Debian Essential And Critical Security Patch Updates - Page 272
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Stefan Esser discovered a heap overflow in the CVS server, which serves the popular Concurrent Versions System.
This problem could perhaps be exploited to cause the daemon to read a negative amount of data which could lead to unexpected behaviour.
A problem has been discovered in mah-jong that can be utilised to crash the game server after dereferencing a NULL pointer.
These can not be exploited with the default configuration from the Debian system.
Neither of these stack-based buffer overflows is exploitable with the default Debian configuration.
This vulnerability could be exploited by a local user to overwrite files with the privileges of the user running emacs.
Patch fixes issue where a remote user could cause an rsync daemon to write filesoutside of the intended directory tree unless 'chroot' option is on.
This problem could cause the program to crash if a defective or intentionally prepared PNG image file is handled by libpng.
Jacub Jelinek discovered several vulnerabilities in the MidnightCommander, a powerful file manager for GNU/Linux systems.
H.D. Moore discovered several terminal emulator security issues
Several serious problems have been discovered in the Linux kernel. This update takes care of Linux 2.4.16 for the ARM (and a few other) architectures.
This vulnerability could be exploited by a remote attacker to execute arbitrary code with the privileges of the ident2 daemon (by default, the "identd" user).
This bug allows an attacker to execute arbitrary code on the users' machine.
Herbert Xu reported that local users could cause a denial of service against iproute, a set of tools for controlling networking in Linux kernels.
A flaw in the security settings of ZCatalog allows anonymous users to call arbitrary methods of catalog indexes. The vulnerability also allows untrusted code to do the same.
Several serious problems have been discovered in the Linux kernel. This update takes care of Linux 2.4.17 for the MIPS architecture.
This patch takes care of multiple kernel vulnerabilities, specifially for kernal 2.4.17 on the PowerPC/apus and S/390 architectures.
This bug may be exploited to write or read arbitrary directories to which the user has access.
DSA 431-1 incorporated a partial fix for this problem. This advisoryincludes a more complete fix which corrects some additional cases.
These vulnerabilities could exploited by a malicious WebDAV server to execute arbitrary code with libneon's privileges.