Debian 10228 Published by

The following Debian security updates are available:

[DSA 2871-1] wireshark security update
[DSA 2872-1] udisks security update



[DSA 2871-1] wireshark security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2871-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 10, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : wireshark
CVE ID : CVE-2014-2281 CVE-2014-2283 CVE-2014-2299

Multiple vulnerabilities were discovered in Wireshark:

CVE-2014-2281

Moshe Kaplan discovered that the NFS dissector could be crashed,
resulting in denial of service.

CVE-2014-2283

It was discovered that the RLC dissector could be crashed, resulting
in denial of service.

CVE-2014-2299

Wesley Neelen discovered a buffer overflow in the MPEG file parser,
which could lead to the execution of arbitrary code.

For the oldstable distribution (squeeze), these problems have been fixed in
version 1.2.11-6+squeeze14.

For the stable distribution (wheezy), these problems have been fixed in
version 1.8.2-5wheezy10.

For the unstable distribution (sid), these problems have been fixed in
version 1.10.6-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

[DSA 2872-1] udisks security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2872-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 10, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : udisks
CVE ID : CVE-2014-0004

Florian Weimer discovered a buffer overflow in udisks's mount path
parsing code which may result in privilege escalation.

For the oldstable distribution (squeeze), this problem has been fixed in
version 1.0.1+git20100614-3squeeze1.

For the stable distribution (wheezy), this problem has been fixed in
version 1.0.4-7wheezy1.

For the unstable distribution (sid), this problem has been fixed in
version 1.0.5-1.

We recommend that you upgrade your udisks packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/