Debian 10720 Published by Philipp Esselbach 0

Steven Barrett has released a new Liquorix Linux Kernel based on Kernel 5.10.8 with 5.10.9 RC patches for Debian GNU/Linux and Ubuntu Linux. This version is currently not compatible with VirtualBox 6.1.16-dfsg-6 from Debian Unstable.

Debian 10720 Published by Philipp Esselbach 0

A ruby-redcarpet security update has been released for Debian GNU/Linux 8 Extended LTS to address an injection vulnerability which can enable a cross-site scripting attack.

Debian 10720 Published by Philipp Esselbach 0

A chromium security update has been released for Debian GNU/Linux 10 to address multiple security issues, which could result in the execution of arbitrary code, denial of service or information disclosure.

Debian 10720 Published by Philipp Esselbach 0

A wavpack security update has been released for Debian GNU/Linux 9 LTS to address multiple vulnerabilites in wavpack were found, like OOB read (which could potentially lead to a DOS attack), unexpected control flow, crashes, integer overflow, and segfaults.

Debian 10720 Published by Philipp Esselbach 0

A wavpack security update has been released for Debian GNU/Linux 8 Extended LTS to address multiple vulnerabilities like OOB read (which could potentially lead to a DOS attack), unexpected control flow, crashes, integer overflow, and segfaults.

Debian 10720 Published by Philipp Esselbach 0

A flatpak security update has been released for Debian GNU/Linux 10 to address a bug in the flatpak-portal service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape).

Debian 10720 Published by Philipp Esselbach 0

A coturn security update has been released for Debian GNU/Linux 9 LTS to address a flaw where a remote attacker can bypass the protection via a specially crafted request using a peer address of '0.0.0.0' and trick coturn in relaying to the loopback interface.

Debian 10720 Published by Philipp Esselbach 0

A coturn security update has been released for Debian GNU/Linux 10 to address a flaw where a remote attacker can bypass the protection via a specially crafted request using a peer address of '0.0.0.0' and trick coturn in relaying to the loopback interface.

Debian 10720 Published by Philipp Esselbach 0

An apt security update has been released for Debian GNU/Linux 8 Extended LTS to fix a missing input validation in the ar/tar implementations of APT.