Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Debian GNU/Linux 3.1

This vulnerability report for Debian GNU/Linux 3.1 contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Debian GNU/Linux 3.1 then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Debian

Product Link View Here (Link to external site)

Affected By 639 Secunia advisories
1712 Vulnerabilities

Monitor Product Receive alerts for this product





45 Secunia Advisories in 2008

Secunia has issued a total of 45 Secunia advisories in 2008 for Debian GNU/Linux 3.1. Currently, 2% (1 out of 45) are marked as unpatched with the most severe being rated Moderately critical

More information about the specific Secunia advisories affecting Debian GNU/Linux 3.1 can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Debian update for openoffice.org
Vendor Patch. Secunia Advisory 1 of 45 in 2008. 7,234 views.
Release Date:
2008-04-17
Secunia Advisory ID:
SA29864
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for xine-lib
Vendor Patch. Secunia Advisory 2 of 45 in 2008. 6,199 views.
Release Date:
2008-04-01
Secunia Advisory ID:
SA29601
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xine-lib. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for exiftags
Vendor Patch. Secunia Advisory 3 of 45 in 2008. 6,179 views.
Release Date:
2008-03-28
Secunia Advisory ID:
SA29580
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for exiftags. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian firebird2 Multiple Vulnerabilities
Unpatched. Secunia Advisory 4 of 45 in 2008. 8,169 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29501
Solution Status:
Unpatched
Criticality:
Impact:
Unknown
Exposure of sensitive information
DoS
System access
Where:
From local network
Short Description:
Debian has acknowledged some vulnerabilities in firebird2, where some have unknown impact and others can be exploited by malicious users to disclose potentially sensitive information or to cause a DoS (Denial of Service) and by malicious people to cause a DoS or potentially to compromise a vulnerable system. [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 5 of 45 in 2008. 4,554 views.
Release Date:
2008-03-19
Secunia Advisory ID:
SA29435
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


Debian update for unzip
Vendor Patch. Secunia Advisory 6 of 45 in 2008. 5,620 views.
Release Date:
2008-03-18
Secunia Advisory ID:
SA29432
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for unzip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 7 of 45 in 2008. 5,861 views.
Release Date:
2008-03-17
Secunia Advisory ID:
SA29400
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes a vulnerability, which can be exploited by malicious users to disclose sensitive information and potentially compromise a vulnerable system. [Read More]


Debian update for smarty
Vendor Patch. Secunia Advisory 8 of 45 in 2008. 5,267 views.
Release Date:
2008-03-17
Secunia Advisory ID:
SA29405
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for smarty. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for backup-manager
Vendor Patch. Secunia Advisory 9 of 45 in 2008. 5,487 views.
Release Date:
2008-03-17
Secunia Advisory ID:
SA29377
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for backup-manager. This fixes a security issue, which can be exploited by malicious, local users to disclose sensitive information. [Read More]


Debian update for dovecot
Partial Fix. Secunia Advisory 10 of 45 in 2008. 5,326 views.
Release Date:
2008-03-17
Secunia Advisory ID:
SA29385
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for dovecot. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for libnet-dns-perl
Vendor Patch. Secunia Advisory 11 of 45 in 2008. 5,508 views.
Release Date:
2008-03-12
Secunia Advisory ID:
SA29354
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
DoS
Where:
From remote
Short Description:
Debian has issued an update for libnet-dns-perl. This fixes some vulnerabilities, which can be exploited by malicious people to poison the DNS cache or to cause a DoS (Denial of Service). [Read More]


Debian update for moin
Partial Fix. Secunia Advisory 12 of 45 in 2008. 5,298 views.
Release Date:
2008-03-10
Secunia Advisory ID:
SA29262
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass security restrictions, manipulate certain data, or potentially compromise a vulnerable system. [Read More]


Debian update for evolution
Vendor Patch. Secunia Advisory 13 of 45 in 2008. 4,982 views.
Release Date:
2008-03-06
Secunia Advisory ID:
SA29244
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for ghostscript
Vendor Patch. Secunia Advisory 14 of 45 in 2008. 5,589 views.
Release Date:
2008-02-28
Secunia Advisory ID:
SA29135
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for koffice
Partial Fix. Secunia Advisory 15 of 45 in 2008. 6,011 views.
Release Date:
2008-02-26
Secunia Advisory ID:
SA29104
Solution Status:
Partial Fix
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for koffice. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for diatheke
Vendor Patch. Secunia Advisory 16 of 45 in 2008. 6,075 views.
Release Date:
2008-02-26
Secunia Advisory ID:
SA25400
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for diatheke. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for kernel
Vendor Patch. Secunia Advisory 17 of 45 in 2008. 6,720 views.
Release Date:
2008-02-25
Secunia Advisory ID:
SA29058
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for kernel-2.4.27 and kernel-2.6.8. This fixes some weaknesses, security issues, and vulnerabilities, where one has an unknown impact, and others can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, bypass certain security restrictions, and gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Debian update for turba2
Vendor Patch. Secunia Advisory 18 of 45 in 2008. 5,258 views.
Release Date:
2008-02-25
Secunia Advisory ID:
SA29071
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for turba2. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Debian update for alsa-driver
Vendor Patch. Secunia Advisory 19 of 45 in 2008. 5,019 views.
Release Date:
2008-02-25
Secunia Advisory ID:
SA29054
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for alsa-driver. This fixes a vulnerability, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Debian update for pcre3
Vendor Patch. Secunia Advisory 20 of 45 in 2008. 5,344 views.
Release Date:
2008-02-20
Secunia Advisory ID:
SA28957
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pcre3. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for nagios-plugins
Vendor Patch. Secunia Advisory 21 of 45 in 2008. 5,956 views.
Release Date:
2008-02-13
Secunia Advisory ID:
SA28930
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for nagios-plugins. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


Debian update for tk8.4
Vendor Patch. Secunia Advisory 22 of 45 in 2008. 4,739 views.
Release Date:
2008-02-11
Secunia Advisory ID:
SA28867
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tk8.4. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for tk8.3
Vendor Patch. Secunia Advisory 23 of 45 in 2008. 4,959 views.
Release Date:
2008-02-11
Secunia Advisory ID:
SA28857
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tk8.3. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for sdl-image1.2
Vendor Patch. Secunia Advisory 24 of 45 in 2008. 5,387 views.
Release Date:
2008-02-11
Secunia Advisory ID:
SA28837
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for sdl-image1.2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for phpbb2
Vendor Patch. Secunia Advisory 25 of 45 in 2008. 15,002 views.
Release Date:
2008-02-11
Secunia Advisory ID:
SA28871
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for phpbb2. This fixes some vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


Debian update for libexif
Vendor Patch. Secunia Advisory 26 of 45 in 2008. 4,867 views.
Release Date:
2008-02-11
Secunia Advisory ID:
SA28776
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libexif. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for squid
Partial Fix. Secunia Advisory 27 of 45 in 2008. 12,106 views.
Release Date:
2008-02-06
Secunia Advisory ID:
SA28814
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for xine-lib
Vendor Patch. Secunia Advisory 28 of 45 in 2008. 6,722 views.
Release Date:
2008-01-22
Secunia Advisory ID:
SA28507
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xine-lib. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for scponly
Vendor Patch. Secunia Advisory 29 of 45 in 2008. 16,254 views.
Release Date:
2008-01-22
Secunia Advisory ID:
SA28538
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issued an update for scponly. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Debian update for libvorbis
Vendor Patch. Secunia Advisory 30 of 45 in 2008. 7,802 views.
Release Date:
2008-01-22
Secunia Advisory ID:
SA28614
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libvorbis. This fixes some vulnerabilties, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for mantis
Vendor Patch. Secunia Advisory 31 of 45 in 2008. 6,103 views.
Release Date:
2008-01-21
Secunia Advisory ID:
SA28551
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mantis. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks, and a security issue, which can be exploited by malicious people to disclose sensitive information. [Read More]


Debian update for flac
Vendor Patch. Secunia Advisory 32 of 45 in 2008. 4,984 views.
Release Date:
2008-01-21
Secunia Advisory ID:
SA28548
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for flac. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for xorg-server
Vendor Patch. Secunia Advisory 33 of 45 in 2008. 8,714 views.
Release Date:
2008-01-18
Secunia Advisory ID:
SA28539
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for xorg-server. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information or to gain escalated privileges. [Read More]


Debian update for gforge
Vendor Patch. Secunia Advisory 34 of 45 in 2008. 6,280 views.
Release Date:
2008-01-15
Secunia Advisory ID:
SA28451
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for gforge. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for postgresql-7.4
Vendor Patch. Secunia Advisory 35 of 45 in 2008. 6,785 views.
Release Date:
2008-01-15
Secunia Advisory ID:
SA28479
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
Debian has issued an update for postgresql-7.4. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges or to cause a DoS (Denial of Service). [Read More]


Debian update for libxml2
Vendor Patch. Secunia Advisory 36 of 45 in 2008. 5,377 views.
Release Date:
2008-01-14
Secunia Advisory ID:
SA28452
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for openafs
Vendor Patch. Secunia Advisory 37 of 45 in 2008. 6,117 views.
Release Date:
2008-01-11
Secunia Advisory ID:
SA28433
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for openafs. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for freetype
Partial Fix. Secunia Advisory 38 of 45 in 2008. 7,002 views.
Release Date:
2008-01-08
Secunia Advisory ID:
SA28333
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for eggdrop
Vendor Patch. Secunia Advisory 39 of 45 in 2008. 6,098 views.
Release Date:
2008-01-07
Secunia Advisory ID:
SA28347
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for eggdrop. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for util-linux
Vendor Patch. Secunia Advisory 40 of 45 in 2008. 5,389 views.
Release Date:
2008-01-07
Secunia Advisory ID:
SA28348
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for util-linux. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for loop-aes-utils
Vendor Patch. Secunia Advisory 41 of 45 in 2008. 6,280 views.
Release Date:
2008-01-07
Secunia Advisory ID:
SA28349
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for loop-aes-utils. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for wzdftpd
Vendor Patch. Secunia Advisory 42 of 45 in 2008. 5,716 views.
Release Date:
2008-01-07
Secunia Advisory ID:
SA28342
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wzdftpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a vulnerable system. [Read More]


Debian update for maradns
Vendor Patch. Secunia Advisory 43 of 45 in 2008. 8,321 views.
Release Date:
2008-01-04
Secunia Advisory ID:
SA28334
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for maradns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 44 of 45 in 2008. 7,446 views.
Release Date:
2008-01-04
Secunia Advisory ID:
SA28315
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for tar
Vendor Patch. Secunia Advisory 45 of 45 in 2008. 7,270 views.
Release Date:
2008-01-02
Secunia Advisory ID:
SA28255
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tar. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Debian GNU/Linux 3.1 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability