Debian Essential And Critical Security Patch Updates - Page 284
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Insufficient bounds checking could lead to execution of arbitrary code, provided by a malicious FTP server.
There is a vulnerability that can lead to an anonymous user gaining root access on a Samba serving system.
Two scripts in the metrics package, "halstead" and "gather_stats", open temporary files without taking appropriate security precautions.
Byrial Jensen discovered a couple of off-by-one buffer overflow in the IMAP code of Mutt, a text-oriented mail reader supporting IMAP, MIME, GPG, PGP and threading.
This is a major brown paperbag update. The old packages for the stable distribution (woody) did not work as expected and you should only update to the new packages mentioned in this advisory.
There is a buffer overflow, triggered by a char to int conversion, in the address parsing code in sendmail.
The controlling and management daemon apcupsd for APC's UPS's is vulnerable to several buffer overflows and format string attacks.
The kernel module loader in Linux 2.2 and Linux 2.4 kernels has a flaw in ptrace.
A buffer overflow has been discovered in lpr, a BSD lpr/lpd line printer spooling system.
Byrial Jensen discovered a couple of off-by-one buffer overflow in the IMAP code of Mutt, a text-oriented mail reader supporting IMAP, MIME, GPG, PGP and threading.
A cryptographic weakness in version 4 of the Kerberos protocol allows an attacker to use a chosen-plaintext attack to impersonate any principal in a realm.
There is an integer overflow in the xdrmem_getbytes() function of glibc, that is also present in dietlibc.
This vulnerability enables an attacker to reset the password of any user defined on the list server, including the list admins.
The kernel module loader in Linux 2.2 and Linux 2.4 kernels has a flaw in ptrace.
A cryptographic weakness in version 4 of the Kerberos protocol allows an attacker to use a chosen-plaintext attack to impersonate any principal in a realm.
Core Security Technologies discovered a buffer overflow in the IMAP code of Mutt.
A buffer overflow has been discovered in lpr, a BSD lpr/lpd lineprinter spooling system.
Several vulnerabilities have been discovered in krb5, an implementation of MIT Kerberos.
There is a vulnerability that allows a remote attacker to read arbitrary files on the host system as user www-data.