The following Debian security updates are available:
[DSA 2871-1] wireshark security update
[DSA 2872-1] udisks security update
[DSA 2871-1] wireshark security update
[DSA 2872-1] udisks security update
[DSA 2871-1] wireshark security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2871-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 10, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : wireshark
CVE ID : CVE-2014-2281 CVE-2014-2283 CVE-2014-2299
Multiple vulnerabilities were discovered in Wireshark:
CVE-2014-2281
Moshe Kaplan discovered that the NFS dissector could be crashed,
resulting in denial of service.
CVE-2014-2283
It was discovered that the RLC dissector could be crashed, resulting
in denial of service.
CVE-2014-2299
Wesley Neelen discovered a buffer overflow in the MPEG file parser,
which could lead to the execution of arbitrary code.
For the oldstable distribution (squeeze), these problems have been fixed in
version 1.2.11-6+squeeze14.
For the stable distribution (wheezy), these problems have been fixed in
version 1.8.2-5wheezy10.
For the unstable distribution (sid), these problems have been fixed in
version 1.10.6-1.
We recommend that you upgrade your wireshark packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
[DSA 2872-1] udisks security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2872-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 10, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : udisks
CVE ID : CVE-2014-0004
Florian Weimer discovered a buffer overflow in udisks's mount path
parsing code which may result in privilege escalation.
For the oldstable distribution (squeeze), this problem has been fixed in
version 1.0.1+git20100614-3squeeze1.
For the stable distribution (wheezy), this problem has been fixed in
version 1.0.4-7wheezy1.
For the unstable distribution (sid), this problem has been fixed in
version 1.0.5-1.
We recommend that you upgrade your udisks packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/