πΎ Archived View for data.konfusator.de βΊ feeds βΊ dsa.gmi captured on 2024-07-08 at 23:16:19. Gemini links have been rewritten to link to archived content
β¬ οΈ Previous capture (2024-06-16)
β‘οΈ Next capture (2024-08-18)
-=-=-=-=-=-=-
Zuletzt aktualisiert: 2024-07-08T23:32:54Z
2024-07-05
Two vulnerabilities were discovered in the GSS message token handling in
krb5, the MIT implementation of Kerberos. An attacker can take advantage
of these flaws to bypass integrity protections or cause a denial of
service.
https://security-tracker.debian.org/tracker/DSA-5726-1
2024-07-03
Johannes Kuhn discovered that messages and channel names are not
properly escaped in the modtcl module in ZNC, a IRC bouncer, which could
result in remote code execution via specially crafted messages.
https://security-tracker.debian.org/tracker/DSA-5725-1
2024-07-01
The Qualys Threat Research Unit (TRU) discovered that OpenSSH, an
implementation of the SSH protocol suite, is prone to a signal handler
race condition. If a client does not authenticate within LoginGraceTime
seconds (120 by default), then sshd's SIGALRM handler is called
asynchronously and calls various functions that are not
async-signal-safe. A remote unauthenticated attacker can take advantage
of this flaw to execute arbitrary code with root privileges. This flaw
affects sshd in its default configuration.
Details can be found in the Qualys advisory at
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
https://security-tracker.debian.org/tracker/DSA-5724-1
2024-06-27
Fabian Vogt discovered that the KDE session management server
insufficiently restricted ICE connections from localhost, which could
allow a local attacker to execute arbitrary code as another user on
next boot.
https://security-tracker.debian.org/tracker/DSA-5723-1
2024-06-26
It was discovered that multiple integer overflows in libvpx, a
multimedia library for the VP8 and VP9 video codecs, may result in
denial of service and potentially the execution of arbitrary code.
https://security-tracker.debian.org/tracker/DSA-5722-1
2024-06-26
Several vulnerabilities have been discovered in the FFmpeg multimedia
framework, which could result in denial of service or potentially the
execution of arbitrary code if malformed files/streams are processed.
https://security-tracker.debian.org/tracker/DSA-5721-1
2024-06-25
Security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
https://security-tracker.debian.org/tracker/DSA-5720-1
2024-06-25
It was discovered that Emacs is prone to arbitrary shell code evaluation
when opening a specially crafted Org file.
This update includes updates pending for the upcoming point releases
including other security fixes.
https://security-tracker.debian.org/tracker/DSA-5719-1
2024-06-25
It was discovered that Org Mode for Emacs is prone to arbitrary shell
code evaluation when opening a specially crafted Org file.
This update includes updates pending for the upcoming point releases
including other security fixes.
https://security-tracker.debian.org/tracker/DSA-5718-1
2024-06-24
The update for composer released as DSA 5715 introduced a regression
in the handling of git feature branches. Updated composer packages
are now available to address this issue.
https://security-tracker.debian.org/tracker/DSA-5715-2
2024-06-20
It was discovered that user validation was incorrectly implemented
for filter_var(FILTER_VALIDATE_URL).
https://security-tracker.debian.org/tracker/DSA-5717-1
2024-06-19
Security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
https://security-tracker.debian.org/tracker/DSA-5716-1
2024-06-18
Two vulnerabilities have been discovered in Composer, a dependency
manager for PHP, which could result in arbitrary command execution by
operating on malicious git/hg repositories.
https://security-tracker.debian.org/tracker/DSA-5715-1
2024-06-18
Huy Nguyα» n PhαΊ‘m NhαΊt, and Valentin T. and Lutz Wolf of CrowdStrike,
discovered that roundcube, a skinnable AJAX based webmail solution for
IMAP servers, did not correctly process and sanitize requests. This
would allow an attacker to perform Cross-Side Scripting (XSS) attacks.
https://security-tracker.debian.org/tracker/DSA-5714-1
2024-06-16
A buffer overflow was discovered in libndp, a library implementing the
IPv6 Neighbor Discovery Protocol (NDP), which could result in denial of
service or potentially the execution of arbitrary code if malformed
IPv6 router advertisements are processed.
https://security-tracker.debian.org/tracker/DSA-5713-1
2024-06-15
Several vulnerabilities have been discovered in the FFmpeg multimedia
framework, which could result in denial of service or potentially the
execution of arbitrary code if malformed files/streams are processed.
https://security-tracker.debian.org/tracker/DSA-5712-1
2024-06-15
Multiple security issues were discovered in Thunderbird, which could
result inthe execution of arbitrary code.
https://security-tracker.debian.org/tracker/DSA-5711-1
2024-06-14
Security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
https://security-tracker.debian.org/tracker/DSA-5710-1
2024-06-12
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, the bypass of sandbox restrictions or an information leak.
https://security-tracker.debian.org/tracker/DSA-5709-1
2024-06-11
Damian Poddebniak discovered that the Cyrus IMAP server didn't restrict
memory allocation for some command arguments which may result in denial
of service. This update backports new config directives which allow to
configure limits, additional details can be found at:
https://www.cyrusimap.org/3.6/imap/download/release-notes/3.6/x/3.6.5.html
These changes are too intrusive to be backported to the version of
Cyrus in the oldstable distribution (bullseye). If the IMAP server is used
by untrusted users an update to Debian stable/bookworm is recommended.
In addition the version of cyrus-imapd in bullseye-backports will be
updated with a patch soon.
https://security-tracker.debian.org/tracker/DSA-5708-1
2024-06-11
A buffer overflow was discovered in the MMS module of the VLC media
player.
https://security-tracker.debian.org/tracker/DSA-5707-1
2024-06-05
An integer overflow vulnerability in the rar e8 filter was discovered in
libarchive, a multi-format archive and compression library, which may
result in the execution of arbitrary code if a specially crafted RAR
archive is processed.
https://security-tracker.debian.org/tracker/DSA-5706-1
2024-06-05
A use-after-free was discovered in tinyproxy, a lightweight, non-caching,
optionally anonymizing HTTP proxy, which could result in denial of
service.
https://security-tracker.debian.org/tracker/DSA-5705-1
2024-06-05
Multiple security issues were discovered in Pillow, a Python imaging
library, which could result in denial of service or the execution of
arbitrary code if malformed images are processed.
https://security-tracker.debian.org/tracker/DSA-5704-1
2024-06-02
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
https://security-tracker.debian.org/tracker/DSA-5703-1
2024-06-01
An integer overflow in the EXIF metadata parsing was discovered in the
GStreamer media framework, which may result in denial of service or
potentially the execution of arbitrary code if a malformed file is
processed.
https://security-tracker.debian.org/tracker/DSA-5702-1
2024-05-31
Security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
https://security-tracker.debian.org/tracker/DSA-5701-1
2024-05-29
An SQL injection was discovered in pymysql, a pure Python MySQL driver.
https://security-tracker.debian.org/tracker/DSA-5700-1
2024-05-24
Multiple cross-site scripting vulnerabilities were found in Redmine,
a project management web application.
https://security-tracker.debian.org/tracker/DSA-5699-1
2024-05-24
Multiple security issues were found in Rack, an interface for developing
web applications in Ruby, which could result in denial of service.
https://security-tracker.debian.org/tracker/DSA-5698-1
ββββββββββββββββββββββββ
Skriptlauf: 2024-07-09T05:02:02