Debian — mtr patch prevents buffer overflows
Bug allows an attacker to gain access to the raw socket, which makes IP spoofing and other malicious network activity possible.
Bug allows an attacker to gain access to the raw socket, which makes IP spoofing and other malicious network activity possible.
Updated imlib packages are now available for Red Hat Linux 6.2, 7, 7.1 and 7.2 which fix potential problems loading untrusted images.
“This can be used to get a list of users on that host, as displayed by kdm. It can also be used to circumvent access control mechanisms such as tcpwrappers and root login restrictions on the console and via remote.”
May allow escalation of privileges in applications including Netscape 6.21 and earlier which employ the affected Java version.
Very Serious! All Linux users are advised to update all relevant packages immediately.
Multiple vulnerabilities in Oracle Application Server have recently been discovered. These vulnerabilities include buffer overflows, insecure default settings, failures to enforce access controls, and failure to validate input. The impacts of these vulnerabilities include the execution of arbitrary commands or code, denial of service, and unauthorized access to sensitive information.
A potentially serious set of buffer overflows exist in the xtell messaging client and server, which is part of the Debian distribution and may be part of other distributions as well. Debian advises an immediate security upgrade; if you have this package on another distribution, you should check with your distribution for a patched package.