Security researchers of JFrog Security and Ismail Aydemir discovered two remote
code execution vulnerabilities in the H2 Java SQL database engine which can be
exploited through various attack vectors, most notably through the H2 Console
and by loading custom classes from remote servers through JNDI. The H2 console
is a developer tool and not required by any reverse-dependency in Debian. It
has been disabled in (old)stable releases. Database developers are advised to
use at least version 2.1.210-1, currently available in Debian unstable.
More Stories
vaultwarden-1.32.7-2.el9
FEDORA-EPEL-2025-90c1787ffb Packages in this update: vaultwarden-1.32.7-2.el9 Update description: Update to 1.32.7 Fix CVE-2024-56335 Fix CVE-2024-55226 Fix CVE-2024-55225 Fix CVE-2024-55224 Read...
USN-7173-3: Linux kernel (Raspberry Pi) vulnerabilities
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to...
Multiple Vulnerabilities in Rsync Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Rsync, the most severe of which could allow for remote code execution. Rsync is an...
USN-7204-1: NeoMutt vulnerabilities
Jeriko One discovered that NeoMutt incorrectly handled certain IMAP and POP3 responses. An attacker could possibly use this issue to...
pam-u2f-1.3.1-1.el9
FEDORA-EPEL-2025-b1223174a4 Packages in this update: pam-u2f-1.3.1-1.el9 Update description: pam-u2f fix to resolve CVE-2025-23013 (Partial Authentication Bypass). CVSS score 7.3 Read...
pam-u2f-1.3.1-1.fc40
FEDORA-2025-1bb4d2682b Packages in this update: pam-u2f-1.3.1-1.fc40 Update description: pam-u2f fix to resolve CVE-2025-23013 (Partial Authentication Bypass). CVSS score 7.3 Read...