Several security vulnerabilities have been discovered in Netty, a Java NIO client/server socket framework. It was found that Netty was vulnerable to the MadeYouReset DDoS attack, a logical vulnerability in the HTTP/2 protocol itself and programming errors which enabled request[…]
Multiple security vulnerabilities were discovered in imagemagick, a software suite used for editing and manipulating digital images, which could lead to information leaks, bypass of security policies, denial of service or arbitrary code execution. For the oldstable distribution (bookworm), these[…]
Multiple security vulnerabilities were discovered in imagemagick, a software suite used for editing and manipulating digital images, which could lead to information leaks, bypass of security policies, denial of service or arbitrary code execution. For the stable distribution (trixie), these[…]
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. For the oldstable distribution (bookworm), these problems have been fixed in version 145.0.7632.159-1~deb12u1.
Several vulnerabilities were discovered in GIMP, the GNU Image Manipulation Program, which could result in denial of service or potentially the execution of arbitrary code if malformed XWD, ICNS, PGM or ICO files are opened. For the oldstable distribution (bookworm),[…]
It was discovered that SPIP, a website engine for publishing, would allow a malicious user to access protected information, and perform various SQL injection, Cross-Side Scripting (XSS), and Server-Side Request Forgery (SSRF) attacks. In some cases this could result in[…]
Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in denial of service or memory disclosure. For the oldstable distribution (bookworm), these problems have been fixed in version 8.2.30-1~deb12u1.
Two security issues were discovered in LXD, a system container and virtual machine manager, which could result the in execution of arbitrary commands via malformed images. For the oldstable distribution (bookworm), these problems have been fixed in version 5.0.2-5+deb12u3.
Multiple security issues were discovered in Thunderbird, which could result in the execution of arbitrary code or information disclosure. For the oldstable distribution (bookworm), these problems have been fixed in version 1:140.8.0esr-1~deb12u1. For the stable distribution (trixie), these problems have[…]
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. For the oldstable distribution (bookworm), these problems have been fixed in version 145.0.7632.116-1~deb12u1.
Multiple security issues were found in Django, a Python web development framework, which could result in denial of service, information disclosure or SQL injection. For the oldstable distribution (bookworm), these problems have been fixed in version 3:3.2.25-0+deb12u2.
Clay Ver Valen discovered an integer overflow in the AES-GCM implementation of the Mozilla Network Security Service libraries. For the oldstable distribution (bookworm), this problem has been fixed in version 2:3.87.1-1+deb12u2. For the stable distribution (trixie), this problem has been[…]
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, sandbox escape, bypass of the same-origin policy, information disclosure or privilege escalation. For the oldstable distribution (bookworm), these[…]
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. For the oldstable distribution (bookworm), these problems have been fixed in version 145.0.7632.109-1~deb12u3.
Dan Smith discovered that nova, a cloud computing fabric controller, calls qemu-img without format restrictions for resize, which may result in unsafe image resize operations that could destroy data on the host system. Only compute nodes using the Flat image[…]
Ron Ben Yizhak discovered that the inetutils implementation of telnetd didn't sanitise the CREDENTIALS_DIRECTORY environment variable before passing it to the login binary. This could be exploited to bypass authentication and login as root. For the stable distribution (trixie), this[…]
A buffer overflow was discovered in libvpx, a library implementing the VP8/VP9 open video codecs, which could result in denial of service or potentially the execution of arbitrary code. For the oldstable distribution (bookworm), these problems have been fixed in[…]
A heap-based buffer overflow was discovered in the RGBE/HDR parser of GEGL, a graph-based image processing library, which could result in denial of service or the execution of arbitrary code if malformed files are processed. For the oldstable distribution (bookworm),[…]
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. For the stable distribution (trixie), these problems have been fixed in version 6.12.73-1.
Tim Scheckenbach reported a flaw in GnuTLS, a library implementing the TLS and SSL protocols. Processing of specially crafted certificates containing a large number of name constraints may result in denial of service (resource exhaustion). For the oldstable distribution (bookworm),[…]
Letzte Änderung am Freitag, 01 Januar 2016 20:59