Debian 10260 Published by

The following security updates have been released for Debian GNU/Linux:

Debian GNU/Linux 10 (Buster):
[DLA 3810-1] php7.3 security update

Debian GNU/Linux 11 (Bullseye) and 12 (Bookworm):
[DSA 5682-1] glib2.0 security update




[DLA 3810-1] php7.3 security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3810-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
May 07, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : php7.3
Version : 7.3.31-1~deb10u6
CVE ID : CVE-2024-2756 CVE-2024-3096

Security issues were found in PHP, a widely-used open source general
purpose scripting language, which could result in information disclosure
or incorrect validation of password hashes.

CVE-2024-2756

Marco Squarcina discovered that network and same-site attackers can
set a standard insecure cookie in the victim's browser which is
treated as a `__Host-` or `__Secure-` cookie by PHP applications.

This issue stems from an incomplete fix to CVE-2022-31629.

CVE-2024-3096

Eric Stern discovered that if a password stored with password_hash()
starts with a null byte (\x00), testing a blank string as the
password via password_verify() incorrectly returns true.

If a user were able to create a password with a leading null byte
(unlikely, but syntactically valid), the issue would allow an
attacker to trivially compromise the victim's account by attempting
to sign in with a blank string.

For Debian 10 buster, these problems have been fixed in version
7.3.31-1~deb10u6.

We recommend that you upgrade your php7.3 packages.

For the detailed security status of php7.3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.3

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[DSA 5682-1] glib2.0 security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5682-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 07, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : glib2.0
CVE ID : CVE-2024-34397

Alicia Boya Garcia reported that the GDBus signal subscriptions in the
GLib library are prone to a spoofing vulnerability. A local attacker can
take advantage of this flaw to cause a GDBus-based client to behave
incorrectly, with an application-dependent impact.

gnome-shell is updated along with this update to avoid a screencast
regression after fixing CVE-2024-34397.

For the oldstable distribution (bullseye), this problem has been fixed
in version 2.66.8-1+deb11u2.

For the stable distribution (bookworm), this problem has been fixed in
version 2.74.6-2+deb12u1.

We recommend that you upgrade your glib2.0 packages.

For the detailed security status of glib2.0 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/glib2.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/