arbitrary code execution

Didn’t take long to release new updated version.

The Debian project is pleased to announce the sixth update of its stable distribution Debian GNU/Linux 4.0 (codename “etch”). This update mainly adds corrections for security problems to the stable release, along with a few adjustment to serious problems. This update has been rated as having important security impact. You are advised to upgrade system ASAP.

{ 0 comments }

Updated kernel packages that fix several bugs are now available for Debian Linux v4.0.

{ 2 comments }

CVE-2008-0553: libtk-img – buffer overflow via local / remote arbitrary code execution.

{ 0 comments }

Security update: Image loaders for PNM and XPM images, which may result in the execution of arbitrary code.

{ 0 comments }

Three vulnerabilities have been discovered in the mt-daapd DAAP audio server (also known as the Firefly Media Server)

{ 0 comments }