<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="dsa-rdf.css" type="text/css"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xml:lang="de">
<channel rdf:about="https://www.debian.org/security/dsa.rdf">
  <title>Debian-Sicherheit</title>
  <link>http://security.debian.org/</link>
  <description>
Debian-Sicherheitsankündigung
  </description>
  <dc:date>2017-06-20T19:56:12+00:00</dc:date>
  <items>
    <rdf:Seq>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3889"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3888"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3887"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3886"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3885"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3884"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3883"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3882"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3881"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3880"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3879"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3878"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3877"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3876"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3875"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3874"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3873"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3872"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3871"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3870"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3869"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3868"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3867"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3866"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3865"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3864"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3863"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3862"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3861"/>
<rdf:li resource="https://www.debian.org/security/2017/dsa-3860"/>
    </rdf:Seq>
  </items>
</channel>
<item rdf:about="https://www.debian.org/security/2017/dsa-3889">
  <title>DSA-3889 libffi - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3889</link>
  <description>
&lt;p&gt;libffi, a library used to call code written in one language from code written
in a different language, was enforcing an executable stack on the i386
architecture. While this might not be considered a vulnerability by itself,
this could be leveraged when exploiting other vulnerabilities, like for example
the &lt;q&gt;stack clash&lt;/q&gt; class of vulnerabilities discovered by Qualys Research Labs.
For the full details, please refer to their advisory published at:
&lt;a href="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"&gt;https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt&lt;/a&gt;&lt;/p&gt;
  </description>
  <dc:date>2017-06-19</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3888">
  <title>DSA-3888 exim4 - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3888</link>
  <description>
&lt;p&gt;The Qualys Research Labs discovered a memory leak in the Exim mail
transport agent. This is not a security vulnerability in Exim by itself,
but can be used to exploit a vulnerability in stack handling. For the
full details, please refer to their advisory published at:
&lt;a href="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"&gt;https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt&lt;/a&gt;&lt;/p&gt;
  </description>
  <dc:date>2017-06-19</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3887">
  <title>DSA-3887 glibc - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3887</link>
  <description>
&lt;p&gt;The Qualys Research Labs discovered various problems in the dynamic
linker of the GNU C Library which allow local privilege escalation by
clashing the stack. For the full details, please refer to their advisory
published at:
&lt;a href="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"&gt;https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt&lt;/a&gt;&lt;/p&gt;
  </description>
  <dc:date>2017-06-19</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3886">
  <title>DSA-3886 linux - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3886</link>
  <description>
&lt;p&gt;Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.&lt;/p&gt;
  </description>
  <dc:date>2017-06-19</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3885">
  <title>DSA-3885 irssi - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3885</link>
  <description>
&lt;p&gt;Multiple vulnerabilities have been discovered in Irssi, a terminal based
IRC client. The Common Vulnerabilities and Exposures project identifies
the following problems:&lt;/p&gt;
  </description>
  <dc:date>2017-06-18</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3884">
  <title>DSA-3884 gnutls28 - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3884</link>
  <description>
&lt;p&gt;Hubert Kario discovered that GnuTLS, a library implementing the TLS and
SSL protocols, does not properly decode a status response TLS extension,
allowing a remote attacker to cause an application using the GnuTLS
library to crash (denial of service).&lt;/p&gt;
  </description>
  <dc:date>2017-06-16</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3883">
  <title>DSA-3883 rt-authen-externalauth - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3883</link>
  <description>
&lt;p&gt;It was discovered that RT::Authen::ExternalAuth, an external
authentication module for Request Tracker, is vulnerable to timing
side-channel attacks for user passwords. Only ExternalAuth in DBI
(database) mode is vulnerable.&lt;/p&gt;
  </description>
  <dc:date>2017-06-15</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3882">
  <title>DSA-3882 request-tracker4 - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3882</link>
  <description>
&lt;p&gt;Multiple vulnerabilities have been discovered in Request Tracker, an
extensible trouble-ticket tracking system. The Common Vulnerabilities
and Exposures project identifies the following problems:&lt;/p&gt;
  </description>
  <dc:date>2017-06-15</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3881">
  <title>DSA-3881 firefox-esr - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3881</link>
  <description>
&lt;p&gt;Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees, buffer overflows
and other implementation errors may lead to the execution of arbitrary
code, denial of service or domain spoofing.&lt;/p&gt;
  </description>
  <dc:date>2017-06-14</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3880">
  <title>DSA-3880 libgcrypt20 - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3880</link>
  <description>
&lt;p&gt;It was discovered that a side channel attack in the EdDSA session key
handling in Libgcrypt may result in information disclosure.&lt;/p&gt;
  </description>
  <dc:date>2017-06-14</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3879">
  <title>DSA-3879 libosip2 - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3879</link>
  <description>
&lt;p&gt;Multiple security vulnerabilities have been found in oSIP, a library
implementing the Session Initiation Protocol, which might result in
denial of service through malformed SIP messages.&lt;/p&gt;
  </description>
  <dc:date>2017-06-13</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3878">
  <title>DSA-3878 zziplib - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3878</link>
  <description>
&lt;p&gt;Agostino Sarubbo discovered multiple vulnerabilities in zziplib, a
library to access Zip archives, which could result in denial of service
and potentially the execution of arbitrary code if a malformed archive
is processed.&lt;/p&gt;
  </description>
  <dc:date>2017-06-12</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3877">
  <title>DSA-3877 tor - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3877</link>
  <description>
&lt;p&gt;It has been discovered that Tor, a connection-based low-latency
anonymous communication system, contain a flaw in the hidden service
code when receiving a BEGIN_DIR cell on a hidden service rendezvous
circuit. A remote attacker can take advantage of this flaw to cause a
hidden service to crash with an assertion failure (TROVE-2017-005).&lt;/p&gt;
  </description>
  <dc:date>2017-06-10</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3876">
  <title>DSA-3876 otrs2 - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3876</link>
  <description>
&lt;p&gt;Joerg-Thomas Vogt discovered that the SecureMode was insufficiently
validated in the OTRS ticket system, which could allow agents to
escalate their privileges.&lt;/p&gt;
  </description>
  <dc:date>2017-06-09</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3875">
  <title>DSA-3875 libmwaw - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3875</link>
  <description>
&lt;p&gt;It was discovered that a buffer overflow in libmwaw, a library to open
old Mac text documents might result in the execution of arbitrary code
if a malformed document is opened.&lt;/p&gt;
  </description>
  <dc:date>2017-06-09</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3874">
  <title>DSA-3874 ettercap - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3874</link>
  <description>
&lt;p&gt;Agostino Sarubbo and AromalUllas discovered that ettercap, a network
security tool for traffic interception, contains vulnerabilities that
allowed an attacker able to provide maliciously crafted filters to
cause a denial-of-service via application crash.&lt;/p&gt;
  </description>
  <dc:date>2017-06-09</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3873">
  <title>DSA-3873 perl - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3873</link>
  <description>
&lt;p&gt;The cPanel Security Team reported a time of check to time of use
(TOCTTOU) race condition flaw in File::Path, a core module from Perl to
create or remove directory trees. An attacker can take advantage of this
flaw to set the mode on an attacker-chosen file to a attacker-chosen
value.&lt;/p&gt;
  </description>
  <dc:date>2017-06-05</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3872">
  <title>DSA-3872 nss - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3872</link>
  <description>
&lt;p&gt;Several vulnerabilities were discovered in NSS, a set of cryptographic
libraries, which may result in denial of service or information
disclosure.&lt;/p&gt;
  </description>
  <dc:date>2017-06-01</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3871">
  <title>DSA-3871 zookeeper - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3871</link>
  <description>
&lt;p&gt;It was discovered that Zookeeper, a service for maintaining
configuration information, didn't restrict access to the computationally
expensive wchp/wchc commands which could result in denial of service by
elevated CPU consumption.&lt;/p&gt;
  </description>
  <dc:date>2017-06-01</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3870">
  <title>DSA-3870 wordpress - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3870</link>
  <description>
&lt;p&gt;Several vulnerabilities were discovered in wordpress, a web blogging
tool. They would allow remote attackers to force password resets, and
perform various cross-site scripting and cross-site request forgery
attacks.&lt;/p&gt;
  </description>
  <dc:date>2017-06-01</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3869">
  <title>DSA-3869 tnef - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3869</link>
  <description>
&lt;p&gt;It was discovered that tnef, a tool used to unpack MIME attachments of
type "application/ms-tnef", did not correctly validate its input. An
attacker could exploit this by tricking a user into opening a
malicious attachment, which would result in a denial-of-service by
application crash.&lt;/p&gt;
  </description>
  <dc:date>2017-06-01</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3868">
  <title>DSA-3868 openldap - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3868</link>
  <description>
&lt;p&gt;Karsten Heymann discovered that the OpenLDAP directory server can be
crashed by performing a paged search with a page size of 0, resulting in
denial of service. This vulnerability is limited to the MDB storage
backend.&lt;/p&gt;
  </description>
  <dc:date>2017-05-30</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3867">
  <title>DSA-3867 sudo - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3867</link>
  <description>
&lt;p&gt;The Qualys Security team discovered that sudo, a program designed to
provide limited super user privileges to specific users, does not
properly parse "/proc/[pid]/stat" to read the device number of the tty
from field 7 (tty_nr). A sudoers user can take advantage of this flaw on
an SELinux-enabled system to obtain full root privileges.&lt;/p&gt;
  </description>
  <dc:date>2017-05-30</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3866">
  <title>DSA-3866 strongswan - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3866</link>
  <description>
&lt;p&gt;Two denial of service vulnerabilities were identified in strongSwan, an
IKE/IPsec suite, using Google's OSS-Fuzz fuzzing project.&lt;/p&gt;
  </description>
  <dc:date>2017-05-30</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3865">
  <title>DSA-3865 mosquitto - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3865</link>
  <description>
&lt;p&gt;It was discovered that pattern-based ACLs in the Mosquitto MQTT broker
could be bypassed.&lt;/p&gt;
  </description>
  <dc:date>2017-05-29</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3864">
  <title>DSA-3864 fop - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3864</link>
  <description>
&lt;p&gt;It was discovered that an XML external entities vulnerability in the
Apache FOP XML formatter may result in information disclosure.&lt;/p&gt;
  </description>
  <dc:date>2017-05-27</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3863">
  <title>DSA-3863 imagemagick - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3863</link>
  <description>
&lt;p&gt;This update fixes several vulnerabilities in imagemagick: Various memory
handling problems and cases of missing or incomplete input sanitising
may result in denial of service, memory disclosure or the execution of
arbitrary code if malformed RLE, ART, JNG, DDS, BMP, ICO, EPT, SUN, MTV,
PICT, XWD, PCD, SFW, MAT, EXR, DCM, MNG, PCX or SVG files are processed.&lt;/p&gt;
  </description>
  <dc:date>2017-05-25</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3862">
  <title>DSA-3862 puppet - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3862</link>
  <description>
&lt;p&gt;It was discovered that unrestricted YAML deserialisation of data sent
from agents to the server in the Puppet configuration management system
could result in the execution of arbitrary code.&lt;/p&gt;
  </description>
  <dc:date>2017-05-25</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3861">
  <title>DSA-3861 libtasn1-6 - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3861</link>
  <description>
&lt;p&gt;Jakub Jirasek of Secunia Research discovered that libtasn1, a library
used to handle Abstract Syntax Notation One structures, did not
properly validate its input. This would allow an attacker to cause a
crash by denial-of-service, or potentially execute arbitrary code, by
tricking a user into processing a maliciously crafted assignments
file.&lt;/p&gt;
  </description>
  <dc:date>2017-05-24</dc:date>
</item>
<item rdf:about="https://www.debian.org/security/2017/dsa-3860">
  <title>DSA-3860 samba - security update</title>
  <link>https://www.debian.org/security/2017/dsa-3860</link>
  <description>
&lt;p&gt;steelo discovered a remote code execution vulnerability in Samba, a
SMB/CIFS file, print, and login server for Unix. A malicious client with
access to a writable share, can take advantage of this flaw by uploading
a shared library and then cause the server to load and execute it.&lt;/p&gt;
  </description>
  <dc:date>2017-05-24</dc:date>
</item>
</rdf:RDF>
