Debian GNU/Linux 9 (Stretch) Extended LTS:
ELA-1189-1 mariadb-10.1 security update
Debian GNU/Linux 8 (Jessie), 9 (Stretch), 10 (Buster) Extended LTS:
ELA-1190-1 expat security update
Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1188-1 wireshark security update
Debian GNU/Linux 10 (Buster) Extended LTS:
ELA-1191-1 sqlite3 security update
Debian GNU/Linux 11 (Bullseye) LTS:
[SECURITY] [DLA 3906-1] wireshark security update
[SECURITY] [DLA 3908-1] debian-security-support update
[SECURITY] [DLA 3907-1] sqlite3 security update
[SECURITY] [DLA 3906-1] wireshark security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3906-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Adrian Bunk
September 30, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : wireshark
Version : 3.4.16-0+deb11u1
CVE ID : CVE-2021-4181 CVE-2021-4182 CVE-2021-4184 CVE-2021-4185
CVE-2021-4186 CVE-2021-4190 CVE-2022-0581 CVE-2022-0582
CVE-2022-0583 CVE-2022-0585 CVE-2022-0586 CVE-2022-3190
CVE-2022-4344 CVE-2022-4345 CVE-2023-0411 CVE-2023-0412
CVE-2023-0413 CVE-2023-0415 CVE-2023-0416 CVE-2023-0417
CVE-2023-0666 CVE-2023-0667 CVE-2023-0668 CVE-2023-1161
CVE-2023-1992 CVE-2023-1993 CVE-2023-1994 CVE-2023-2855
CVE-2023-2856 CVE-2023-2858 CVE-2023-2879 CVE-2023-2906
CVE-2023-2952 CVE-2023-3648 CVE-2023-3649 CVE-2023-4511
CVE-2023-4512 CVE-2023-4513 CVE-2023-6175 CVE-2024-0208
CVE-2024-0209 CVE-2024-0211 CVE-2024-2955 CVE-2024-4853
CVE-2024-4854 CVE-2024-8250 CVE-2024-8645
Debian Bug : 1033756 1034721 1041101 1059925 1068111 1080298
Multiple vulnerabilities have been fixed in the network traffic analyzer
Wireshark.
CVE-2021-4181
Sysdig Event dissector crash
CVE-2021-4182
RFC 7468 dissector crash
CVE-2021-4184
BitTorrent DHT dissector infinite loop
CVE-2021-4185
RTMPT dissector infinite loop
CVE-2021-4186
Gryphon dissector crash
CVE-2021-4190
Kafka dissector large loop DoS
CVE-2022-0581
CMS protocol dissector crash
CVE-2022-0582
CSN.1 protocol dissector unaligned access
CVE-2022-0583
PVFS protocol dissector crash
CVE-2022-0585
Large loops in multiple dissectors
CVE-2022-0586
RTMPT protocol dissector infinite loop
CVE-2022-3190
F5 Ethernet Trailer dissector infinite loop
CVE-2022-4344
Kafka protocol dissector memory exhaustion
CVE-2022-4345
Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors
CVE-2023-0411
Excessive loops in the BPv6, NCP and RTPS protocol dissectors
CVE-2023-0412
TIPC dissector crash
CVE-2023-0413
Dissection engine bug DoS
CVE-2023-0415
iSCSI dissector crash
CVE-2023-0416
GNW dissector crash
CVE-2023-0417
NFS dissector memory leak
CVE-2023-0666
RTPS parsing heap overflow
CVE-2023-0667
MSMMS dissector buffer overflow
CVE-2023-0668
IEEE C37.118 Synchrophasor dissector crash
CVE-2023-1161
ISO 15765 dissector crash
CVE-2023-1992
RPCoRDMA dissector crash
CVE-2023-1993
LISP dissector large loop
CVE-2023-1994
GQUIC dissector crash
CVE-2023-2855
Candump log parser crash
CVE-2023-2856
VMS TCPIPtrace file parser crash
CVE-2023-2858
NetScaler file parser crash
CVE-2023-2879
GDSDB dissector infinite loop
CVE-2023-2906
CP2179 dissector crash
CVE-2023-2952
XRA dissector infinite loop
CVE-2023-3648
Kafka dissector crash
CVE-2023-3649
iSCSI dissector crash
CVE-2023-4511
BT SDP dissector infinite loop
CVE-2023-4512
CBOR dissector crash
CVE-2023-4513
BT SDP dissector memory leak
CVE-2023-6175
NetScreen file parser crash
CVE-2024-0208
GVCP dissector crash
CVE-2024-0209
IEEE 1609.2 dissector crash
CVE-2024-0211
DOCSIS dissector crash
CVE-2024-2955
T.38 dissector crash
CVE-2024-4853
Editcap byte chopping crash
CVE-2024-4854
MONGO dissector infinite loop
CVE-2024-8250
NTLMSSP dissector crash
CVE-2024-8645
SPRT dissector crash
For Debian 11 bullseye, these problems have been fixed in version
3.4.16-0+deb11u1.
We recommend that you upgrade your wireshark packages.
For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
ELA-1188-1 wireshark security update
Package : wireshark
Version : 2.6.20-0+deb10u9~deb9u1 (stretch), 2.6.20-0+deb10u9 (buster)
Related CVEs :
CVE-2023-0667
CVE-2023-3649
CVE-2023-4512
CVE-2024-0211
CVE-2024-2955
CVE-2024-4853
CVE-2024-4854
CVE-2024-8250
CVE-2024-8645
Multiple vulnerabilities have been fixed in the network traffic analyzer Wireshark.
CVE-2023-0667
MSMMS dissector buffer overflow
CVE-2023-3649
iSCSI dissector crash
CVE-2023-4512
CBOR dissector crash
CVE-2024-0211
DOCSIS dissector crash
CVE-2024-2955
T.38 dissector crash
CVE-2024-4853
Editcap byte chopping crash
CVE-2024-4854
MONGO dissector infinite loop
CVE-2024-8250
NTLMSSP dissector crash
CVE-2024-8645
SPRT dissector crash
ELA-1190-1 expat security update
Package : expat
Version : 2.1.0-6+deb8u12 (jessie), 2.2.0-2+deb9u9 (stretch), 2.2.6-2+deb10u8 (buster)
Related CVEs :
CVE-2024-45490
CVE-2024-45491
CVE-2024-45492
Multiple vulnerabilities were found in expat, an XML parsing C library,
which could lead to Denial of Service, memory corruption or arbitrary
code execution.
CVE-2024-45490: TaiYou discovered that xmlparse.c does not reject a
negative length for XML_ParseBuffer(), which may cause memory
corruption or code execution.
CVE-2024-45491: TaiYou discovered that xmlparse.c has an integer
overflow for nDefaultAtts on 32-bit platforms, which may cause
denial of service or code execution.
CVE-2024-45492: TaiYou discovered that xmlparse.c has an integer
overflow for m_groupSize on 32-bit platforms, which may cause
denial of service or code execution.
[SECURITY] [DLA 3908-1] debian-security-support update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-3908-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Santiago Ruano Rincón
September 30, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : debian-security-support
Version : 1:11+2024.09.30
Debian Bug : 1063756
debian-security-support, the Debian security support coverage checker, has been
updated in bullseye-security to mark the end of life of the following packages:
* pdns-recursor: See https://bugs.debian.org/1070176
* slurm-wlm: See https://bugs.debian.org/1071127
* libreswan: See https://bugs.debian.org/1072527
* phppgadmin: See https://bugs.debian.org/1072589
* pytest-salt-factories: See https://bugs.debian.org/1070175
* pytest-testinfra: See https://bugs.debian.org/1070175
* salt: See https://bugs.debian.org/1070175
* gpac: See https://lists.debian.org/debian-lts/2024/08/msg00007.html
* snort: See https://bugs.debian.org/1063756
* iotjs: See https://bugs.debian.org/1078334
* wpewebkit: See https://bugs.debian.org/1035997
* python2.7: See https://lists.debian.org/debian-lts/2024/08/msg00057.html
* cython: See https://lists.debian.org/debian-lts/2024/08/msg00057.html
* jython: See https://lists.debian.org/debian-lts/2024/08/msg00057.html
* pypy: See https://lists.debian.org/debian-lts/2024/08/msg00057.html
* python-stdlib-extensions: See
https://lists.debian.org/debian-lts/2024/08/msg00057.html
For Debian 11 bullseye, this problem has been fixed in version
1:11+2024.09.30.
We recommend that you upgrade your debian-security-support packages.
For the detailed security status of debian-security-support please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/debian-security-support
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[SECURITY] [DLA 3907-1] sqlite3 security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3907-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Adrian Bunk
September 30, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : sqlite3
Version : 3.34.1-3+deb11u1
CVE ID : CVE-2021-36690 CVE-2023-7104
Two vulnerabilities have been fixed in the SQLite database.
CVE-2021-36690
Expert extension segfault
CVE-2023-7104
Session extension buffer overread
For Debian 11 bullseye, these problems have been fixed in version
3.34.1-3+deb11u1.
We recommend that you upgrade your sqlite3 packages.
For the detailed security status of sqlite3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/sqlite3
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
ELA-1191-1 sqlite3 security update
Package : sqlite3
Version : 3.27.2-3+deb10u3 (buster)
Related CVEs :
CVE-2019-19244
CVE-2021-36690
CVE-2023-7104
Multiple vulnerabilities have been fixed in the SQLite database.
CVE-2019-19244
Mishandling of sub-select that uses both DISTINCT and window functions, and also has certain ORDER BY usage
CVE-2021-36690
Expert extension segfault
CVE-2023-7104
Session extension buffer overread
ELA-1189-1 mariadb-10.1 security update
Package : mariadb-10.1
Version : 10.1.48-0+deb9u4 (stretch)
Related CVEs :
CVE-2021-46659
CVE-2022-21427
CVE-2022-24048
CVE-2022-24050
CVE-2022-24051
CVE-2022-24052
CVE-2022-27380
CVE-2022-27383
CVE-2022-27384
CVE-2022-27387
CVE-2022-27448
CVE-2022-31622
CVE-2022-32083
Several vulnerabilities have been fixed in MariaDB, a popular database server.
CVE-2022-21427
An easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols
to compromise MariaDB Server. Successful attacks of this vulnerability
can result in unauthorized ability to cause a hang
or frequently repeatable crash (complete DOS). Certain UTF8 combining
marks cause MariaDB to crash when doing Full-Text searches.
CVE-2022-24048, CVE-2022-24051, CVE-2022-24052
MariaDB CONNECT Storage Engine Stack-based Buffer
Overflow Privilege Escalation Vulnerability. This vulnerability allows
local attackers to escalate privileges on affected installations
of MariaDB. Authentication is required to exploit this vulnerability.
The specific flaw exists within the processing of SQL queries.
The issue results from the lack of proper validation of the length
of user-supplied data prior to copying it to a fixed-length stack-based
buffer. An attacker can leverage this vulnerability to escalate
privileges and execute arbitrary code in the context of the
service account. Concerned Storage Engines are JSON, XML and MYSQL.
CVE-2022-24050
MariaDB CONNECT Storage Engine use-after-free
privilege escalation vulnerability. This vulnerability allows local
attackers to escalate privileges on affected installations of MariaDB.
Authentication is required to exploit this vulnerability.
The specific flaw exists within the processing of SQL queries.
The issue results from the lack of validating the existence of an object
prior to performing operations on the object.
An attacker can leverage this vulnerability to escalate privileges and
execute arbitrary code in the context of the service account.
CVE-2022-27380
An issue in the component my_decimal::operator=
of MariaDB Server was discovered that makes it possible for attackers to cause
a Denial of Service (DoS) via specially crafted SQL statements.
CVE-2022-27383
An use-after-free was found in the component
my_strcasecmp_8bit, which may be exploited via specially crafted
SQL statements.
CVE-2022-27384, CVE-2022-32083
An issue in the component
Item_subselect::init_expr_cache_tracker allows attackers to cause
a Denial of Service (DoS) via specially crafted SQL statements.
CVE-2022-27387
A global buffer overflow in the component
decimal_bin_size was found, which is exploited via specially
crafted SQL statements.
CVE-2022-27448
An issue was found in multi-update and implicit
grouping handling, which is exploited via specially
crafted SQL statements. An attacker can leverage
this vulnerability to cause a Denial of Service (DoS)
CVE-2022-31622
Incorrect handling of errors while executing the
method create_worker_threads could lead to a Denial of Service (DoS).