[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Should we be alarmed at our state of security support?

Hi folks,

So I recently downloaded and installed debsecan on several of my
machines.  These are all fully up-to-date machines, running either
wheezy or jessie.  For now I'll just focus on wheezy since it's where
our security focus should go.

On this machine, it found 472 vulnerabilities.  Quite a few of them fit
into the remotely exploitable, high urgency category.  Many date back to
last year, some as far back as 2012.  I've included a few examples at
the end.

Now, it is possible with some of these that the security-tracker
database ought to be updated to reflect that there is not a true
vulnerability.  However, many of them seem to be existing issues that
just got forgotten somehow.  I've traced a few through bug reports and such.

I wonder:

Are we already aware of these issues?

Do we have plans to fix them?

Do we know what would be helpful to fix them?



CVE-2013-1961 Stack-based buffer overflow in the t2p_write_pdf_page...
  - libtiff4 (remotely exploitable, high urgency)

CVE-2014-1912 Buffer overflow in the socket.recvfrom_into function...
  - python2.6, python2.6-minimal (remotely exploitable, high urgency)

CVE-2014-9656 The tt_sbit_decoder_load_image function in...
  - libfreetype6 (remotely exploitable, high urgency)

CVE-2015-0231 Use-after-free vulnerability in the...
  - php5-cgi, php5-gd, php-pear, php5-curl, php5-common, php5-pspell,
    php5-mcrypt, php5-cli, php5, php5-ldap, php5-imap, php5-mysql,
    php5-intl (remotely exploitable, high urgency)

CVE-2015-1462 ClamAV before 0.98.6 allows remote attackers to have...
  - clamav, libclamav6, clamav-freshclam, clamav-base, clamav-daemon
    (remotely exploitable, high urgency)

CVE-2010-5312 Cross-site scripting (XSS) vulnerability in...
  - libjs-jquery-ui (remotely exploitable, medium urgency)

Reply to: