Zuletzt aktualisiert: 2024-03-21T15:36:18Z
2024-03-20
One of the upstream changes in the update released as DSA 5626 contained
a regression in the zoneToCache function. Updated pdns-recursor packages
are available to correct this issue.
https://security-tracker.debian.org/tracker/DSA-5626-2
2024-03-20
Three security issues were discovered in php-svg-lib, a PHP library to
read, parse and export to PDF SVG files, which could result in denial
of service, restriction bypass or the execution of arbitrary code.
https://security-tracker.debian.org/tracker/DSA-5642-1
2024-03-19
It was discovered that fontforge, a font editor, is prone to shell command
injection vulnerabilities when processing specially crafted files.
https://security-tracker.debian.org/tracker/DSA-5641-1
2024-03-14
Two vulnerabilities were discovered in Open vSwitch, a software-based
Ethernet virtual switch, which could result in a bypass of OpenFlow
rules or denial of service.
https://security-tracker.debian.org/tracker/DSA-5640-1
2024-03-13
Security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
https://security-tracker.debian.org/tracker/DSA-5639-1
2024-03-10
It was discovered that the uv_getaddrinfo() function in libuv, an
asynchronous event notification library, incorrectly truncated certain
hostnames, which may result in bypass of security measures on internal
APIs or SSRF attacks.
https://security-tracker.debian.org/tracker/DSA-5638-1
2024-03-08
Several security vulnerabilities have been discovered in Squid, a full featured
web proxy cache. Due to programming errors in Squid's HTTP request parsing,
remote attackers may be able to execute a denial of service attack by sending
large X-Forwarded-For header or trigger a stack buffer overflow while
performing HTTP Digest authentication. Other issues facilitate request
smuggling past a firewall or a denial of service against Squid's Helper process
management.
In regard to CVE-2023-46728: Please note that support for the Gopher protocol
has simply been removed in future Squid versions. There are no plans by the
upstream developers of Squid to fix this issue.
https://security-tracker.debian.org/tracker/DSA-5637-1
2024-03-06
Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
https://security-tracker.debian.org/tracker/DSA-5636-1
2024-03-04
Aviv Keller discovered that the frames.html file generated by YARD, a
documentation generation tool for the Ruby programming language, was
vulnerable to cross-site scripting.
https://security-tracker.debian.org/tracker/DSA-5635-1
2024-02-28
Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
https://security-tracker.debian.org/tracker/DSA-5634-1
2024-02-27
It was discovered that malformed DNSSEC records within a DNS zone could
result in denial of service against Knot Resolver, a caching, DNSSEC-
validating DNS resolver.
https://security-tracker.debian.org/tracker/DSA-5633-1
2024-02-26
It was discovered that composer, a dependency manager for the PHP
language, processed files in the local working directory. This could
lead to local privilege escalation or malicious code execution. Due to
a technical issue this email was not sent on 2024-02-26 like it should
have.
https://security-tracker.debian.org/tracker/DSA-5632-1
2024-02-25
It was discovered that iwd, the iNet Wireless Daemon, does not properly
handle messages in the 4-way handshake used when connecting to a
protected WiFi network for the first time. An attacker can take
advantage of this flaw to gain unauthorized access to a protected WiFi
network if iwd is operating in Access Point (AP) mode.
https://security-tracker.debian.org/tracker/DSA-5631-1
2024-02-23
Multiple security issues were discovered in Thunderbird, which could
result in denial of service or the execution of arbitrary code.
https://security-tracker.debian.org/tracker/DSA-5630-1
2024-02-23
Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
https://security-tracker.debian.org/tracker/DSA-5629-1
2024-02-22
This update fixes multiple vulnerabilities in Imagemagick: Various memory
handling problems and cases of missing or incomplete input sanitising
may result in denial of service, memory disclosure or potentially the
execution of arbitrary code if malformed image files are processed.
https://security-tracker.debian.org/tracker/DSA-5628-1
2024-02-21
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, information disclosure or spoofing.
https://security-tracker.debian.org/tracker/DSA-5627-1
2024-02-18
It was discovered that malformed DNSSEC records within a DNS zone could
result in denial of service against PDNS Recursor, a resolving
name server.
https://security-tracker.debian.org/tracker/DSA-5626-1
2024-02-16
It was discovered that Engrampa, an archive manager for the MATE
desktop environment was susceptible to path traversal when handling
CPIO archives.
https://security-tracker.debian.org/tracker/DSA-5625-1
2024-02-14
Mate Kukri discovered the Debian build of EDK2, a UEFI firmware
implementation, used an insecure default configuration which could result
in Secure Boot bypass via the UEFI shell.
This updates disables the UEFI shell if Secure Boot is used.
https://security-tracker.debian.org/tracker/DSA-5624-1
2024-02-14
It was discovered that a late privilege drop in the "REFRESH MATERIALIZED
VIEW CONCURRENTLY" command could allow an attacker to trick a user with
higher privileges to run SQL commands with these permissions.
https://security-tracker.debian.org/tracker/DSA-5623-1
2024-02-14
It was discovered that a late privilege drop in the "REFRESH MATERIALIZED
VIEW CONCURRENTLY" command could allow an attacker to trick a user with
higher privileges to run SQL commands with these permissions.
https://security-tracker.debian.org/tracker/DSA-5622-1
2024-02-14
Several vulnerabilities were discovered in BIND, a DNS server
implementation, which may result in denial of service.
https://security-tracker.debian.org/tracker/DSA-5621-1
2024-02-14
Two vulnerabilities were discovered in unbound, a validating, recursive,
caching DNS resolver. Specially crafted DNSSEC answers could lead
unbound down a very CPU intensive and time costly DNSSEC
(CVE-2023-50387) or NSEC3 hash (CVE-2023-50868) validation path,
resulting in denial of service.
Details can be found at
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://security-tracker.debian.org/tracker/DSA-5620-1
2024-02-09
Two vulnerabilities were discovered in libgit2, a low-level Git library,
which may result in denial of service or potentially the execution of
arbitrary code.
https://security-tracker.debian.org/tracker/DSA-5619-1
2024-02-08
The following vulnerabilities have been discovered in the WebKitGTK
web engine:
CVE-2024-23206
An anonymous researcher discovered that a maliciously crafted
webpage may be able to fingerprint the user.
CVE-2024-23213
Wangtaiyu discovered that processing web content may lead to
arbitrary code execution.
CVE-2024-23222
Apple discovered that processing maliciously crafted web content
may lead to arbitrary code execution. Apple is aware of a report
that this issue may have been exploited.
https://security-tracker.debian.org/tracker/DSA-5618-1
2024-02-08
Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
https://security-tracker.debian.org/tracker/DSA-5617-1
2024-02-05
It was discovered that ruby-sanitize, a whitelist-based HTML sanitizer,
insufficiently sanitised
2024-02-04
It was discovered that runc, a command line client for running
applications packaged according to the Open Container Format (OCF), was
suspectible to multiple container breakouts due to an internal file
descriptor leak.
https://security-tracker.debian.org/tracker/DSA-5615-1
2024-02-03
Two vulnerabilities were discovered in zbar, a library for scanning and
decoding QR and bar codes, which may result in denial of service,
information disclosure or potentially the execution of arbitrary code if
a specially crafted code is processed.
https://security-tracker.debian.org/tracker/DSA-5614-1
════════════════════════
Skriptlauf: 2024-03-21T20:02:02