Debian Linux Security Advisory 3025-2 – The previous update for apt, DSA-3025-1, introduced a regression when file:/// sources are used and those are on a different partition than the apt state directory. This update fixes the regression.
Category Archives: Security
Security
Debian Security Advisory 3028-1
Debian Linux Security Advisory 3028-1 – Multiple security issues have been found in Icedove, Debian’s version of errors and use-after-frees may lead to the execution of arbitrary code or denial of service.
Debian Security Advisory 3027-1
Debian Linux Security Advisory 3027-1 – Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library.
Home Depot Breach Exposes A Whopping 56M Credit Cards
Google And Apple To Introduce Default Encryption
Microsoft Axes Trustworthy Computing Group
TOR Users Become FBI's No. 1 Hacking Target
M/Monit 3.2.2 Cross Site Request Forgery
M/Monit versions 3.2.2 and below suffer from multiple cross site request forgery vulnerabilities.
UFONet 0.3b
UFONet is a tool designed to launch DDoS attacks against a target, using open redirection vectors on third party web applications.
MS14-046 – Important: Vulnerability in .NET Framework Could Allow Security Feature Bypass (2984625) – Version: 1.2
Severity Rating: Important
Revision Note: V1.2 (September 19, 2014): Updated the Known Issues entry in the Knowledge Base Article section from “None” to “Yes”.
Summary: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow security feature bypass if a user visits a specially crafted website. In a web-browsing attack scenario, an attacker who successfully exploited this vulnerability could bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, that could take advantage of the ASLR bypass to run arbitrary code.