Advisories: Debian

Here are the latest security advisories for the Debian Linux distribution:

  • DSA-5717-1 php8.2 - security update
    It was discovered that user validation was incorrectly implemented for filter_var(FILTER_VALIDATE_URL). https://security-tracker.debian.org/tracker/DSA-5717-1
  • DSA-5716-1 chromium - security update
    Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. https://security-tracker.debian.org/tracker/DSA-5716-1
  • DSA-5715-1 composer - security update
    Two vulnerabilities have been discovered in Composer, a dependency manager for PHP, which could result in arbitrary command execution by operating on malicious git/hg repositories. https://security-tracker.debian.org/tracker/DSA-5715-1
  • DSA-5714-1 roundcube - security update
    Huy Nguyễn Phạm Nhật, and Valentin T. and Lutz Wolf of CrowdStrike, discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, did not correctly process and sanitize requests. This would allow an attacker to perform Cross-Side Scripting (XSS) attacks. https://security-tracker.debian.org/tracker/DSA-5714-1
  • DSA-5713-1 libndp - security update
    A buffer overflow was discovered in libndp, a library implementing the IPv6 Neighbor Discovery Protocol (NDP), which could result in denial of service or potentially the execution of arbitrary code if malformed IPv6 router advertisements are processed. https://security-tracker.debian.org/tracker/DSA-5713-1
  • DSA-5712-1 ffmpeg - security update
    Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed. https://security-tracker.debian.org/tracker/DSA-5712-1
  • DSA-5711-1 thunderbird - security update
    Multiple security issues were discovered in Thunderbird, which could result inthe execution of arbitrary code. https://security-tracker.debian.org/tracker/DSA-5711-1
  • DSA-5710-1 chromium - security update
    Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. https://security-tracker.debian.org/tracker/DSA-5710-1
  • DSA-5709-1 firefox-esr - security update
    Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, the bypass of sandbox restrictions or an information leak. https://security-tracker.debian.org/tracker/DSA-5709-1
  • DSA-5708-1 cyrus-imapd - security update
    Damian Poddebniak discovered that the Cyrus IMAP server didn't restrict memory allocation for some command arguments which may result in denial of service. This update backports new config directives which allow to configure limits, additional details can be found at: https://www.cyrusimap.org/3.6/imap/download/release-notes/3.6/x/3.6.5.html These changes are too intrusive to be backported to the version of Cyrus in the oldstable distribution (bullseye). If the IMAP server is used by untrusted users an update to Debian stable/bookworm is recommended. In addition the version of cyrus-imapd in bullseye-backports will be updated with a patch soon. https://security-tracker.debian.org/tracker/DSA-5708-1
  • DSA-5707-1 vlc - security update
    A buffer overflow was discovered in the MMS module of the VLC media player. https://security-tracker.debian.org/tracker/DSA-5707-1
  • DSA-5706-1 libarchive - security update
    An integer overflow vulnerability in the rar e8 filter was discovered in libarchive, a multi-format archive and compression library, which may result in the execution of arbitrary code if a specially crafted RAR archive is processed. https://security-tracker.debian.org/tracker/DSA-5706-1
  • DSA-5705-1 tinyproxy - security update
    A use-after-free was discovered in tinyproxy, a lightweight, non-caching, optionally anonymizing HTTP proxy, which could result in denial of service. https://security-tracker.debian.org/tracker/DSA-5705-1
  • DSA-5704-1 pillow - security update
    Multiple security issues were discovered in Pillow, a Python imaging library, which could result in denial of service or the execution of arbitrary code if malformed images are processed. https://security-tracker.debian.org/tracker/DSA-5704-1
  • DSA-5703-1 linux - security update
    Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. https://security-tracker.debian.org/tracker/DSA-5703-1
  • DSA-5702-1 gst-plugins-base1.0 - security update
    An integer overflow in the EXIF metadata parsing was discovered in the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed file is processed. https://security-tracker.debian.org/tracker/DSA-5702-1
  • DSA-5701-1 chromium - security update
    Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. https://security-tracker.debian.org/tracker/DSA-5701-1
  • DSA-5700-1 python-pymysql - security update
    An SQL injection was discovered in pymysql, a pure Python MySQL driver. https://security-tracker.debian.org/tracker/DSA-5700-1
  • DSA-5699-1 redmine - security update
    Multiple cross-site scripting vulnerabilities were found in Redmine, a project management web application. https://security-tracker.debian.org/tracker/DSA-5699-1
  • DSA-5698-1 ruby-rack - security update
    Multiple security issues were found in Rack, an interface for developing web applications in Ruby, which could result in denial of service. https://security-tracker.debian.org/tracker/DSA-5698-1
  • More...

Tell me what you are thinking?