Debian GNU/Linux 10 (Buster) Extended LTS:
ELA-1170-1 roundcube security update
Debian GNU/Linux 12 (Bookworm):
[SECURITY] [DSA 5762-1] webkit2gtk security update
[SECURITY] [DSA 5763-1] pymatgen security update
[SECURITY] [DSA 5762-1] webkit2gtk security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5762-1 security@debian.org
https://www.debian.org/security/ Alberto Garcia
August 30, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : webkit2gtk
CVE ID : CVE-2024-4558 CVE-2024-40776 CVE-2024-40779 CVE-2024-40780
CVE-2024-40782 CVE-2024-40785 CVE-2024-40789 CVE-2024-40794
The following vulnerabilities have been discovered in the WebKitGTK
web engine:
CVE-2024-4558
An anonymous researcher discovered that processing maliciously
crafted web content may lead to an unexpected process crash.
CVE-2024-40776
Huang Xilin discovered that processing maliciously crafted web
content may lead to an unexpected process crash.
CVE-2024-40779
Huang Xilin discovered that processing maliciously crafted web
content may lead to an unexpected process crash.
CVE-2024-40780
Huang Xilin dicovered that processing maliciously crafted web
content may lead to an unexpected process crash.
CVE-2024-40782
Maksymilian Motyl discovered that processing maliciously crafted
web content may lead to an unexpected process crash.
CVE-2024-40785
Johan Carlsson discovered that processing maliciously crafted web
content may lead to a cross site scripting attack.
CVE-2024-40789
Seunghyun Lee discovered that processing maliciously crafted web
content may lead to an unexpected process crash.
CVE-2024-40794
Matthew Butler discovered that private Browsing tabs may be
accessed without authentication.
For the stable distribution (bookworm), these problems have been fixed in
version 2.44.3-1~deb12u1.
We recommend that you upgrade your webkit2gtk packages.
For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/webkit2gtk
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[SECURITY] [DSA 5763-1] pymatgen security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5763-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 30, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : pymatgen
CVE ID : CVE-2024-23346
William Khem-Marquez discovered that Pymatgen, a Python library for
materials analysis, could be tricked into running arbitrary code if a
malformed CIF file is processed.
For the stable distribution (bookworm), this problem has been fixed in
version 2022.11.7+dfsg1-11+deb12u1.
We recommend that you upgrade your pymatgen packages.
For the detailed security status of pymatgen please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pymatgen
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
ELA-1170-1 roundcube security update
Package : roundcube
Version : 1.3.17+dfsg.1-1~deb10u7 (buster)
Related CVEs :
CVE-2024-42008
CVE-2024-42009
CVE-2024-42010
Multiple cross-site scripting (XSS) vulnerabilities were discovered in
Roundcube, a skinnable AJAX based webmail solution for IMAP servers,
which could lead to privilege escalation, information disclosure or
denial of service.
CVE-2024-42008: Oskar Zeino-Mahmalat discovered that Roundcube allows
XSS in serving of attachments other than HTML or SVG.
CVE-2024-42009: Oskar Zeino-Mahmalat discovered that Roundcube allows
XSS in post-processing of sanitized HTML content.
CVE-2024-42010: Oskar Zeino-Mahmalat discovered an information leak
(access to remote content) due to insufficient CSS filtering.