Debian LTS Essential and Critical Security Patch Updates - Page 32
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code. For Debian 10 buster, these problems have been fixed in version
Multiple security issues were discovered in 389-ds-base: an open source LDAP server for Linux. CVE-2019-3883
CVE-2023-27533 A vulnerability in input validation exists in curl during communication using the TELNET protocol may allow an attacker to pass on
It was discovered that there was a potential denial of service vulnerabilty in connman, a command-line network manager designed for use on embedded devices.
It was discovered that there was a potential remote denial of service vulnerability in Redis, a popular 'NoSQL' key-value database. Authenticated users could have used the `HINCRBYFLOAT` command to
The previous golang-1.11 update released as DLA-3395-1 failed to build reliably on the armhf architecture, due to intermittent ("flaky") test cases in the test suite, which is run on package build as part of Debian quality assurance. This update disables a few such tests and
Multiple vulnerabilities were discovered in the Go programming language. An attacker could trigger a denial-of-service (DoS), invalid cryptographic computation, information leak, or arbitrary code execution on the developer's computer in specific situations.
A flaw was found in Asterisk, an Open Source Private Branch Exchange. A buffer overflow vulnerability affects users that use PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue
This update fixes a NULL pointer derference and two denial of service conditions in in protobuf. CVE-2021-22569
Two ruby-rack issues have been addressed: CVE-2023-27530
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or spoofing.
* The following was previously incorrectly announced to this list * * as DLA-3388-1. The correct DLA identifier for this advisory is * * DLA-3389-1. *
Several security vulnerabilities have been discovered in zabbix, a network monitoring solution, potentially allowing User Enumeration, Cross-Site-Scripting or Cross-Site Request Forgery.
A flaw was found in keepalived, a failover and monitoring daemon for LVS clusters, where an improper authentication vulnerability allows an unprivileged user to change properties that could lead to an access-control bypass.
It was discovered that there were two potential denial of service (DoS) attacks in lldpd, a implementation of the IEEE 802.1ab (LLDP) protocol used to administer and monitor networking devices.
A regression was reported that the fix for CVE-2021-3802 broken mounting allow-listed mount option/value pairs, for example errors=remount-ro. For Debian 10 buster, this problem has been fixed in version
Stefan Walter found that udisks2, a service to access and manipulate storage devices, could cause denial of service via system crash if a corrupted or specially crafted ext2/3/4 device or image was mounted, which could happen automatically on certain environments.
It was discovered that there was a potential path-traversal vulnerability in GruntJS, a multipurpose task runner and build system tool. This could have been exploited via malicious symlinks.
Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in HTTP request smuggling, cache poisoning or information disclosure.
It was discovered that there was a potential local privilege escalation in GruntJS, a multipurpose task runner and build system tool.