πŸ’Ύ Archived View for data.konfusator.de β€Ί feeds β€Ί dsa.gmi captured on 2024-07-08 at 23:16:19. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2024-06-16)

➑️ Next capture (2024-08-18)

🚧 View Differences

-=-=-=-=-=-=-

Debian Security

Debian Security Advisories

Zuletzt aktualisiert: 2024-07-08T23:32:54Z

DSA-5726-1 krb5 - security update

2024-07-05

Two vulnerabilities were discovered in the GSS message token handling in

krb5, the MIT implementation of Kerberos. An attacker can take advantage

of these flaws to bypass integrity protections or cause a denial of

service.

https://security-tracker.debian.org/tracker/DSA-5726-1

Mehr

DSA-5725-1 znc - security update

2024-07-03

Johannes Kuhn discovered that messages and channel names are not

properly escaped in the modtcl module in ZNC, a IRC bouncer, which could

result in remote code execution via specially crafted messages.

https://security-tracker.debian.org/tracker/DSA-5725-1

Mehr

DSA-5724-1 openssh - security update

2024-07-01

The Qualys Threat Research Unit (TRU) discovered that OpenSSH, an

implementation of the SSH protocol suite, is prone to a signal handler

race condition. If a client does not authenticate within LoginGraceTime

seconds (120 by default), then sshd's SIGALRM handler is called

asynchronously and calls various functions that are not

async-signal-safe. A remote unauthenticated attacker can take advantage

of this flaw to execute arbitrary code with root privileges. This flaw

affects sshd in its default configuration.

Details can be found in the Qualys advisory at

https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt

https://security-tracker.debian.org/tracker/DSA-5724-1

Mehr

DSA-5723-1 plasma-workspace - security update

2024-06-27

Fabian Vogt discovered that the KDE session management server

insufficiently restricted ICE connections from localhost, which could

allow a local attacker to execute arbitrary code as another user on

next boot.

https://security-tracker.debian.org/tracker/DSA-5723-1

Mehr

DSA-5722-1 libvpx - security update

2024-06-26

It was discovered that multiple integer overflows in libvpx, a

multimedia library for the VP8 and VP9 video codecs, may result in

denial of service and potentially the execution of arbitrary code.

https://security-tracker.debian.org/tracker/DSA-5722-1

Mehr

DSA-5721-1 ffmpeg - security update

2024-06-26

Several vulnerabilities have been discovered in the FFmpeg multimedia

framework, which could result in denial of service or potentially the

execution of arbitrary code if malformed files/streams are processed.

https://security-tracker.debian.org/tracker/DSA-5721-1

Mehr

DSA-5720-1 chromium - security update

2024-06-25

Security issues were discovered in Chromium, which could result

in the execution of arbitrary code, denial of service or information

disclosure.

https://security-tracker.debian.org/tracker/DSA-5720-1

Mehr

DSA-5719-1 emacs - security update

2024-06-25

It was discovered that Emacs is prone to arbitrary shell code evaluation

when opening a specially crafted Org file.

This update includes updates pending for the upcoming point releases

including other security fixes.

https://security-tracker.debian.org/tracker/DSA-5719-1

Mehr

DSA-5718-1 org-mode - security update

2024-06-25

It was discovered that Org Mode for Emacs is prone to arbitrary shell

code evaluation when opening a specially crafted Org file.

This update includes updates pending for the upcoming point releases

including other security fixes.

https://security-tracker.debian.org/tracker/DSA-5718-1

Mehr

DSA-5715-2 composer - regression update

2024-06-24

The update for composer released as DSA 5715 introduced a regression

in the handling of git feature branches. Updated composer packages

are now available to address this issue.

https://security-tracker.debian.org/tracker/DSA-5715-2

Mehr

DSA-5717-1 php8.2 - security update

2024-06-20

It was discovered that user validation was incorrectly implemented

for filter_var(FILTER_VALIDATE_URL).

https://security-tracker.debian.org/tracker/DSA-5717-1

Mehr

DSA-5716-1 chromium - security update

2024-06-19

Security issues were discovered in Chromium, which could result

in the execution of arbitrary code, denial of service or information

disclosure.

https://security-tracker.debian.org/tracker/DSA-5716-1

Mehr

DSA-5715-1 composer - security update

2024-06-18

Two vulnerabilities have been discovered in Composer, a dependency

manager for PHP, which could result in arbitrary command execution by

operating on malicious git/hg repositories.

https://security-tracker.debian.org/tracker/DSA-5715-1

Mehr

DSA-5714-1 roundcube - security update

2024-06-18

Huy Nguyα»…n PhαΊ‘m NhαΊ­t, and Valentin T. and Lutz Wolf of CrowdStrike,

discovered that roundcube, a skinnable AJAX based webmail solution for

IMAP servers, did not correctly process and sanitize requests. This

would allow an attacker to perform Cross-Side Scripting (XSS) attacks.

https://security-tracker.debian.org/tracker/DSA-5714-1

Mehr

DSA-5713-1 libndp - security update

2024-06-16

A buffer overflow was discovered in libndp, a library implementing the

IPv6 Neighbor Discovery Protocol (NDP), which could result in denial of

service or potentially the execution of arbitrary code if malformed

IPv6 router advertisements are processed.

https://security-tracker.debian.org/tracker/DSA-5713-1

Mehr

DSA-5712-1 ffmpeg - security update

2024-06-15

Several vulnerabilities have been discovered in the FFmpeg multimedia

framework, which could result in denial of service or potentially the

execution of arbitrary code if malformed files/streams are processed.

https://security-tracker.debian.org/tracker/DSA-5712-1

Mehr

DSA-5711-1 thunderbird - security update

2024-06-15

Multiple security issues were discovered in Thunderbird, which could

result inthe execution of arbitrary code.

https://security-tracker.debian.org/tracker/DSA-5711-1

Mehr

DSA-5710-1 chromium - security update

2024-06-14

Security issues were discovered in Chromium, which could result

in the execution of arbitrary code, denial of service or information

disclosure.

https://security-tracker.debian.org/tracker/DSA-5710-1

Mehr

DSA-5709-1 firefox-esr - security update

2024-06-12

Multiple security issues have been found in the Mozilla Firefox web

browser, which could potentially result in the execution of arbitrary

code, the bypass of sandbox restrictions or an information leak.

https://security-tracker.debian.org/tracker/DSA-5709-1

Mehr

DSA-5708-1 cyrus-imapd - security update

2024-06-11

Damian Poddebniak discovered that the Cyrus IMAP server didn't restrict

memory allocation for some command arguments which may result in denial

of service. This update backports new config directives which allow to

configure limits, additional details can be found at:

https://www.cyrusimap.org/3.6/imap/download/release-notes/3.6/x/3.6.5.html

These changes are too intrusive to be backported to the version of

Cyrus in the oldstable distribution (bullseye). If the IMAP server is used

by untrusted users an update to Debian stable/bookworm is recommended.

In addition the version of cyrus-imapd in bullseye-backports will be

updated with a patch soon.

https://security-tracker.debian.org/tracker/DSA-5708-1

Mehr

DSA-5707-1 vlc - security update

2024-06-11

A buffer overflow was discovered in the MMS module of the VLC media

player.

https://security-tracker.debian.org/tracker/DSA-5707-1

Mehr

DSA-5706-1 libarchive - security update

2024-06-05

An integer overflow vulnerability in the rar e8 filter was discovered in

libarchive, a multi-format archive and compression library, which may

result in the execution of arbitrary code if a specially crafted RAR

archive is processed.

https://security-tracker.debian.org/tracker/DSA-5706-1

Mehr

DSA-5705-1 tinyproxy - security update

2024-06-05

A use-after-free was discovered in tinyproxy, a lightweight, non-caching,

optionally anonymizing HTTP proxy, which could result in denial of

service.

https://security-tracker.debian.org/tracker/DSA-5705-1

Mehr

DSA-5704-1 pillow - security update

2024-06-05

Multiple security issues were discovered in Pillow, a Python imaging

library, which could result in denial of service or the execution of

arbitrary code if malformed images are processed.

https://security-tracker.debian.org/tracker/DSA-5704-1

Mehr

DSA-5703-1 linux - security update

2024-06-02

Several vulnerabilities have been discovered in the Linux kernel that

may lead to a privilege escalation, denial of service or information

leaks.

https://security-tracker.debian.org/tracker/DSA-5703-1

Mehr

DSA-5702-1 gst-plugins-base1.0 - security update

2024-06-01

An integer overflow in the EXIF metadata parsing was discovered in the

GStreamer media framework, which may result in denial of service or

potentially the execution of arbitrary code if a malformed file is

processed.

https://security-tracker.debian.org/tracker/DSA-5702-1

Mehr

DSA-5701-1 chromium - security update

2024-05-31

Security issues were discovered in Chromium, which could result

in the execution of arbitrary code, denial of service or information

disclosure.

https://security-tracker.debian.org/tracker/DSA-5701-1

Mehr

DSA-5700-1 python-pymysql - security update

2024-05-29

An SQL injection was discovered in pymysql, a pure Python MySQL driver.

https://security-tracker.debian.org/tracker/DSA-5700-1

Mehr

DSA-5699-1 redmine - security update

2024-05-24

Multiple cross-site scripting vulnerabilities were found in Redmine,

a project management web application.

https://security-tracker.debian.org/tracker/DSA-5699-1

Mehr

DSA-5698-1 ruby-rack - security update

2024-05-24

Multiple security issues were found in Rack, an interface for developing

web applications in Ruby, which could result in denial of service.

https://security-tracker.debian.org/tracker/DSA-5698-1

Mehr

════════════════════════

Skriptlauf: 2024-07-09T05:02:02

🏑