[DLA 3742-1] libgit2 security update
[DLA 3743-1] wpa security update
[DLA 3742-1] libgit2 security update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-3742-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Sean Whitton
February 27, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : libgit2
Version : 0.27.7+dfsg.1-0.2+deb10u2
CVE ID : CVE-2024-24577
Debian Bug : 1063416
A vulnerability was discovered in libgit2, a portable C
implementation of the Git core methods provided as a linkable
library. Using crafted inputs to the git_index_add function could
cause heap corruption, and this had the potential to permit
arbitrary code execution.
For Debian 10 buster, this problem has been fixed in version
0.27.7+dfsg.1-0.2+deb10u2.
We recommend that you upgrade your libgit2 packages.
For the detailed security status of libgit2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libgit2
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 3743-1] wpa security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3743-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Chris Lamb
February 27, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : wpa
Version : 2:2.7+git20190128+0c1e29f-6+deb10u4
CVE ID : CVE-2023-52160
Debian Bug : 1064061
It was discovered that there was a potential authentication bypass
vulnerability in wpa, a set of tools including the widely-used
wpasupplicant client for authenticating with WPA and WPA2 wireless
networks.
For an attack to have been successful, wpasupplicant must have been
configured to not verify the network's TLS certificate during Phase 1
of the authentication cycle; a eap_peap_decrypt vulnerability could
have been used to skip Phase 2 authentication by sending an EAP-TLV
"Success" packet instead of starting Phase 2.
For Debian 10 buster, this problem has been fixed in version
2:2.7+git20190128+0c1e29f-6+deb10u4.
We recommend that you upgrade your wpa packages.
For the detailed security status of wpa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpa
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS