Debian 10716 Published by Philipp Esselbach 0

A libpam-krb5 security update has been released for Debian GNU/Linux 8 LTS to address a buffer overflow that might have caused remote code execution in situations involving supplemental prompting by a Kerberos library.

Debian 10716 Published by Philipp Esselbach 0

A php-horde-form security update has been released for Debian GNU/Linux 8 LTS to address a remote code execution vulnerability in the Form API component of the Horde Application Framework.

Debian 10716 Published by Philipp Esselbach 0

A php5 security update has been released for Debian GNU/Linux 8 LTS to address the following two security issues: 1) CVE-2020-7062 is about a possible null pointer derefernce, which would
likely lead to a crash, during a failed upload with progress tracking, 2) CVE-2020-7063 is about wrong file permissions of files added to tar with Phar::buildFromIterator when extracting them again.

Debian 10716 Published by Philipp Esselbach 0

A libbsd security update has been released for Debian GNU/Linux 7 Extended LTS to address an out-of-bounds read vulnerability during string comparisons.

Debian 10716 Published by Philipp Esselbach 0

A bluez security update has been released for both Debian GNU/Linux 9 and 10 to fix an issue that BlueZ's HID and HOGP profile implementations don't specifically require bonding between the device and the host.

Debian 10716 Published by Philipp Esselbach 0

A icu security update has been released for both Debian GNU/Linux 9 and 10 to address an integer overflow in the International Components for Unicode (ICU) library which could result in denial of service and potentially the execution of arbitrary code.

Debian 10716 Published by Philipp Esselbach 0

A okular security update has been released for both Debian GNU/Linux 8 LTS to address a security issue which allows code execution via an action link in a PDF document.

Debian 10716 Published by Philipp Esselbach 0

A ruby2.1 security update has been released for Debian GNU/Linux 8 LTS to address a heap overflow vulnerability in the Psych::Emitter startdocument function of Ruby.

Debian 10716 Published by Philipp Esselbach 0

A weechat security update has been released for Debian GNU/Linux 8 LTS to fix an issue with crafted messages, that could result in a buffer overflow and application crash.