DSA-4279 linux – security update

Multiple researchers have discovered a vulnerability in the way theIntel processor designs have implemented speculative execution ofinstructions in combination with handling of page-faults. This flawcould allow an attacker controlling an unprivileged process to readmemory from arbitrary (non-user controlled) addresses, including fromthe kernel and all other processes running on the system or crossguest/host boundaries to read host memory. More info: https://www.debian.org/security/2018/dsa-4279

DSA-4278 jetty9 – security update

Multiple vulnerabilities were discovered in Jetty, a Java servlet engineand webserver which could result in HTTP request smuggling. More info: https://www.debian.org/security/2018/dsa-4278

DSA-4278 jetty9 – security update

Multiple vulnerabilities were discovered in Jetty, a Java servlet engineand webserver which could result in HTTP request smuggling. More info: https://www.debian.org/security/2018/dsa-4278

DSA-4276 php-horde-image – security update

Fariskhi Vidyan and Thomas Jarosch discovered several vulnerabilitiesin php-horde-image, the image processing library for the Hordegroupware suite. They would allow an attacker to cause adenial-of-service or execute arbitrary code. More info: https://www.debian.org/security/2018/dsa-4276

DSA-4277 mutt – security update

Several vulnerabilities were discovered in Mutt, a text-based mailreadersupporting MIME, GPG, PGP and threading, potentially leading to codeexecution, denial of service or information disclosure when connectingto a malicious mail/NNTP server. More info: https://www.debian.org/security/2018/dsa-4277
Translate »