Latest Debian Vulnerabilities

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Ph...
W1.fi Wpa Supplicant<2.10
Google Android
Google Chrome OS
Linux Linux kernel
Debian Debian Linux=10.0
Fedoraproject Fedora=39
and 2 more
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
Mozilla Firefox ESR<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 12...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
A malicious devtools extension could have been used to escalate privileges.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderb...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 8 more
A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox ESR<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 11 more
Pillow 10.2.0 released, fixes CVE-2023-50447
pip/Pillow<10.2.0
Python Pillow<=10.1.0
Debian Debian Linux=10.0
ubuntu/pillow<7.0.0-4ubuntu0.8
ubuntu/pillow<9.0.1-1ubuntu0.2
ubuntu/pillow<10.0.0-1ubuntu0.1
and 2 more
An unspecified vulnerability in Java SE related to the Scripting component could allow a remote attacker to cause high confidentiality impact.
Oracle GraalVM=20.3.12
Oracle GraalVM=21.3.8
Oracle GraalVM=22.3.4
Oracle GraalVM for JDK=17.0.9
Oracle GraalVM for JDK=21.0.1
Oracle JDK=1.8.0-update391
and 25 more
An unspecified vulnerability in Java SE related to the Security component could allow a remote attacker to cause high confidentiality impact and high integrity impact.
Oracle GraalVM=20.3.12
Oracle GraalVM=21.3.8
Oracle GraalVM=22.3.4
Oracle GraalVM for JDK=17.0.9
Oracle GraalVM for JDK=21.0.1
Oracle JDK=1.8.0-update391
and 32 more
An unspecified vulnerability in Java SE related to the VM component could allow a remote attacker to cause high confidentiality impact and high integrity impact.
Oracle GraalVM=20.3.12
Oracle GraalVM=21.3.8
Oracle GraalVM=22.3.4
Oracle GraalVM for JDK=17.0.9
Oracle GraalVM for JDK=21.0.1
Oracle JDK=1.8.0-update391
and 32 more
Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer
X.org Xorg-server<21.1.11
X.org Xwayland<23.2.4
Fedoraproject Fedora=39
Redhat Enterprise Linux Desktop=7.0
Redhat Enterprise Linux Server=7.0
Redhat Enterprise Linux Workstation=7.0
and 16 more
An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.
Linux Linux kernel>2.6.12<6.6.8
Linux Linux kernel=2.6.12-rc2
Linux Linux kernel=2.6.12-rc3
Linux Linux kernel=2.6.12-rc4
Linux Linux kernel=2.6.12-rc5
Linux Linux kernel=2.6.12-rc6
and 138 more
An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.
Linux Linux kernel>2.6.12<6.6.8
Linux Linux kernel=2.6.12-rc2
Linux Linux kernel=2.6.12-rc3
Linux Linux kernel=2.6.12-rc4
Linux Linux kernel=2.6.12-rc5
Linux Linux kernel=2.6.12-rc6
and 85 more
An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.
Linux Linux kernel>2.6.12<6.6.8
Linux Linux kernel=2.6.12-rc2
Linux Linux kernel=2.6.12-rc3
Linux Linux kernel=2.6.12-rc4
Linux Linux kernel=2.6.12-rc5
Linux Linux kernel=2.6.12-rc6
and 88 more
Spreadsheet::ParseExcel Remote Code Execution Vulnerability
Google Chrome=120.0.6099.129/130
Spreadsheet::ParseExcel Spreadsheet::ParseExcel=0.65
Spreadsheet::ParseExcel Spreadsheet::ParseExcel
Google Chrome<=0.65
Debian Debian Linux=10.0
Fedoraproject Fedora=38
and 1 more
Exim: SMTP smuggling
ubuntu/exim4<4.86.2-2ubuntu2.6+
ubuntu/exim4<4.90.1-1ubuntu1.10+
ubuntu/exim4<4.93-13ubuntu1.10
ubuntu/exim4<4.95-4ubuntu2.5
ubuntu/exim4<4.96-17ubuntu2.2
ubuntu/exim4<4.97-3
and 8 more
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the messa...
Mozilla Thunderbird<115.6
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
and 6 more
Firefox was susceptible to a heap buffer overflow in `nsTextFragment` due to insufficient OOM handling. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 13 more
Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 13 more
A use-after-free was identified in the `nsDNSService::Init`. This issue appears to manifest rarely during start-up. External Reference: <a href="https://www.mozilla.org/en-US/security/advisories/mfs...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
and 9 more
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR < 115.6, Thund...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 12 more
When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. *This bug only affects Firefox on Unix-based operating systems (Android, Linux,...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
Mozilla Firefox<121
redhat/firefox<115.6
redhat/thunderbird<115.6
ubuntu/firefox<121.0+
and 16 more
The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by ...
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox ESR<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
Mozilla Firefox ESR<115.6
and 6 more
`EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. T...
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox ESR<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
Mozilla Firefox ESR<115.6
and 6 more
Memory safety bugs present in Firefox 120. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code....
Mozilla Firefox<121
Mozilla Firefox<121.0
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Debian Debian Linux=12.0
ubuntu/firefox<121.0+
and 2 more
The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 13 more
The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and...
Mozilla Thunderbird<115.6
Mozilla Firefox ESR<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 13 more
A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 13 more
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the ...
Mozilla Thunderbird<115.6
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
and 6 more
Heap buffer overflow in WebRTC
debian/chromium<=90.0.4430.212-1~deb10u1<=116.0.5845.180-1~deb11u1<=119.0.6045.199-1~deb12u1
Microsoft Edge<120.0.2210.91
Google Chrome=120.0.6099.224
Google Chrome=120.0.6099.225
Google Chrome=120.0.6099.234
Microsoft Edge (Chromium-based)
and 6 more
The `VideoBridge` allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
Mozilla Firefox<121
Mozilla Firefox<121.0
and 13 more
, CVE-2023-6004: OpenSSH, libssh: Security weakness in ProxyCommand handling
Openbsd Openssh<9.6
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Debian Debian Linux=12.0
ubuntu/openssh<1:7.6
ubuntu/openssh<1:8.2
and 6 more
Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
pip/paramiko>=2.5.0<3.4.0
go/golang.org/x/crypto<0.17.0
rust/russh<0.40.2
Apple macOS Sonoma<14.4
redhat/PuTTY<0.80
redhat/AsyncSSH<2.14.1
and 121 more
The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, iOS 17.2 and iPadOS 17.2, watchOS 10.2, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. Processin...
ubuntu/webkit2gtk<2.42.4-0ubuntu0.22.04.1
ubuntu/webkit2gtk<2.42.4-0ubuntu0.23.04.1
ubuntu/webkit2gtk<2.42.4-0ubuntu0.23.10.1
ubuntu/wpewebkit<2.42.4-1
debian/webkit2gtk<=2.36.4-1~deb10u1<=2.38.6-0+deb10u1<=2.42.2-1~deb11u1<=2.42.2-1~deb12u1
debian/wpewebkit<=2.38.6-1~deb11u1<=2.38.6-1
and 18 more
Improper input validation enabling arbitrary Gstreamer pipeline injection
Libreoffice Libreoffice>=7.5.0<7.5.9
Libreoffice Libreoffice>=7.6.0<7.6.3
Fedoraproject Fedora=38
Debian Debian Linux=11.0
Debian Debian Linux=12.0
redhat/LibreOffice<7.5.9
and 7 more
Link targets allow arbitrary script execution
Libreoffice Libreoffice>=7.5.0<7.5.9
Libreoffice Libreoffice>=7.6.0<7.6.4
Fedoraproject Fedora=38
Debian Debian Linux=11.0
Debian Debian Linux=12.0
redhat/LibreOffice<7.5.9
and 7 more
Xorg-x11-server: out-of-bounds memory read in rrchangeoutputproperty and rrchangeproviderproperty
redhat/xorg-server<21.1.10
redhat/xwayland<23.2.3
ubuntu/xorg-server<2:1.18.4-0ubuntu0.12+
ubuntu/xorg-server<2:1.19.6-1ubuntu4.15+
ubuntu/xorg-server<21.1.10
ubuntu/xorg-server<2:1.20.13-1ubuntu1~20.04.12
and 26 more
Xorg-x11-server: out-of-bounds memory reads/writes in xkb button actions
Redhat Enterprise Linux Eus=9.2
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Debian Debian Linux=12.0
X.Org X Server<21.1.10
Redhat Enterprise Linux=6.0
and 26 more
High Use after free in Side Panel Search[1513379] High CVE-2024-0333 Insufficient data validation in Extensions[306119937] Medium Fixes in Kernel for CVEs listed belowCVE-2023-21162, CVE-2023...
debian/chromium<=90.0.4430.212-1~deb10u1<=116.0.5845.180-1~deb11u1<=119.0.6045.199-1~deb12u1
Microsoft Edge<120.0.2210.61
Microsoft Edge (Chromium-based)
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Fedoraproject Fedora=38
and 2 more
Improper input leads to DoS
Sierra OT/IoT routers
Sierra Wireless AirLink cellular routers
OpenNDS open Network Demarcation Service
Sierrawireless Aleos<=4.16.0
Sierrawireless Es450
and 7 more
Out-of-bounds write in Linux kernel's Performance Events system component
Linux Linux kernel>=4.3<6.7
Debian Debian Linux=10.0
ubuntu/linux<4.15.0-221.232
ubuntu/linux<5.4.0-170.188
ubuntu/linux<5.15.0-92.102
ubuntu/linux<6.5.0-15.15
and 78 more
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injecti...
debian/bluez<=5.55-3.1<=5.66-1<=5.70-1
Apple iOS
Apple macOS
Android Android=4.2.2-10
Linux Linux
Ubuntu Ubuntu=18.04
and 42 more
Integer overflow in Skia
debian/chromium<=90.0.4430.212-1~deb10u1<=116.0.5845.180-1~deb11u1
Microsoft Edge<119.0.2151.97
Google Chrome<119.0.6045.199
Google Chrome=120.0.6099.224
Google Chrome=120.0.6099.225
Google Chrome=120.0.6099.234
and 9 more
It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash. This vulnerability affects Firefox < 120, Firefox ESR < 115...
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more
On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability aff...
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more
The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click ...
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203