Debian LTS Linux Distribution - Page 3
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Imagemagick a graphical software suite for displaying, creating and modifying images was vulnerable. CVE-2023-1289
Two vulnerabilities were discovered in unbound, a validating, recursive, caching DNS resolver. Specially crafted DNSSEC answers could lead unbound down a very CPU intensive and time costly DNSSEC (CVE-2023-50387) or NSEC3 hash (CVE-2023-50868) validation path, resulting in denial of service.
runc is a command line client for running applications packaged according to the Open Container Format (OCF) and is a compliant implementation of the Open Container Project specification.
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can
rear is a disaster recovery and system migration framework. It has been discovered that rear creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.
Sudo, a program designed to allow a sysadmin to give limited root privileges to users and log root activity, was vulnerable. CVE-2023-7090
man-db provides the "man" command used for reading manual pages. man-db 2.7.6.1-3 added AppArmor confinement for filter programs called by man, and man-db 2.8.0 added a seccomp sandbox to confine subprocesses
debian-security-support, the Debian security support coverage checker, has been updated in buster-security to mark the end of life of the following package: * salt: see MR: debian/debian-security-support!22
Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in side channel attacks, leaking sensitive data to log files, denial of service or bypass of sandbox restrictions.
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, phishing, clickjacking, privilege escalation, HSTS bypass or bypass of content security policies.
An issue has been discovered in BIND, a DNS server implementation. A stack exhaustion flaw was discovered in the control channel code
Postfix, a popular mail server, allowed SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking
It was discovered that there was a potential arbitrary code execution vulnerability in pillow, a popular library for manipulating images used by Python applications.
Security vulnerabilities were found in libspreadsheet-parsexlsx-perl, a Perl module to parse XLSX files, which could lead to denial of service or server-side request forgery via crafted input.
A vulnerability was fixed in MariaDB, a database suite. This vulnerability allowed a high privileged attacker with network access to compromise a MariaDB Server. Successful attacks of this vulnerability can
Several vulnerabilities were discovered in the Xorg X server, which may result in privilege escalation if the X server is running privileged or denial of service.
Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code. For Debian 10 buster, these problems have been fixed in version
It was discovered that phpseclib, a PHP library for arbitrary-precision integer arithmetic, was vulnerable to the so-called Terrapin Attack. The SSH transport protocol with certain OpenSSH extensions, allows
It was discovered that php-phpseclib, a PHP library for arbitrary-precision integer arithmetic, was vulnerable to the so-called Terrapin Attack.
Several security vulnerabilities have been discovered in zabbix, a network monitoring solution, potentially allowing an attacker to perform a stored XSS, Server-Side Request Forgery (SSRF), exposure of sensitive information, a system crash, or arbitrary code execution.
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.