[DLA 3773-1] freeipa security update
ELA-1067-1 python3.4 security update
ELA-1066-1 python3.5 security update
ELA-1065-1 python2.7 security update
[DLA 3774-1] gross security update
[DLA 3775-1] firefox-esr security update
[DLA 3773-1] freeipa security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3773-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Chris Lamb
March 25, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : freeipa
Version : 4.7.2-3+deb10u1
CVE ID : CVE-2024-1481
Debian Bug : 1065106
It was discovered that there was a command-line injection issue in
the FreeIPA identity, authentication and audit framework. A specially
crafted HTTP request could have lead to a Denial of Service (DoS)
attack and/or data exposure.
For Debian 10 buster, this problem has been fixed in version
4.7.2-3+deb10u1.
We recommend that you upgrade your freeipa packages.
For the detailed security status of freeipa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/freeipa
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
ELA-1067-1 python3.4 security update
Package : python3.4
Version : 3.4.2-1+deb8u17 (jessie)
Related CVEs :
CVE-2024-0450
The zipfile module was vulnerable to “quoted-overlap” zip-bombs
in the Python 3 interpreter.
ELA-1066-1 python3.5 security update
Package : python3.5
Version : 3.5.3-1+deb9u9 (stretch)
Related CVEs :
CVE-2024-0450
The zipfile module was vulnerable to “quoted-overlap” zip-bombs
in the Python 3 interpreter.
ELA-1065-1 python2.7 security update
Package : python2.7
Version : 2.7.9-2-ds1-1+deb8u12 (jessie), 2.7.13-2+deb9u9 (stretch)
Related CVEs :
CVE-2024-0450
The zipfile module was vulnerable to “quoted-overlap” zip-bombs
in the Python 2 interpreter.
[DLA 3774-1] gross security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3774-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Adrian Bunk
March 25, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : gross
Version : 1.0.2-4.1~deb10u1
CVE ID : CVE-2023-52159
Debian Bug : 1067115
Stack-based buffer overflow has been fixed in gross,
a server for greylisting emails.
For Debian 10 buster, this problem has been fixed in version
1.0.2-4.1~deb10u1.
We recommend that you upgrade your gross packages.
For the detailed security status of gross please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gross
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 3775-1] firefox-esr security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3775-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
March 25, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : firefox-esr
Version : 115.9.1esr-1~deb10u1
CVE ID : CVE-2023-5388 CVE-2024-0743 CVE-2024-2607 CVE-2024-2608
CVE-2024-2610 CVE-2024-2611 CVE-2024-2612 CVE-2024-2614
CVE-2024-2616 CVE-2024-29944
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code or information disclosure, bypass of content security policies or
spoofing.
For Debian 10 buster, these problems have been fixed in version
115.9.1esr-1~deb10u1.
We recommend that you upgrade your firefox-esr packages.
For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS