Debian GNU/Linux 10 (Buster):
[DLA 3810-1] php7.3 security update
Debian GNU/Linux 11 (Bullseye) and 12 (Bookworm):
[DSA 5682-1] glib2.0 security update
[DLA 3810-1] php7.3 security update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-3810-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
May 07, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : php7.3
Version : 7.3.31-1~deb10u6
CVE ID : CVE-2024-2756 CVE-2024-3096
Security issues were found in PHP, a widely-used open source general
purpose scripting language, which could result in information disclosure
or incorrect validation of password hashes.
CVE-2024-2756
Marco Squarcina discovered that network and same-site attackers can
set a standard insecure cookie in the victim's browser which is
treated as a `__Host-` or `__Secure-` cookie by PHP applications.
This issue stems from an incomplete fix to CVE-2022-31629.
CVE-2024-3096
Eric Stern discovered that if a password stored with password_hash()
starts with a null byte (\x00), testing a blank string as the
password via password_verify() incorrectly returns true.
If a user were able to create a password with a leading null byte
(unlikely, but syntactically valid), the issue would allow an
attacker to trivially compromise the victim's account by attempting
to sign in with a blank string.
For Debian 10 buster, these problems have been fixed in version
7.3.31-1~deb10u6.
We recommend that you upgrade your php7.3 packages.
For the detailed security status of php7.3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.3
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DSA 5682-1] glib2.0 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5682-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 07, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : glib2.0
CVE ID : CVE-2024-34397
Alicia Boya Garcia reported that the GDBus signal subscriptions in the
GLib library are prone to a spoofing vulnerability. A local attacker can
take advantage of this flaw to cause a GDBus-based client to behave
incorrectly, with an application-dependent impact.
gnome-shell is updated along with this update to avoid a screencast
regression after fixing CVE-2024-34397.
For the oldstable distribution (bullseye), this problem has been fixed
in version 2.66.8-1+deb11u2.
For the stable distribution (bookworm), this problem has been fixed in
version 2.74.6-2+deb12u1.
We recommend that you upgrade your glib2.0 packages.
For the detailed security status of glib2.0 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/glib2.0
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/