Debian 10260 Published by

The following two security updates are available for Debian GNU/Linux:

[DLA 3723-1] libspreadsheet-parsexlsx-perl security update
[DSA 5608-1] gst-plugins-bad1.0 security update




[DLA 3723-1] libspreadsheet-parsexlsx-perl security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3723-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
January 27, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : libspreadsheet-parsexlsx-perl
Version : 0.27-2+deb10u1
CVE ID : CVE-2024-22368 CVE-2024-23525
Debian Bug : 1061098

Security vulnerabilities were found in libspreadsheet-parsexlsx-perl, a
Perl module to parse XLSX files, which could lead to denial of service
or server-side request forgery via crafted input.

CVE-2024-22368

Le Dinh Hai discovered that the memoize implementation allows
attacker to allocate an arbitrary memory size, which could lead to
denial of service via memory exhaustion.

CVE-2024-23525

An Pham discovered an XML external entity (XXE) vulnerability via
crafted input, which could lead to denial of service or server-side
request forgery.

For Debian 10 buster, these problems have been fixed in version
0.27-2+deb10u1.

We recommend that you upgrade your libspreadsheet-parsexlsx-perl packages.

For the detailed security status of libspreadsheet-parsexlsx-perl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libspreadsheet-parsexlsx-perl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[DSA 5608-1] gst-plugins-bad1.0 security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5608-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 27, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : gst-plugins-bad1.0
CVE ID : CVE-2024-0444

A heap-based buffer overflow during tile list parsing was discovered in
the AV1 video codec parser for the GStreamer media framework, which may
result in denial of service or potentially the execution of arbitrary
code if a malformed media file is opened.

For the oldstable distribution (bullseye), this problem has been fixed
in version 1.18.4-3+deb11u4.

For the stable distribution (bookworm), this problem has been fixed in
version 1.22.0-4+deb12u5.

We recommend that you upgrade your gst-plugins-bad1.0 packages.

For the detailed security status of gst-plugins-bad1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-bad1.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/