Debian LTS Linux Distribution - Page 2.75
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
A vulnerability was discovered in libgit2, a portable C implementation of the Git core methods provided as a linkable library. Using crafted inputs to the git_index_add function could cause heap corruption, and this had the potential to permit
It was discovered that engrampa, an archive manager for the MATE desktop environment was susceptible to path traversal when handling CPIO archives.
Hubert Kario discovered that GnuTLS, a portable library which implements the Transport Layer Security and Datagram Transport Layer Security protocols, was vulnerable to timing side-channel attack in the RSA-PSK key exchange, which could lead to leakage of sensitive data. The issue
An issue has been found in libjwt, a C library to handle JWT (JSON Web Token). Due to using strcmp(), which does not use constant time during execution, a timing side channel attack might be possible.
It was discovered that there was an authentication bypass issue in iwd, the Intel Wireless Daemon. Adversaries could have gained unauthorised access to a protected 'home' (ie. non-WPA2-Enterprise) WiFi network.
Imagemagick a graphical software suite for displaying, creating and modifying images was vulnerable. CVE-2023-1289
Two vulnerabilities were discovered in unbound, a validating, recursive, caching DNS resolver. Specially crafted DNSSEC answers could lead unbound down a very CPU intensive and time costly DNSSEC (CVE-2023-50387) or NSEC3 hash (CVE-2023-50868) validation path, resulting in denial of service.
runc is a command line client for running applications packaged according to the Open Container Format (OCF) and is a compliant implementation of the Open Container Project specification.
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can
rear is a disaster recovery and system migration framework. It has been discovered that rear creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.
Sudo, a program designed to allow a sysadmin to give limited root privileges to users and log root activity, was vulnerable. CVE-2023-7090
man-db provides the "man" command used for reading manual pages. man-db 2.7.6.1-3 added AppArmor confinement for filter programs called by man, and man-db 2.8.0 added a seccomp sandbox to confine subprocesses
debian-security-support, the Debian security support coverage checker, has been updated in buster-security to mark the end of life of the following package: * salt: see MR: debian/debian-security-support!22
Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in side channel attacks, leaking sensitive data to log files, denial of service or bypass of sandbox restrictions.
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, phishing, clickjacking, privilege escalation, HSTS bypass or bypass of content security policies.
An issue has been discovered in BIND, a DNS server implementation. A stack exhaustion flaw was discovered in the control channel code
Postfix, a popular mail server, allowed SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking
It was discovered that there was a potential arbitrary code execution vulnerability in pillow, a popular library for manipulating images used by Python applications.
Security vulnerabilities were found in libspreadsheet-parsexlsx-perl, a Perl module to parse XLSX files, which could lead to denial of service or server-side request forgery via crafted input.
A vulnerability was fixed in MariaDB, a database suite. This vulnerability allowed a high privileged attacker with network access to compromise a MariaDB Server. Successful attacks of this vulnerability can
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.