Debian Essential And Critical Security Patch Updates - Page 271
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
A remote user could potentially cause arbitrary code to be executed with the privileges of an Apache httpd child process (by default, user www-data).
By exploiting one of these vulnerabilities, a local or remote user could potentially cause arbitrary code to be executed with the privileges of 1) the rlprd process (remote), or 2) root (local).
Exploiting this vulnerability, a local user could cause the execution of arbitrary code by creating a web page and processing it with www-sql.
This vulnerability could potentially be exploited by a local user to execute arbitrary code with root privileges.
By explointing this, a remote attacker could potentially cause arbitrary code to be executed with the privileges of the supfilesrv process
This overflow only applies if aname_to_localname is enabled in the configuration (not default).
Sebastian Krahmer and Stefan Esser discovered several vulnerabilities in the CVS server during a code audit.
Derek Robert Price discovered a potential buffer overflow vulnerability in the CVS server.
It possible to exploit this problem and crash the surrounding application.
Fixes multiple buffer overflows and multiple directory traversal vulnerabilities.
Due to flushing the TLB too early it is possible for an attacker to trigger a local root exploit. This fix is to the sparc-built kernel and the kernel source.
Exploit could cause arbitrary code to be executed with the privileges of the log2mail process.
A remote user could cause an rsync daemon to write files outside of the intended directory tree, if the daemon is not configured with the 'chroot' option.
A remote attacker could gain access to the gallery "admin" user without proper authentication.
Several buffer overflow vulnerabilities were discovered in ethereal.
A remote user could potentially cause arbitrary code to be executed with the privileges of the jftpgw server process.
If initialization fails due to a missing configuration file, root privileges are not dropped, and xatitv executes the system(3) function without sanitizing user-supplied environment variables.
Bug allows copy of user-supplied data of arbitrary length into a fixed-size buffer in the pcd_open function.
User input is copied into variables not large enough for all cases. This can lead to an overflow of a static heap variable.
User input is copied into variables not large enough for all cases. This can lead to an overflow of a static heap variable.