Debian Linux Security Advisory 5303-1 - Multiple security issues were discovered in Thunderbird, which could result in the execution of arbitrary code or information disclosure.
6a68d09cb97ada3f07f5a471f0b3bd3767cbb42e4898f1c3080317955786cd7d
Debian Linux Security Advisory 5302-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
3cf7d0879aaad1265a541b3de9e2a6f8f449a34b685295dd6b43c23ad39f3a7e
Debian Linux Security Advisory 5301-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or information disclosure.
998d98bd85e16151c70c3c5fcc984187b5b27cda212186624cc0294f29660fcc
Debian Linux Security Advisory 5300-1 - Multiple security issues were discovered in pngcheck, a tool to verify the integrity of PNG, JNG and MNG files, which could potentially result in the execution of arbitrary code.
0dc5440273afe8861337c23972ecab6c0e53079ef773efae17a4e5f1b133ed61
Debian Linux Security Advisory 5299-1 - Multiple security vulnerabilities have been found in OpenEXR, command-line tools and a library for the OpenEXR image format. Buffer overflows or out-of-bound reads could lead to a denial of service (application crash) if a malformed image file is processed.
7f4d3631413d2ef484ca90cf94efbde5b213df06ad33de148b8d14d09f721fd7
Debian Linux Security Advisory 5298-1 - Two security vulnerabilities have been discovered in Cacti, a web interface for graphing of monitoring systems, which could result in unauthenticated command injection or LDAP authentication bypass.
38376423fba98ccf902e3440638ff214aa8379cbe6575ced8ec5560ad8d44180
Debian Linux Security Advisory 5297-1 - A buffer overflow was discovered in the VNC module of the VLC media player, which could result in the execution of arbitrary code.
1932c3f067fe022922016500edfcf5a3b134777fbe512aa901a245195dd1b232
Debian Linux Security Advisory 5296-1 - Robin Peraglie and Johannes Moritz discovered an argument injection bug in the xfce4-mime-helper component of xfce4-settings, which can be exploited using the xdg-open common tool. Since xdg-open is used by multiple standard applications for opening links, this bug could be exploited by an attacker to run arbitrary code on an user machine by providing a malicious PDF file with specifically crafted links.
5313fb47906b2d901e10c9452bdc90cb3b55ceae32efa216ba1a94c0076fec3a
Debian Linux Security Advisory 5295-1 - A security issue was discovered in Chromium, which could result in the execution of arbitrary code.
bbcf3bd80dea16b48d42a9c4ca9877d4a37c803d56a434e06e727d1a4dda7d96
Debian Linux Security Advisory 5294-1 - Jhead, a tool for manipulating EXIF data embedded in JPEG images, allowed attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50, -autorot or -ce option. In addition a buffer overflow error in exif.c has been addressed which could lead to a denial of service (application crash).
846f31c24b7c73dc8673424e239ce05d73318c5abb0c7df57d7fab49c26db4b7
Debian Linux Security Advisory 5293-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
a2f3eace58b4242297ee77779b8d32e36265204b8cbda9b92bfdb780c64b1476
Debian Linux Security Advisory 5292-1 - The Qualys Research Team discovered a race condition in the snapd-confine binary which could result in local privilege escalation.
63ecb2fa9607b100b03d38946750f97753ae423a271e95c27aafa2e1c56f7348
Debian Linux Security Advisory 5291-1 - Multiple security issues were discovered in MuJS, a lightweight JavaScript interpreter, which could result in denial of service and potentially the execution of arbitrary code.
6a12b5ce4eeb0f076c386236fd660cc7d187b863eabc41b244fca06a64b448c8
Debian Linux Security Advisory 5290-1 - Apache Commons Configuration, a Java library providing a generic configuration interface, performs variable interpolation, allowing properties to be dynamically evaluated and expanded. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers.
20b74b9fbd86a759f5b71128ce07de054cfbec59f6d32a7281454300d1ea201e
Debian Linux Security Advisory 5289-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code.
c343078dd704e831060c626e66c05547fc484b27a89c286138f8ffdd85f7bd1c
Debian Linux Security Advisory 5288-1 - It was discovered that a buffer overflow in GraphicsMagick, a collection of image processing tools, could potentially result in the execution of arbitrary code when processing a malformed MIFF image.
3b736bb52b2cccca3d1a91d28f0c21fcc81c44f7af8b34d49ab02d30a01cf69f
Debian Linux Security Advisory 5287-1 - Several vulnerabilities were discovered in Heimdal, an implementation of Kerberos 5 that aims to be compatible with MIT Kerberos.
84acf94eecacae5883c23a1272096230f0b336c4708449aaa72442ec79969d0e
Debian Linux Security Advisory 5286-1 - Greg Hudson discovered integer overflow flaws in the PAC parsing in krb5, the MIT implementation of Kerberos, which may result in remote code execution (in a KDC, kadmin, or GSS or Kerberos application server process), information exposure (to a cross-realm KDC acting maliciously), or denial of service (KDC or kadmind process crash).
4054bf326761b93798ba5e87ed9c11954014650895f0887f6de6e704d4f0b728
Debian Linux Security Advisory 5285-1 - Multiple security vulnerabilities have been found in Asterisk, an Open Source Private Branch Exchange. Buffer overflows and other programming errors could be exploited for information disclosure or the execution of arbitrary code.
5954aa3a6292b16c124f88a5565b25ffb1de65f24ab2438dbac72d360d3842cd
Debian Linux Security Advisory 5284-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.
38e1e821f6402a69957dafce0462e7fa54982b8d1a7e196da83411f864a07c98
Debian Linux Security Advisory 5283-1 - Several flaws were discovered in jackson-databind, a fast and powerful JSON library for Java.
3065027887bf5fa94d590057f95fc931a26aacb00941c3b82ff32ac74d124ef9
Debian Linux Security Advisory 5279-2 - Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform SQL injection, create open redirects, bypass authorization access, or perform Cross-Site Request Forgery (CSRF) or Cross-Site Scripting (XSS) attacks. The wordpress package released in DSA-5279-1 had incorrect dependencies that could not be satisfied in Debian stable. This update corrects the problem.
389845c1cb18def69eba66246c35f85df9383c4619ea4cbb54983839e90b7fcb
Debian Linux Security Advisory 5282-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, information disclosure, spoofing or bypass of the SameSite cookie policy.
91034eee5b8fb88c332be0918f4e842a60c55772e39e1a9a1d42dfd92d057459
Debian Linux Security Advisory 5281-1 - It was discovered that parsing errors in the mp4 module of Nginx, a high-performance web and reverse proxy server, could result in denial of service, memory disclosure or potentially the execution of arbitrary code when processing a malformed mp4 file.
2843476468a10f35ec307074aedcd47e5882da638047bde46235c74be4e43662
Debian Linux Security Advisory 5280-1 - Several issues were found in GRUB2's font handling code, which could result in crashes and potentially execution of arbitrary code. These could lead to by-pass of UEFI Secure Boot on affected systems.
3f127fc0be7c3dcc4fd8ba18c8ffe0115d3bbb944d5796670d7d8551cca8e78b