Latest debian debian linux Vulnerabilities

Out-of-bounds read in bson module of PyMongo
pip/pymongo<4.6.3
Mongodb Pymongo<4.6.3
Debian Debian Linux=10.0
In wpa_supplicant, a flaw was discovered in the implementation of PEAP, which allows an attacker to skip the second phase of authentication when the target device has not been properly configured to v...
W1.fi Wpa Supplicant<2.10
Google Android
Google Chrome OS
Linux Linux kernel
Debian Debian Linux=10.0
Fedoraproject Fedora=39
and 2 more
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
Mozilla Firefox ESR<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
A malicious devtools extension could have been used to escalate privileges.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderb...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 8 more
A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 12...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
Pillow 10.2.0 released, fixes CVE-2023-50447
pip/Pillow<10.2.0
Python Pillow<=10.1.0
Debian Debian Linux=10.0
ubuntu/pillow<7.0.0-4ubuntu0.8
ubuntu/pillow<9.0.1-1ubuntu0.2
ubuntu/pillow<10.0.0-1ubuntu0.1
and 2 more
Gnutls: rejects certificate chain with distributed trust
redhat/GnuTLS<3.8.3
ubuntu/gnutls28<3.7.3-4ubuntu1.4
ubuntu/gnutls28<3.7.8-5ubuntu1.2
ubuntu/gnutls28<3.8.1-4ubuntu1.2
ubuntu/gnutls28<3.8.3-1ubuntu1
ubuntu/gnutls28<3.8.3-1
and 8 more
An unspecified vulnerability in Java SE related to the Scripting component could allow a remote attacker to cause high confidentiality impact.
ubuntu/openjdk-8<8
ubuntu/openjdk-8<8
ubuntu/openjdk-8<8
ubuntu/openjdk-8<8
ubuntu/openjdk-lts<11.0.22+7-0ubuntu2~18.04.1
ubuntu/openjdk-lts<11.0.22+7-0ubuntu2~20.04.1
and 25 more
An unspecified vulnerability in Java SE related to the Security component could allow a remote attacker to cause high confidentiality impact and high integrity impact.
ubuntu/openjdk-17<17.0.10+7-1~18.04.1
ubuntu/openjdk-17<17.0.10+7-1~20.04.1
ubuntu/openjdk-17<17.0.10+7-1~22.04.1
ubuntu/openjdk-17<17.0.10+7-1~23.10.1
ubuntu/openjdk-21<21.0.2+13-1~20.04.1
ubuntu/openjdk-21<21.0.2+13-1~22.04.1
and 32 more
An unspecified vulnerability in Java SE related to the VM component could allow a remote attacker to cause high confidentiality impact and high integrity impact.
ubuntu/openjdk-17<17.0.10+7-1~18.04.1
ubuntu/openjdk-17<17.0.10+7-1~20.04.1
ubuntu/openjdk-17<17.0.10+7-1~22.04.1
ubuntu/openjdk-17<17.0.10+7-1~23.10.1
ubuntu/openjdk-21<21.0.2+13-1~20.04.1
ubuntu/openjdk-21<21.0.2+13-1~22.04.1
and 32 more
Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer
ubuntu/xorg-server<2:1.19.6-1ubuntu4.15+
ubuntu/xorg-server<2:1.20.13-1ubuntu1~20.04.14
ubuntu/xorg-server<2:21.1.4-2ubuntu1.7~22.04.7
ubuntu/xorg-server<2:21.1.7-1ubuntu3.6
ubuntu/xorg-server<2:21.1.7-3ubuntu2.6
ubuntu/xorg-server<2:21.1.11-1ubuntu1
and 18 more
An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.
Linux Linux kernel>2.6.12<6.6.8
Linux Linux kernel=2.6.12-rc2
Linux Linux kernel=2.6.12-rc3
Linux Linux kernel=2.6.12-rc4
Linux Linux kernel=2.6.12-rc5
Linux Linux kernel=2.6.12-rc6
and 138 more
An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.
Linux Linux kernel>2.6.12<6.6.8
Linux Linux kernel=2.6.12-rc2
Linux Linux kernel=2.6.12-rc3
Linux Linux kernel=2.6.12-rc4
Linux Linux kernel=2.6.12-rc5
Linux Linux kernel=2.6.12-rc6
and 88 more
An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.
ubuntu/linux<4.15.0-222.233
ubuntu/linux<5.4.0-173.191
ubuntu/linux<5.15.0-97.107
ubuntu/linux<6.5.0-21.21
ubuntu/linux<4.4.0-251.285
ubuntu/linux-aws<4.15.0-1165.178
and 86 more
Spreadsheet::ParseExcel Remote Code Execution Vulnerability
Google Chrome=120.0.6099.129/130
Spreadsheet::ParseExcel Spreadsheet::ParseExcel=0.65
Spreadsheet::ParseExcel Spreadsheet::ParseExcel
Jmcnamara Spreadsheet\<=0.65
Debian Debian Linux=10.0
Fedoraproject Fedora=38
and 8 more
Exim: SMTP smuggling
Exim Exim<4.97.1
Fedoraproject Extra Packages For Enterprise Linux=7.0
Fedoraproject Extra Packages For Enterprise Linux=8.0
Fedoraproject Extra Packages For Enterprise Linux=9.0
Fedoraproject Fedora=38
Fedoraproject Fedora=39
and 9 more
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR < 115.6, Thund...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 13 more
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the ...
Mozilla Thunderbird<115.6
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
and 6 more
A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more
A use-after-free was identified in the `nsDNSService::Init`. This issue appears to manifest rarely during start-up. External Reference: <a href="https://www.mozilla.org/en-US/security/advisories/mfs...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
and 10 more
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the messa...
Mozilla Thunderbird<115.6
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
and 6 more
Firefox was susceptible to a heap buffer overflow in `nsTextFragment` due to insufficient OOM handling. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more
Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more
Heap buffer overflow in WebRTC
debian/chromium<=90.0.4430.212-1~deb10u1<=116.0.5845.180-1~deb11u1<=119.0.6045.199-1~deb12u1
Microsoft Edge<120.0.2210.91
Google Chrome=120.0.6099.224
Google Chrome=120.0.6099.225
Google Chrome=120.0.6099.234
Microsoft Edge (Chromium-based)
and 6 more
The `VideoBridge` allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more
When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. *This bug only affects Firefox on Unix-based operating systems (Android, Linux,...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 17 more
Memory safety bugs present in Firefox 120. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code....
Mozilla Firefox<121
Mozilla Firefox<121.0
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Debian Debian Linux=12.0
ubuntu/firefox<121.0+
and 2 more
The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by ...
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox ESR<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
Mozilla Firefox ESR<115.6
and 6 more
The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more
The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and...
Mozilla Thunderbird<115.6
Mozilla Firefox ESR<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 14 more
`EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. T...
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox ESR<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
Mozilla Firefox ESR<115.6
and 6 more
, CVE-2023-6004: OpenSSH, libssh: Security weakness in ProxyCommand handling
Openbsd Openssh<9.6
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Debian Debian Linux=12.0
redhat/openssh<9.6
ubuntu/openssh<1:7.6
and 18 more
In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constr...
ubuntu/openssh<1:8.9
ubuntu/openssh<1:9.0
ubuntu/openssh<1:9.3
ubuntu/openssh<1:9.6
ubuntu/openssh<1:9.6
Apple macOS Sonoma<14.4
and 4 more
Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
Openbsd Openssh<9.6
Putty Putty<0.80
Filezilla-project Filezilla Client<3.66.4
Microsoft PowerShell<=11.1.0
Panic Transmit 5<5.10.4
Apple macOS
and 128 more
Processing an image may lead to a denial-of-service. The issue was addressed with improved memory handling. WebKit Bugzilla: 263349 Reference: <a href="https://seclists.org/fulldisclosure/2023/Dec/6"...
ubuntu/webkit2gtk<2.42.4-0ubuntu0.22.04.1
ubuntu/webkit2gtk<2.42.4-0ubuntu0.23.04.1
ubuntu/webkit2gtk<2.42.4-0ubuntu0.23.10.1
ubuntu/wpewebkit<2.42.4-1
debian/webkit2gtk<=2.36.4-1~deb10u1<=2.38.6-0+deb10u1<=2.42.2-1~deb11u1<=2.42.2-1~deb12u1
debian/wpewebkit<=2.38.6-1~deb11u1<=2.38.6-1
and 18 more
Link targets allow arbitrary script execution
Libreoffice Libreoffice>=7.5.0<7.5.9
Libreoffice Libreoffice>=7.6.0<7.6.4
Fedoraproject Fedora=38
Debian Debian Linux=11.0
Debian Debian Linux=12.0
ubuntu/libreoffice<1:6.4.7-0ubuntu0.20.04.9
and 7 more
Improper input validation enabling arbitrary Gstreamer pipeline injection
Libreoffice Libreoffice>=7.5.0<7.5.9
Libreoffice Libreoffice>=7.6.0<7.6.3
Fedoraproject Fedora=38
Debian Debian Linux=11.0
Debian Debian Linux=12.0
ubuntu/libreoffice<1:6.4.7-0ubuntu0.20.04.9
and 7 more
Xorg-x11-server: out-of-bounds memory read in rrchangeoutputproperty and rrchangeproviderproperty
ubuntu/xorg-server<2:1.19.6-1ubuntu4.15+
ubuntu/xorg-server<2:1.20.13-1ubuntu1~20.04.12
ubuntu/xorg-server<2:21.1.4-2ubuntu1.7~22.04.5
ubuntu/xorg-server<2:21.1.7-1ubuntu3.4
ubuntu/xorg-server<2:21.1.7-3ubuntu2.4
ubuntu/xorg-server<2:21.1.10-1ubuntu1
and 28 more
Xorg-x11-server: out-of-bounds memory reads/writes in xkb button actions
ubuntu/xorg-server<2:1.19.6-1ubuntu4.15+
ubuntu/xorg-server<2:1.20.13-1ubuntu1~20.04.12
ubuntu/xorg-server<2:21.1.4-2ubuntu1.7~22.04.5
ubuntu/xorg-server<2:21.1.7-1ubuntu3.4
ubuntu/xorg-server<2:21.1.7-3ubuntu2.4
ubuntu/xorg-server<2:21.1.10-1ubuntu1
and 27 more
High Use after free in Side Panel Search[1513379] High CVE-2024-0333 Insufficient data validation in Extensions[306119937] Medium Fixes in Kernel for CVEs listed belowCVE-2023-21162, CVE-2023...
debian/chromium<=90.0.4430.212-1~deb10u1<=116.0.5845.180-1~deb11u1<=119.0.6045.199-1~deb12u1
Microsoft Edge<120.0.2210.61
Microsoft Edge (Chromium-based)
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Fedoraproject Fedora=38
and 2 more
Improper input leads to DoS
Sierra OT/IoT routers
Sierra Wireless AirLink cellular routers
OpenNDS open Network Demarcation Service
Sierrawireless Aleos<=4.16.0
Sierrawireless Es450
and 7 more
Out-of-bounds write in Linux kernel's Performance Events system component
Linux Linux kernel>=4.3<6.7
Debian Debian Linux=10.0
IBM QRadar SIEM<=7.5 - 7.5.0 UP8 IF01
ubuntu/linux-hwe<4.15.0-221.232~16.04.1
ubuntu/linux-hwe<6.7~
ubuntu/linux-hwe-5.4<5.4.0-170.188~18.04.1
and 134 more
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injecti...
debian/bluez<=5.55-3.1<=5.66-1<=5.70-1
Apple iOS
Apple macOS
Android Android=4.2.2-10
Linux Linux
Ubuntu Ubuntu=18.04
and 42 more
Integer overflow in Skia
debian/chromium<=90.0.4430.212-1~deb10u1<=116.0.5845.180-1~deb11u1
Microsoft Edge<119.0.2151.97
Google Chrome<119.0.6045.199
Google Chrome=120.0.6099.224
Google Chrome=120.0.6099.225
Google Chrome=120.0.6099.234
and 9 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203