Several vulnerabilities were discovered in the International Components
for Unicode (ICU) library.
Category Archives: Debian
Debian Security Advisories
DSA-3189 libav – security update
Several security issues have been corrected in multiple demuxers and
decoders of the libav multimedia library. A full list of the changes is
available at
DSA-3190 putty – security update
Patrick Coleman discovered that the Putty SSH client failed to wipe out
unused sensitive memory.
DSA-3186 nss – security update
It was discovered that the Mozilla Network Security Service library
(nss) incorrectly handled certain ASN.1 lengths. A remote attacker could
possibly use this issue to perform a data-smuggling attack.
DSA-3183 movabletype-opensource – security update
Multiple vulnerabilities have been discovered in Movable Type, a
blogging system. The Common Vulnerabilities and Exposures project
identifies the following problems:
DSA-3185 libgcrypt11 – security update
Multiple vulnerabilities were discovered in libgcrypt:
DSA-3184 gnupg – security update
Multiple vulnerabilities were discovered in GnuPG, the GNU Privacy Guard:
DSA-3182 libssh2 – security update
Mariusz Ziulek reported that libssh2, a SSH2 client-side library, was
reading and using the SSH_MSG_KEXINIT packet without doing sufficient
range checks when negotiating a new SSH session with a remote server. A
malicious attacker could man in the middle a real server and cause a
client using the libssh2 library to crash (denial of service) or
otherwise read and use unintended memory areas in this process.
DSA-3177 mod-gnutls – security update
Thomas Klute discovered that in mod-gnutls, an Apache module providing
SSL and TLS encryption with GnuTLS, a bug caused the server’s client
verify mode not to be considered at all, in case the directory’s
configuration was unset. Clients with invalid certificates were then
able to leverage this flaw in order to get access to that directory.
DSA-3181 xen – security update
Multiple security issues have been found in the Xen virtualisation
solution: