Debian Essential And Critical Security Patch Updates - Page 273
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
These vulnerabilities could potentially be exploited by a remote mail relay to gain the privileges of the ssmtp process (including potentially root).
A local attacker could exploit this vulnerability to gain gid "games".
Here is a patch release specifically for kernel 2.4.18 on the i386 architecture, fixing multiple kernel security issues, and fixing a build error from a previous patch to same.
Two scripts contained in the package don't create temporary files in a secure fashion, which could lead to a root exploit.
This is three advisories in one, each for the same group of kernel 2.4.x vulnerabilities. The first is for the PA-RISC architecture, the second for the IA-64 architecture, and the third for the PowerPC/apus and S/390 architectures.
Crafted invalid ISAKMP packets can remotely crash tcpdump.
Bug allows attacker to read/write arbitrary files with the permissions of the program user.
Patch fixes an error which allows someone with control over a realm to impersonate anyone in the cross-realm trust path.
A URL can be crafted to be ignored (and automatically pass) by Squid's ACL system.
A remote attacker could cause the oftpd process to crash by specifying a large value in a PORT command.
As usual for temporary file vulnerabilities, this allows local users to read/overwrite arbitrary files with the permissions of the running user.
This patch removes setuid root from vfte, which has a number of known buffer overflows.
This vulnerability can be exploited by an attacker to expose the content of arbitrary variables.
Herein is combined the Debian advisories for the same kernel bugs on both the mips and pa-risc platforms.
An attacker could exploit this bug to insert SQL statements.
Ulf Harnhammar discovered a number of vulnerabilities in emil, both various buffer overflows and format string bugs.
New version fixes multiple buffer overflows plus password disclosure vulnerability.
This patch corrects a root exploit specifically for the 2.2.x kernel on the PowerPC platform.
A malformed BMP file can remotely crash programs using this library, such as Evolution.
Remote attacker can crash OpenSSL by triggering a null pointer dereference.