Welcome! Log In Create A New Profile

Advanced

Debian Security Advisory

Posted by bodhi 
Re: Debian Security Advisory
January 21, 2018 05:00PM
> bodhi Wrote:
>
> There are many of ARM 32 being affected.
> Cortex A9 (eg. our MVEBU Armada 38x) is one of
> those. Therefore I will have new release kenel out
> ASAP when I can get back to my development rig.

Looks like the Spectre patch will be slow coming. So in the mean time, take the usual precaution if you have Armada 38x box.

-bodhi
===========================
Forum Wiki
bodhi's corner
Re: Debian Security Advisory
May 18, 2018 10:00PM
Debian jessie security news.

Quote

Debian Security Advisory DSA-4205-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 18, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

This is an advance notice that regular security support for Debian
GNU/Linux 8 (code name "jessie") will be terminated on the 17th of
June.

As with previous releases additional LTS support will be provided for
a reduced set of architectures and packages, a separate announcement
will be available in due time.

-bodhi
===========================
Forum Wiki
bodhi's corner
Re: Debian Security Advisory
March 22, 2020 09:14PM
Re: Debian Security Advisory
June 03, 2021 04:05PM
https://lwn.net/Articles/858144/

Update your Debian package (caribou, firefox-esr, imagemagick, and isc-dhcp),

-bodhi
===========================
Forum Wiki
bodhi's corner
Re: Debian Security Advisory
May 25, 2022 05:05PM
Update your dpkg.

https://www.debian.org/security/2022/dsa-5147

-bodhi
===========================
Forum Wiki
bodhi's corner
Re: Debian Security Advisory
June 10, 2022 08:24PM
Quote

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5160-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 10, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : ntfs-3g
CVE ID : CVE-2021-46790 CVE-2022-30783 CVE-2022-30784 CVE-2022-30785
CVE-2022-30786 CVE-2022-30787 CVE-2022-30788 CVE-2022-30789
Debian Bug : 1011770

Several vulnerabilities were discovered in NTFS-3G, a read-write NTFS
driver for FUSE. A local user can take advantage of these flaws for
local root privilege escalation.

For the oldstable distribution (buster), these problems have been fixed
in version 1:2017.3.23AR.3-3+deb10u2.

For the stable distribution (bullseye), these problems have been fixed in
version 1:2017.3.23AR.3-4+deb11u2.

We recommend that you upgrade your ntfs-3g packages.

-bodhi
===========================
Forum Wiki
bodhi's corner
Author:

Your Email:


Subject:


Spam prevention:
Please, enter the code that you see below in the input field. This is for blocking bots that try to post this form automatically. If the code is hard to read, then just try to guess it right. If you enter the wrong code, a new image is created and you get another chance to enter it right.
Message: