parsers for
LBMR, web sockets, WCP, X11, IEEE 802.11 and Android Logcat, which could
result in denial of service.
DSA-3276 symfony – security update
Jakub Zalas discovered that Symfony, a framework to create websites and
web applications, was vulnerable to restriction bypass. It was
affecting applications with ESI or SSI support enabled, that use the
FragmentListener. A malicious user could call any controller via the
/_fragment path by providing an invalid hash in the URL (or removing
it), bypassing URL signing and security rules.
DSA-3275 fusionforge – security update
Ansgar Burchardt discovered that the Git plugin for FusionForge, a
web-based project-management and collaboration software, does not
sufficiently validate user provided input as parameter to the method to
create secondary Git repositories. A remote attacker can use this flaw
to execute arbitrary code as root via a specially crafted URL.