Advisories: Debian

Here are the latest security advisories for the Debian Linux distribution:

  • DSA-5635-1 yard - security update
    Aviv Keller discovered that the frames.html file generated by YARD, a documentation generation tool for the Ruby programming language, was vulnerable to cross-site scripting. https://security-tracker.debian.org/tracker/DSA-5635-1
  • DSA-5634-1 chromium - security update
    Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. https://security-tracker.debian.org/tracker/DSA-5634-1
  • DSA-5633-1 knot-resolver - security update
    It was discovered that malformed DNSSEC records within a DNS zone could result in denial of service against Knot Resolver, a caching, DNSSEC- validating DNS resolver. https://security-tracker.debian.org/tracker/DSA-5633-1
  • DSA-5631-1 iwd - security update
    It was discovered that iwd, the iNet Wireless Daemon, does not properly handle messages in the 4-way handshake used when connecting to a protected WiFi network for the first time. An attacker can take advantage of this flaw to gain unauthorized access to a protected WiFi network if iwd is operating in Access Point (AP) mode. https://security-tracker.debian.org/tracker/DSA-5631-1
  • DSA-5630-1 thunderbird - security update
    Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code. https://security-tracker.debian.org/tracker/DSA-5630-1
  • DSA-5629-1 chromium - security update
    Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. https://security-tracker.debian.org/tracker/DSA-5629-1
  • DSA-5628-1 imagemagick - security update
    This update fixes multiple vulnerabilities in Imagemagick: Various memory handling problems and cases of missing or incomplete input sanitising may result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed image files are processed. https://security-tracker.debian.org/tracker/DSA-5628-1
  • DSA-5627-1 firefox-esr - security update
    Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, information disclosure or spoofing. https://security-tracker.debian.org/tracker/DSA-5627-1
  • DSA-5626-1 pdns-recursor - security update
    It was discovered that malformed DNSSEC records within a DNS zone could result in denial of service against PDNS Recursor, a resolving name server. https://security-tracker.debian.org/tracker/DSA-5626-1
  • DSA-5625-1 engrampa - security update
    It was discovered that Engrampa, an archive manager for the MATE desktop environment was susceptible to path traversal when handling CPIO archives. https://security-tracker.debian.org/tracker/DSA-5625-1
  • DSA-5624-1 edk2 - security update
    Mate Kukri discovered the Debian build of EDK2, a UEFI firmware implementation, used an insecure default configuration which could result in Secure Boot bypass via the UEFI shell. This updates disables the UEFI shell if Secure Boot is used. https://security-tracker.debian.org/tracker/DSA-5624-1
  • DSA-5623-1 postgresql-15 - security update
    It was discovered that a late privilege drop in the "REFRESH MATERIALIZED VIEW CONCURRENTLY" command could allow an attacker to trick a user with higher privileges to run SQL commands with these permissions. https://security-tracker.debian.org/tracker/DSA-5623-1
  • DSA-5622-1 postgresql-13 - security update
    It was discovered that a late privilege drop in the "REFRESH MATERIALIZED VIEW CONCURRENTLY" command could allow an attacker to trick a user with higher privileges to run SQL commands with these permissions. https://security-tracker.debian.org/tracker/DSA-5622-1
  • DSA-5621-1 bind9 - security update
    Several vulnerabilities were discovered in BIND, a DNS server implementation, which may result in denial of service. https://security-tracker.debian.org/tracker/DSA-5621-1
  • DSA-5620-1 unbound - security update
    Two vulnerabilities were discovered in unbound, a validating, recursive, caching DNS resolver. Specially crafted DNSSEC answers could lead unbound down a very CPU intensive and time costly DNSSEC (CVE-2023-50387) or NSEC3 hash (CVE-2023-50868) validation path, resulting in denial of service. Details can be found at https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt https://security-tracker.debian.org/tracker/DSA-5620-1
  • DSA-5619-1 libgit2 - security update
    Two vulnerabilities were discovered in libgit2, a low-level Git library, which may result in denial of service or potentially the execution of arbitrary code. https://security-tracker.debian.org/tracker/DSA-5619-1
  • DSA-5618-1 webkit2gtk - security update
    The following vulnerabilities have been discovered in the WebKitGTK web engine: CVE-2024-23206 An anonymous researcher discovered that a maliciously crafted webpage may be able to fingerprint the user. CVE-2024-23213 Wangtaiyu discovered that processing web content may lead to arbitrary code execution. CVE-2024-23222 Apple discovered that processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. https://security-tracker.debian.org/tracker/DSA-5618-1
  • DSA-5617-1 chromium - security update
    Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. https://security-tracker.debian.org/tracker/DSA-5617-1
  • DSA-5616-1 ruby-sanitize - security update
    It was discovered that ruby-sanitize, a whitelist-based HTML sanitizer, insufficiently sanitised elements, which may result in cross-site scripting. https://security-tracker.debian.org/tracker/DSA-5616-1
  • DSA-5615-1 runc - security update
    It was discovered that runc, a command line client for running applications packaged according to the Open Container Format (OCF), was suspectible to multiple container breakouts due to an internal file descriptor leak. https://security-tracker.debian.org/tracker/DSA-5615-1
  • More...

Tell me what you are thinking?