Debian Security

Debian Security Advisories

Zuletzt aktualisiert: 2024-03-21T15:36:18Z

DSA-5626-2 pdns-recursor - regression update

2024-03-20

One of the upstream changes in the update released as DSA 5626 contained

a regression in the zoneToCache function. Updated pdns-recursor packages

are available to correct this issue.

https://security-tracker.debian.org/tracker/DSA-5626-2

Mehr

DSA-5642-1 php-dompdf-svg-lib - security update

2024-03-20

Three security issues were discovered in php-svg-lib, a PHP library to

read, parse and export to PDF SVG files, which could result in denial

of service, restriction bypass or the execution of arbitrary code.

https://security-tracker.debian.org/tracker/DSA-5642-1

Mehr

DSA-5641-1 fontforge - security update

2024-03-19

It was discovered that fontforge, a font editor, is prone to shell command

injection vulnerabilities when processing specially crafted files.

https://security-tracker.debian.org/tracker/DSA-5641-1

Mehr

DSA-5640-1 openvswitch - security update

2024-03-14

Two vulnerabilities were discovered in Open vSwitch, a software-based

Ethernet virtual switch, which could result in a bypass of OpenFlow

rules or denial of service.

https://security-tracker.debian.org/tracker/DSA-5640-1

Mehr

DSA-5639-1 chromium - security update

2024-03-13

Security issues were discovered in Chromium, which could result

in the execution of arbitrary code, denial of service or information

disclosure.

https://security-tracker.debian.org/tracker/DSA-5639-1

Mehr

DSA-5638-1 libuv1 - security update

2024-03-10

It was discovered that the uv_getaddrinfo() function in libuv, an

asynchronous event notification library, incorrectly truncated certain

hostnames, which may result in bypass of security measures on internal

APIs or SSRF attacks.

https://security-tracker.debian.org/tracker/DSA-5638-1

Mehr

DSA-5637-1 squid - security update

2024-03-08

Several security vulnerabilities have been discovered in Squid, a full featured

web proxy cache. Due to programming errors in Squid's HTTP request parsing,

remote attackers may be able to execute a denial of service attack by sending

large X-Forwarded-For header or trigger a stack buffer overflow while

performing HTTP Digest authentication. Other issues facilitate request

smuggling past a firewall or a denial of service against Squid's Helper process

management.

In regard to CVE-2023-46728: Please note that support for the Gopher protocol

has simply been removed in future Squid versions. There are no plans by the

upstream developers of Squid to fix this issue.

https://security-tracker.debian.org/tracker/DSA-5637-1

Mehr

DSA-5636-1 chromium - security update

2024-03-06

Multiple security issues were discovered in Chromium, which could result

in the execution of arbitrary code, denial of service or information

disclosure.

https://security-tracker.debian.org/tracker/DSA-5636-1

Mehr

DSA-5635-1 yard - security update

2024-03-04

Aviv Keller discovered that the frames.html file generated by YARD, a

documentation generation tool for the Ruby programming language, was

vulnerable to cross-site scripting.

https://security-tracker.debian.org/tracker/DSA-5635-1

Mehr

DSA-5634-1 chromium - security update

2024-02-28

Multiple security issues were discovered in Chromium, which could result

in the execution of arbitrary code, denial of service or information

disclosure.

https://security-tracker.debian.org/tracker/DSA-5634-1

Mehr

DSA-5633-1 knot-resolver - security update

2024-02-27

It was discovered that malformed DNSSEC records within a DNS zone could

result in denial of service against Knot Resolver, a caching, DNSSEC-

validating DNS resolver.

https://security-tracker.debian.org/tracker/DSA-5633-1

Mehr

DSA-5632-1 composer - security update

2024-02-26

It was discovered that composer, a dependency manager for the PHP

language, processed files in the local working directory. This could

lead to local privilege escalation or malicious code execution. Due to

a technical issue this email was not sent on 2024-02-26 like it should

have.

https://security-tracker.debian.org/tracker/DSA-5632-1

Mehr

DSA-5631-1 iwd - security update

2024-02-25

It was discovered that iwd, the iNet Wireless Daemon, does not properly

handle messages in the 4-way handshake used when connecting to a

protected WiFi network for the first time. An attacker can take

advantage of this flaw to gain unauthorized access to a protected WiFi

network if iwd is operating in Access Point (AP) mode.

https://security-tracker.debian.org/tracker/DSA-5631-1

Mehr

DSA-5630-1 thunderbird - security update

2024-02-23

Multiple security issues were discovered in Thunderbird, which could

result in denial of service or the execution of arbitrary code.

https://security-tracker.debian.org/tracker/DSA-5630-1

Mehr

DSA-5629-1 chromium - security update

2024-02-23

Multiple security issues were discovered in Chromium, which could result

in the execution of arbitrary code, denial of service or information

disclosure.

https://security-tracker.debian.org/tracker/DSA-5629-1

Mehr

DSA-5628-1 imagemagick - security update

2024-02-22

This update fixes multiple vulnerabilities in Imagemagick: Various memory

handling problems and cases of missing or incomplete input sanitising

may result in denial of service, memory disclosure or potentially the

execution of arbitrary code if malformed image files are processed.

https://security-tracker.debian.org/tracker/DSA-5628-1

Mehr

DSA-5627-1 firefox-esr - security update

2024-02-21

Multiple security issues have been found in the Mozilla Firefox web

browser, which could potentially result in the execution of arbitrary

code, information disclosure or spoofing.

https://security-tracker.debian.org/tracker/DSA-5627-1

Mehr

DSA-5626-1 pdns-recursor - security update

2024-02-18

It was discovered that malformed DNSSEC records within a DNS zone could

result in denial of service against PDNS Recursor, a resolving

name server.

https://security-tracker.debian.org/tracker/DSA-5626-1

Mehr

DSA-5625-1 engrampa - security update

2024-02-16

It was discovered that Engrampa, an archive manager for the MATE

desktop environment was susceptible to path traversal when handling

CPIO archives.

https://security-tracker.debian.org/tracker/DSA-5625-1

Mehr

DSA-5624-1 edk2 - security update

2024-02-14

Mate Kukri discovered the Debian build of EDK2, a UEFI firmware

implementation, used an insecure default configuration which could result

in Secure Boot bypass via the UEFI shell.

This updates disables the UEFI shell if Secure Boot is used.

https://security-tracker.debian.org/tracker/DSA-5624-1

Mehr

DSA-5623-1 postgresql-15 - security update

2024-02-14

It was discovered that a late privilege drop in the "REFRESH MATERIALIZED

VIEW CONCURRENTLY" command could allow an attacker to trick a user with

higher privileges to run SQL commands with these permissions.

https://security-tracker.debian.org/tracker/DSA-5623-1

Mehr

DSA-5622-1 postgresql-13 - security update

2024-02-14

It was discovered that a late privilege drop in the "REFRESH MATERIALIZED

VIEW CONCURRENTLY" command could allow an attacker to trick a user with

higher privileges to run SQL commands with these permissions.

https://security-tracker.debian.org/tracker/DSA-5622-1

Mehr

DSA-5621-1 bind9 - security update

2024-02-14

Several vulnerabilities were discovered in BIND, a DNS server

implementation, which may result in denial of service.

https://security-tracker.debian.org/tracker/DSA-5621-1

Mehr

DSA-5620-1 unbound - security update

2024-02-14

Two vulnerabilities were discovered in unbound, a validating, recursive,

caching DNS resolver. Specially crafted DNSSEC answers could lead

unbound down a very CPU intensive and time costly DNSSEC

(CVE-2023-50387) or NSEC3 hash (CVE-2023-50868) validation path,

resulting in denial of service.

Details can be found at

https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt

https://security-tracker.debian.org/tracker/DSA-5620-1

Mehr

DSA-5619-1 libgit2 - security update

2024-02-09

Two vulnerabilities were discovered in libgit2, a low-level Git library,

which may result in denial of service or potentially the execution of

arbitrary code.

https://security-tracker.debian.org/tracker/DSA-5619-1

Mehr

DSA-5618-1 webkit2gtk - security update

2024-02-08

The following vulnerabilities have been discovered in the WebKitGTK

web engine:

CVE-2024-23206

An anonymous researcher discovered that a maliciously crafted

webpage may be able to fingerprint the user.

CVE-2024-23213

Wangtaiyu discovered that processing web content may lead to

arbitrary code execution.

CVE-2024-23222

Apple discovered that processing maliciously crafted web content

may lead to arbitrary code execution. Apple is aware of a report

that this issue may have been exploited.

https://security-tracker.debian.org/tracker/DSA-5618-1

Mehr

DSA-5617-1 chromium - security update

2024-02-08

Multiple security issues were discovered in Chromium, which could result

in the execution of arbitrary code, denial of service or information

disclosure.

https://security-tracker.debian.org/tracker/DSA-5617-1

Mehr

DSA-5616-1 ruby-sanitize - security update

2024-02-05

It was discovered that ruby-sanitize, a whitelist-based HTML sanitizer,

insufficiently sanitised

Mehr

DSA-5615-1 runc - security update

2024-02-04

It was discovered that runc, a command line client for running

applications packaged according to the Open Container Format (OCF), was

suspectible to multiple container breakouts due to an internal file

descriptor leak.

https://security-tracker.debian.org/tracker/DSA-5615-1

Mehr

DSA-5614-1 zbar - security update

2024-02-03

Two vulnerabilities were discovered in zbar, a library for scanning and

decoding QR and bar codes, which may result in denial of service,

information disclosure or potentially the execution of arbitrary code if

a specially crafted code is processed.

https://security-tracker.debian.org/tracker/DSA-5614-1

Mehr

════════════════════════

Skriptlauf: 2024-03-21T20:02:02

🏡