Bug#1074234: scikit-learn: CVE-2024-5206

2024-06-24 Thread Moritz Mühlenhoff
Source: scikit-learn
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for scikit-learn.

CVE-2024-5206[0]:
| A sensitive data leakage vulnerability was identified in scikit-
| learn's TfidfVectorizer, specifically in versions up to and
| including 1.4.1.post1, which was fixed in version 1.5.0. The
| vulnerability arises from the unexpected storage of all tokens
| present in the training data within the `stop_words_` attribute,
| rather than only storing the subset of tokens required for the TF-
| IDF technique to function. This behavior leads to the potential
| leakage of sensitive information, as the `stop_words_` attribute
| could contain tokens that were meant to be discarded and not stored,
| such as passwords or keys. The impact of this vulnerability varies
| based on the nature of the data being processed by the vectorizer.

https://huntr.com/bounties/14bc0917-a85b-4106-a170-d09d5191517c
https://github.com/scikit-learn/scikit-learn/commit/70ca21f106b603b611da73012c9ade7cd8e438b8
 (1.5.0rc1)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-5206
https://www.cve.org/CVERecord?id=CVE-2024-5206

Please adjust the affected versions in the BTS as needed.



Bug#1074235: cvc5: CVE-2024-37794 CVE-2024-37795

2024-06-24 Thread Moritz Mühlenhoff
Source: cvc5
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for cvc5.

CVE-2024-37794[0]:
| Improper input validation in CVC5 Solver v1.1.3 allows attackers to
| cause a Denial of Service (DoS) via a crafted SMT2 input file.

CVE-2024-37795[1]:
| A segmentation fault in CVC5 Solver v1.1.3 allows attackers to cause
| a Denial of Service (DoS) via a crafted SMT-LIB input file
| containing the `set-logic` command with specific formatting errors.


https://github.com/cvc5/cvc5/issues/10813

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-37794
https://www.cve.org/CVERecord?id=CVE-2024-37794
[1] https://security-tracker.debian.org/tracker/CVE-2024-37795
https://www.cve.org/CVERecord?id=CVE-2024-37795

Please adjust the affected versions in the BTS as needed.



Bug#1074233: slic3r-prusa: CVE-2024-24686 CVE-2024-24685 CVE-2024-24684 CVE-2024-24584 CVE-2024-24583 CVE-2024-23951 CVE-2024-23950 CVE-2024-23949 CVE-2024-23948 CVE-2024-23947 CVE-2024-22181 CVE-2023

2024-06-24 Thread Moritz Mühlenhoff
Source: slic3r-prusa
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for libigl, which slic3r-prusa
embeds a copy of.

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1929
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1928
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1930
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1879
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784

https://github.com/libigl/libigl/issues/2387

CVE-2024-24686[0]:
| Multiple stack-based buffer overflow vulnerabilities exist in the
| readOFF functionality of libigl v2.5.0. A specially crafted .off
| file can lead to stack-based buffer overflow. An attacker can
| provide a malicious file to trigger this vulnerability.This
| vulnerability concerns the parsing of comments within the faces
| section of an `.off`  file processed via the `readOFF` function.


CVE-2024-24685[1]:
| Multiple stack-based buffer overflow vulnerabilities exist in the
| readOFF functionality of libigl v2.5.0. A specially crafted .off
| file can lead to stack-based buffer overflow. An attacker can
| provide a malicious file to trigger this vulnerability.This
| vulnerability concerns the parsing of comments within the vertex
| section of an `.off`  file processed via the `readOFF` function.


CVE-2024-24684[2]:
| Multiple stack-based buffer overflow vulnerabilities exist in the
| readOFF functionality of libigl v2.5.0. A specially crafted .off
| file can lead to stack-based buffer overflow. An attacker can
| provide a malicious file to trigger this vulnerability.This
| vulnerability concerns the header parsing occuring while processing
| an `.off`  file via the `readOFF` function.   We can see above
| that at [0] a stack-based buffer called `comment` is defined with an
| hardcoded size of `1000 bytes`.  The call to `fscanf` at [1] is
| unsafe and if the first line of the header of the `.off` files is
| longer than 1000 bytes it will overflow the `header` buffer.


CVE-2024-24584[3]:
| Multiple out-of-bounds read vulnerabilities exist in the readMSH
| functionality of libigl v2.5.0. A specially crafted .msh file can
| lead to an out-of-bounds read. An attacker can provide a malicious
| file to trigger this vulnerability.This vulnerabilitty concerns
| the`readMSH` function while processing `MshLoader::ELEMENT_TET`
| elements.


CVE-2024-24583[4]:
| Multiple out-of-bounds read vulnerabilities exist in the readMSH
| functionality of libigl v2.5.0. A specially crafted .msh file can
| lead to an out-of-bounds read. An attacker can provide a malicious
| file to trigger this vulnerability.This vulnerabilitty concerns
| the`readMSH` function while processing `MshLoader::ELEMENT_TRI`
| elements.


CVE-2024-23951[5]:
| Multiple improper array index validation vulnerabilities exist in
| the readMSH functionality of libigl v2.5.0. A specially crafted .msh
| file can lead to an out-of-bounds write. An attacker can provide a
| malicious file to trigger this vulnerability.This vulnerability
| concerns the `igl::MshLoader::parse_element_field` function while
| handling an `ascii`.msh` file.


CVE-2024-23950[6]:
| Multiple improper array index validation vulnerabilities exist in
| the readMSH functionality of libigl v2.5.0. A specially crafted .msh
| file can lead to an out-of-bounds write. An attacker can provide a
| malicious file to trigger this vulnerability.This vulnerability
| concerns the `igl::MshLoader::parse_element_field` function while
| handling an `binary`.msh` file.


CVE-2024-23949[7]:
| Multiple improper array index validation vulnerabilities exist in
| the readMSH functionality of libigl v2.5.0. A specially crafted .msh
| file can lead to an out-of-bounds write. An attacker can provide a
| malicious file to trigger this vulnerability.This vulnerability
| concerns the `igl::MshLoader::parse_node_field` function while
| handling an `ascii`.msh` file.


CVE-2024-23948[8]:
| Multiple improper array index validation vulnerabilities exist in
| the readMSH functionality of libigl v2.5.0. A specially crafted .msh
| file can lead to an out-of-bounds write. An attacker can provide a
| malicious file to trigger this vulnerability.This vulnerability
| concerns the `igl::MshLoader::parse_nodes` function while handling
| an `ascii`.msh` file.


CVE-2024-23947[9]:
| Multiple improper array index validation vulnerabilities exist in
| the readMSH functionality of libigl v2.5.0. A specially crafted .msh
| file can lead to an out-of-bounds write. An attacker can provide a
| malicious file to trigger this vulnerability.This vulnerability
| concerns the `igl::MshLoader::parse_nodes` function while handling a
| `binary` `.msh` file.


CVE-2024-22181[10]:
| An out-of-bounds write vulnerability exists in the readNODE
| functionality of libigl v2.5.0. A speciall

Bug#1074236: node-ws: CVE-2024-37890

2024-06-24 Thread Moritz Mühlenhoff
Source: node-ws
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for node-ws.

CVE-2024-37890[0]:
| ws is an open source WebSocket client and server for Node.js. A
| request with a number of headers exceeding theserver.maxHeadersCount
| threshold could be used to crash a ws server. The vulnerability was
| fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876),
| ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions
| of ws, the issue can be mitigated in the following ways: 1. Reduce
| the maximum allowed length of the request headers using the --max-
| http-header-size=size and/or the maxHeaderSize options so that no
| more headers than the server.maxHeadersCount limit can be sent. 2.
| Set server.maxHeadersCount to 0 so that no limit is applied.

https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q
https://github.com/websockets/ws/issues/2230
https://github.com/websockets/ws/pull/2231
https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c
 (8.17.1)
https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f
 (7.5.10)
https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63
 (6.2.3)
https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e
 (5.2.4)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-37890
https://www.cve.org/CVERecord?id=CVE-2024-37890

Please adjust the affected versions in the BTS as needed.



Bug#1073061: r-base: CVE-2024-27322 execution of arbitrary code

2024-06-25 Thread Moritz Mühlenhoff
Am Wed, Jun 12, 2024 at 05:00:25PM -0500 schrieb Dirk Eddelbuettel:
> 
> On 12 June 2024 at 23:46, Moritz Mühlenhoff wrote:
> | Dirk Eddelbuettel wrote:
> | > Just FYI the view of R Core (upstream) and the R Foundation (I'm on the 
> board)
> | > is that this is a nothingburger. We would love for the CVE to be retracted
> | > but nobody (among a team of volunteers) has time or energy to pursue this.
> | > 
> | > See 
> https://blog.r-project.org/2024/05/10/statement-on-cve-2024-27322/index.html 
> | > for the official statement.
> | 
> | JFTR, I've sent a request to mark this CVE as rejected, with a reference to
> | the statement above.
> 
> Fabulous!!!  Any past experience whether this may succeed?

It often does, but takes up to a few weeks...

We'll let you know if a reject appears in the CVE feed.

Cheers,
Moritz



Bug#1074284: squid: CVE-2024-37894

2024-06-25 Thread Moritz Mühlenhoff
Source: squid
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for squid.

CVE-2024-37894[0]:
| Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP,
| and more. Due to an Out-of-bounds Write error when assigning ESI
| variables, Squid is susceptible to a Memory Corruption error. This
| error can lead to a Denial of Service attack.

https://github.com/squid-cache/squid/security/advisories/GHSA-wgvf-q977-9xjg

https://github.com/squid-cache/squid/commit/920563e7a080155fae3ced73d6198781e8b0ff04
 (master)
https://github.com/squid-cache/squid/commit/67f5496f7b72e698ad0f5aa3512c83089424f27f
 (v6)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-37894
https://www.cve.org/CVERecord?id=CVE-2024-37894

Please adjust the affected versions in the BTS as needed.



Bug#1074414: gpac: CVE-2024-6061 CVE-2024-6062 CVE-2024-6063 CVE-2024-6064

2024-06-28 Thread Moritz Mühlenhoff
Source: gpac
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for gpac.

CVE-2024-6061[0]:
| A vulnerability has been found in GPAC 2.5-DEV-
| rev228-g11067ea92-master and classified as problematic. Affected by
| this vulnerability is the function isoffin_process of the file
| src/filters/isoffin_read.c of the component MP4Box. The manipulation
| leads to infinite loop. It is possible to launch the attack on the
| local host. The exploit has been disclosed to the public and may be
| used. The identifier of the patch is
| 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply
| a patch to fix this issue. The identifier VDB-268789 was assigned to
| this vulnerability.

https://github.com/gpac/gpac/issues/2871
https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c

CVE-2024-6062[1]:
| A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master
| and classified as problematic. Affected by this issue is the
| function swf_svg_add_iso_sample of the file src/filters/load_text.c
| of the component MP4Box. The manipulation leads to null pointer
| dereference. The attack needs to be approached locally. The exploit
| has been disclosed to the public and may be used. The patch is
| identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is
| recommended to apply a patch to fix this issue. VDB-268790 is the
| identifier assigned to this vulnerability.

https://github.com/gpac/gpac/issues/2872
https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd

CVE-2024-6063[2]:
| A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master.
| It has been classified as problematic. This affects the function
| m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component
| MP4Box. The manipulation leads to null pointer dereference. An
| attack has to be approached locally. The exploit has been disclosed
| to the public and may be used. The patch is named
| 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply
| a patch to fix this issue. The associated identifier of this
| vulnerability is VDB-268791.

https://github.com/gpac/gpac/issues/2873
https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5

CVE-2024-6064[3]:
| A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master.
| It has been declared as problematic. This vulnerability affects the
| function xmt_node_end of the file src/scene_manager/loader_xmt.c of
| the component MP4Box. The manipulation leads to use after free.
| Local access is required to approach this attack. The exploit has
| been disclosed to the public and may be used. The name of the patch
| is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf6
| 90567980d96662f5. It is recommended to apply a patch to fix this
| issue. The identifier of this vulnerability is VDB-268792.

https://github.com/gpac/gpac/issues/2874
https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-6061
https://www.cve.org/CVERecord?id=CVE-2024-6061
[1] https://security-tracker.debian.org/tracker/CVE-2024-6062
https://www.cve.org/CVERecord?id=CVE-2024-6062
[2] https://security-tracker.debian.org/tracker/CVE-2024-6063
https://www.cve.org/CVERecord?id=CVE-2024-6063
[3] https://security-tracker.debian.org/tracker/CVE-2024-6064
https://www.cve.org/CVERecord?id=CVE-2024-6064

Please adjust the affected versions in the BTS as needed.



Bug#1074415: slic3r-prusa: CVE-2020-28594 CVE-2020-28595 CVE-2020-28596 CVE-2020-28598

2024-06-28 Thread Moritz Mühlenhoff
Source: slic3r-prusa
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for slic3r-prusa.

Although these are quite old, I believe they have never been properly
reported upstream and are unfixed to this day?

CVE-2020-28594[0]:
| A use-after-free vulnerability exists in the
| _3MF_Importer::_handle_end_model() functionality of Prusa Research
| PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted
| 3MF file can lead to code execution. An attacker can provide a
| malicious file to trigger this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1218

CVE-2020-28595[1]:
| An out-of-bounds write vulnerability exists in the Obj.cpp
| load_obj() functionality of Prusa Research PrusaSlicer 2.2.0 and
| Master (commit 4b040b856). A specially crafted obj file can lead to
| code execution. An attacker can provide a malicious file to trigger
| this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1219

CVE-2020-28596[2]:
| A stack-based buffer overflow vulnerability exists in the
| Objparser::objparse() functionality of Prusa Research PrusaSlicer
| 2.2.0 and Master (commit 4b040b856). A specially crafted obj file
| can lead to code execution. An attacker can provide a malicious file
| to trigger this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1220

CVE-2020-28598[3]:
| An out-of-bounds write vulnerability exists in the Admesh
| stl_fix_normal_directions() functionality of Prusa Research
| PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted
| AMF file can lead to code execution. An attacker can provide a
| malicious file to trigger this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1222

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-28594
https://www.cve.org/CVERecord?id=CVE-2020-28594
[1] https://security-tracker.debian.org/tracker/CVE-2020-28595
https://www.cve.org/CVERecord?id=CVE-2020-28595
[2] https://security-tracker.debian.org/tracker/CVE-2020-28596
https://www.cve.org/CVERecord?id=CVE-2020-28596
[3] https://security-tracker.debian.org/tracker/CVE-2020-28598
https://www.cve.org/CVERecord?id=CVE-2020-28598

Please adjust the affected versions in the BTS as needed.



Bug#1074416: libde265: CVE-2024-38949 CVE-2024-38950

2024-06-28 Thread Moritz Mühlenhoff
Source: libde265
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for libde265.

CVE-2024-38949[0]:
| Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows
| attackers to crash the application via crafted payload to
| display444as420 function at sdl.cc

https://github.com/strukturag/libde265/issues/460

CVE-2024-38950[1]:
| Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows
| attackers to crash the application via crafted payload to
| __interceptor_memcpy function.

https://github.com/strukturag/libde265/issues/460

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-38949
https://www.cve.org/CVERecord?id=CVE-2024-38949
[1] https://security-tracker.debian.org/tracker/CVE-2024-38950
https://www.cve.org/CVERecord?id=CVE-2024-38950

Please adjust the affected versions in the BTS as needed.



Bug#1074417: zziplib: CVE-2024-39133

2024-06-28 Thread Moritz Mühlenhoff
Source: zziplib
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for zziplib.

CVE-2024-39133[0]:
| Heap Buffer Overflow vulnerability in zziplib v0.13.77 allows
| attackers to cause a denial of service via the
| __zzip_parse_root_directory() function at /zzip/zip.c.

https://github.com/gdraheim/zziplib/issues/164


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-39133
https://www.cve.org/CVERecord?id=CVE-2024-39133

Please adjust the affected versions in the BTS as needed.



Bug#1074419: bluez: CVE-2023-51596

2024-06-28 Thread Moritz Mühlenhoff
Source: bluez
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for bluez.

CVE-2023-51596[0]:
| BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote
| Code Execution Vulnerability. This vulnerability allows network-
| adjacent attackers to execute arbitrary code on affected
| installations of BlueZ. User interaction is required to exploit this
| vulnerability in that the target must connect to a malicious
| Bluetooth device.  The specific flaw exists within the handling of
| the Phone Book Access profile. The issue results from the lack of
| proper validation of the length of user-supplied data prior to
| copying it to a fixed-length heap-based buffer. An attacker can
| leverage this vulnerability to execute code in the context of root.
| Was ZDI-CAN-20939.

https://www.zerodayinitiative.com/advisories/ZDI-23-1902/

Not sure if this was reported upstream, might be worth reaching out.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-51596
https://www.cve.org/CVERecord?id=CVE-2023-51596

Please adjust the affected versions in the BTS as needed.



Bug#1074418: libmodbus: CVE-2023-26793

2024-06-28 Thread Moritz Mühlenhoff
Source: libmodbus
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for libmodbus.

CVE-2023-26793[0]:
| libmodbus v3.1.10 has a heap-based buffer overflow vulnerability in
| read_io_status function in src/modbus.c.

https://github.com/stephane/libmodbus/issues/683


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-26793
https://www.cve.org/CVERecord?id=CVE-2023-26793

Please adjust the affected versions in the BTS as needed.



Bug#1074422: libmodbus: CVE-2024-36843 CVE-2024-36844 CVE-2024-36845

2024-06-28 Thread Moritz Mühlenhoff
Source: libmodbus
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for libmodbus.

CVE-2024-36843[0]:
| libmodbus v3.1.6 was discovered to contain a heap overflow via the
| modbus_mapping_free() function.

https://github.com/stephane/libmodbus/issues/748

CVE-2024-36844[1]:
| libmodbus v3.1.6 was discovered to contain a use-after-free via the
| ctx->backend pointer. This vulnerability allows attackers to cause a
| Denial of Service (DoS) via a crafted message sent to the unit-test-
| server.

https://github.com/stephane/libmodbus/issues/749

CVE-2024-36845[2]:
| An invalid pointer in the modbus_receive() function of libmodbus
| v3.1.6 allows attackers to cause a Denial of Service (DoS) via a
| crafted message sent to the unit-test-server.

https://github.com/stephane/libmodbus/issues/750

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-36843
https://www.cve.org/CVERecord?id=CVE-2024-36843
[1] https://security-tracker.debian.org/tracker/CVE-2024-36844
https://www.cve.org/CVERecord?id=CVE-2024-36844
[2] https://security-tracker.debian.org/tracker/CVE-2024-36845
https://www.cve.org/CVERecord?id=CVE-2024-36845

Please adjust the affected versions in the BTS as needed.



Bug#1074421: grpc: CVE-2023-44487

2024-06-28 Thread Moritz Mühlenhoff
Source: grpc
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for grpc.

CVE-2023-44487[0]:
| The HTTP/2 protocol allows a denial of service (server resource
| consumption) because request cancellation can reset many streams
| quickly, as exploited in the wild in August through October 2023.

https://github.com/grpc/grpc/pull/34763


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-44487
https://www.cve.org/CVERecord?id=CVE-2023-44487

Please adjust the affected versions in the BTS as needed.



Bug#1074424: zziplib: CVE-2024-39134

2024-06-28 Thread Moritz Mühlenhoff
Source: zziplib
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for zziplib.

CVE-2024-39134[0]:
| A Stack Buffer Overflow vulnerability in zziplibv 0.13.77 allows
| attackers to cause a denial of service via the
| __zzip_fetch_disk_trailer() function at /zzip/zip.c.

https://github.com/gdraheim/zziplib/issues/165


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-39134
https://www.cve.org/CVERecord?id=CVE-2024-39134

Please adjust the affected versions in the BTS as needed.



Bug#1074425: openvpn-auth-ldap: CVE-2024-28820

2024-06-28 Thread Moritz Mühlenhoff
Source: openvpn-auth-ldap
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for openvpn-auth-ldap.

CVE-2024-28820[0]:
| Buffer overflow in the extract_openvpn_cr function in openvpn-cr.c
| in openvpn-auth-ldap (aka the Three Rings Auth-LDAP plugin for
| OpenVPN) 2.0.4 allows attackers with a valid LDAP username and who
| can control the challenge/response password field to pass a string
| with more than 14 colons into this field and cause a buffer
| overflow.

https://github.com/threerings/openvpn-auth-ldap/pull/92


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-28820
https://www.cve.org/CVERecord?id=CVE-2024-28820

Please adjust the affected versions in the BTS as needed.



Bug#1074423: nltk: CVE-2024-39705

2024-06-28 Thread Moritz Mühlenhoff
Source: nltk
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for nltk.

CVE-2024-39705[0]:
| NLTK through 3.8.1 allows remote code execution if untrusted
| packages have pickled Python code, and the integrated data package
| download functionality is used. This affects, for example,
| averaged_perceptron_tagger and punkt.

https://github.com/nltk/nltk/issues/3266
https://github.com/nltk/nltk/issues/2522


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-39705
https://www.cve.org/CVERecord?id=CVE-2024-39705

Please adjust the affected versions in the BTS as needed.



Bug#1074426: golang-golang-x-image: CVE-2024-24792

2024-06-28 Thread Moritz Mühlenhoff
Source: golang-golang-x-image
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for golang-golang-x-image.

CVE-2024-24792[0]:
| Parsing a corrupt or malicious image with invalid color indices can
| cause a panic.

https://github.com/advisories/GHSA-9phm-fm57-rhg8
https://github.com/golang/go/issues/67624
https://go-review.googlesource.com/c/image/+/588115


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-24792
https://www.cve.org/CVERecord?id=CVE-2024-24792

Please adjust the affected versions in the BTS as needed.



Bug#1074429: xml-security-c: CVE-2024-34580

2024-06-28 Thread Moritz Mühlenhoff
Source: xml-security-c
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for xml-security-c.

CVE-2024-34580[0]:
| Apache XML Security for C++ through 2.0.4 implements the XML
| Signature Syntax and Processing (XMLDsig) specification without
| protection against an SSRF payload in a KeyInfo element. NOTE: the
| supplier disputes this CVE Record on the grounds that they are
| implementing the specification "correctly" and are not "at fault."

https://cloud.google.com/blog/topics/threat-intelligence/apache-library-allows-server-side-request-forgery
https://www.sonatype.com/blog/the-exploited-ivanti-connect-ssrf-vulnerability-stems-from-xmltooling-oss-library
https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2024-21893.md

Not sure what to make out of this? It seems the use of xml-security-sec
within Shibboleth continues to be supported, but otherwise the library
is deemed deprecated, so maybe this should at least be made explicit
in the package description?
`
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-34580
https://www.cve.org/CVERecord?id=CVE-2024-34580

Please adjust the affected versions in the BTS as needed.



Bug#1074430: adminer: CVE-2023-45196 CVE-2023-45195

2024-06-28 Thread Moritz Mühlenhoff
Source: adminer
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for adminer.

CVE-2023-45196[0]:
| Adminer and AdminerEvo allow an unauthenticated remote attacker to
| cause a denial of service by connecting to an attacker-controlled
| service that responds with HTTP redirects. The denial of service is
| subject to PHP configuration limits. Adminer is no longer supported,
| but this issue was fixed in AdminerEvo version 4.8.4.

https://github.com/adminerevo/adminerevo/pull/102/commits/23e7cdc0a32b3739e13d19ae504be0fe215142b6

CVE-2023-45195[1]:
| Adminer and AdminerEvo are vulnerable to SSRF via database
| connection fields. This could allow an unauthenticated remote
| attacker to enumerate or access systems the attacker would not
| otherwise have access to. Adminer is no longer supported, but this
| issue was fixed in AdminerEvo version 4.8.4.

https://github.com/adminerevo/adminerevo/pull/102/commits/18f3167bbcbec3bc746f62db72e016aa99144efc

It seems adminer is dead upstream and adminerevo picked up development,
so most likely Debian should follow the new upstream?


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-45196
https://www.cve.org/CVERecord?id=CVE-2023-45196
[1] https://security-tracker.debian.org/tracker/CVE-2023-45195
https://www.cve.org/CVERecord?id=CVE-2023-45195

Please adjust the affected versions in the BTS as needed.



Bug#1074431: arm-trusted-firmware: CVE-2024-6287 CVE-2024-6285

2024-06-28 Thread Moritz Mühlenhoff
Source: arm-trusted-firmware
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for arm-trusted-firmware.

CVE-2024-6287[0]:
| Incorrect Calculation vulnerability in Renesas arm-trusted-firmware
| allows Local Execution of Code.   When checking whether a new image
| invades/overlaps with a previously loaded image the code neglects to
| consider a few cases. that could An attacker to bypass memory range
| restriction and overwrite an already loaded image partly or
| completely, which could result in code execution and bypass of
| secure boot.

https://github.com/renesas-rcar/arm-trusted-firmware/commit/954d488a9798f8fda675c6b57c571b469b298f04
https://asrg.io/security-advisories/cve-2024-6287-incorrect-address-range-calculations-in-renesas-rcar/


CVE-2024-6285[1]:
| Integer Underflow (Wrap or Wraparound) vulnerability in Renesas arm-
| trusted-firmware. An integer underflow in image range check
| calculations could lead to bypassing address restrictions and
| loading of images to unallowed addresses.

https://github.com/renesas-rcar/arm-trusted-firmware/commit/b596f580637bae919b0ac3a5471422a1f756db3b
https://asrg.io/security-advisories/cve-2024-6285-integer-underflow-in-memory-range-check-in-renesas-rcar/


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-6287
https://www.cve.org/CVERecord?id=CVE-2024-6287
[1] https://security-tracker.debian.org/tracker/CVE-2024-6285
https://www.cve.org/CVERecord?id=CVE-2024-6285

Please adjust the affected versions in the BTS as needed.



Bug#1032664: mootools: CVE-2021-32821

2023-03-10 Thread Moritz Mühlenhoff
Source: mootools
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for mootools.

CVE-2021-32821[0]:
| MooTools is a collection of JavaScript utilities for JavaScript
| developers. All known versions include a CSS selector parser that is
| vulnerable to Regular Expression Denial of Service (ReDoS). An attack
| requires that an attacker can inject a string into a CSS selector at
| runtime, which is quite common with e.g. jQuery CSS selectors. No
| patches are available for this issue.

https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-32821
https://www.cve.org/CVERecord?id=CVE-2021-32821

Please adjust the affected versions in the BTS as needed.



Bug#1032665: tidy-html5: CVE-2021-33391

2023-03-10 Thread Moritz Mühlenhoff
Source: tidy-html5
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for tidy-html5.

CVE-2021-33391[0]:
| An issue in HTACG HTML Tidy v5.7.28 allows attacker to execute
| arbitrary code via the -g option of the CleanNode() function in
| gdoc.c.

https://github.com/htacg/tidy-html5/issues/946
https://github.com/htacg/tidy-html5/commit/efa61528aa500a1efbd2768121820742d3bb709b


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-33391
https://www.cve.org/CVERecord?id=CVE-2021-33391

Please adjust the affected versions in the BTS as needed.



Bug#1032666: freeimage: CVE-2021-33367

2023-03-10 Thread Moritz Mühlenhoff
Source: freeimage
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for freeimage.

CVE-2021-33367[0]:
| Buffer Overflow vulnerability in Freeimage v3.18.0 allows attacker to
| cause a denial of service via a crafted JXR file.

https://sourceforge.net/p/freeimage/discussion/36109/thread/1a4db03d58/

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-33367
https://www.cve.org/CVERecord?id=CVE-2021-33367

Please adjust the affected versions in the BTS as needed.



Bug#1032667: radare2: CVE-2023-27114

2023-03-10 Thread Moritz Mühlenhoff
Source: radare2
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for radare2.

CVE-2023-27114[0]:
| radare2 v5.8.3 was discovered to contain a segmentation fault via the
| component wasm_dis at p/wasm/wasm.c.

https://github.com/radareorg/radare2/issues/21363
https://github.com/radareorg/radare2/commit/13308c9aad79f9c7a3507ce549fe270103e8ceea


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-27114
https://www.cve.org/CVERecord?id=CVE-2023-27114

Please adjust the affected versions in the BTS as needed.



Bug#1032668: nvidia-cuda-toolkit: CVE-2023-0193 CVE-2023-0196

2023-03-10 Thread Moritz Mühlenhoff
Source: nvidia-cuda-toolkit
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerabilities were published for nvidia-cuda-toolkit.

CVE-2023-0193[0]:
No description was found (try on a search engine)

CVE-2023-0196[1]:
| NVIDIA CUDA Toolkit SDK contains a bug in cuobjdump, where a local
| user running the tool against an ill-formed binary may cause a null-
| pointer dereference, which may result in a limited denial of service.

https://nvidia.custhelp.com/app/answers/detail/a_id/5446


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-0193
https://www.cve.org/CVERecord?id=CVE-2023-0193
[1] https://security-tracker.debian.org/tracker/CVE-2023-0196
https://www.cve.org/CVERecord?id=CVE-2023-0196

Please adjust the affected versions in the BTS as needed.



Bug#1032669: wabt: CVE-2023-27115 CVE-2023-27116 CVE-2023-27117 CVE-2023-27119

2023-03-10 Thread Moritz Mühlenhoff
Source: wabt
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerabilities were published for wabt.

CVE-2023-27115[0]:
| WebAssembly v1.0.29 was discovered to contain a segmentation fault via
| the component wabt::cat_compute_size.

https://github.com/WebAssembly/wabt/issues/1938
https://github.com/WebAssembly/wabt/issues/1992

CVE-2023-27116[1]:
| WebAssembly v1.0.29 discovered to contain an abort in
| CWriter::MangleType.

https://github.com/WebAssembly/wabt/issues/1984
https://github.com/WebAssembly/wabt/pull/2119
https://github.com/WebAssembly/wabt/commit/8a7b7497bdf78f9099f8d5a3a2c9bde87ddd52da

CVE-2023-27117[2]:
| WebAssembly v1.0.29 was discovered to contain a heap overflow via the
| component component wabt::Node::operator.

https://github.com/WebAssembly/wabt/issues/1989

CVE-2023-27119[3]:
| WebAssembly v1.0.29 was discovered to contain a segmentation fault via
| the component wabt::Decompiler::WrapChild.

https://github.com/WebAssembly/wabt/issues/1990

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-27115
https://www.cve.org/CVERecord?id=CVE-2023-27115
[1] https://security-tracker.debian.org/tracker/CVE-2023-27116
https://www.cve.org/CVERecord?id=CVE-2023-27116
[2] https://security-tracker.debian.org/tracker/CVE-2023-27117
https://www.cve.org/CVERecord?id=CVE-2023-27117
[3] https://security-tracker.debian.org/tracker/CVE-2023-27119
https://www.cve.org/CVERecord?id=CVE-2023-27119

Please adjust the affected versions in the BTS as needed.



Bug#1032670: allegro4.4: CVE-2021-36489

2023-03-10 Thread Moritz Mühlenhoff
Source: allegro4.4
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for allegro4.4.

CVE-2021-36489[0]:
| Buffer Overflow vulnerability in Allegro through 5.2.6 allows
| attackers to cause a denial of service via crafted PCX/TGA/BMP files
| to allegro_image addon.

https://github.com/liballeg/allegro5/issues/1251
https://github.com/liballeg/allegro5/pull/1253

These fixes landed in Allegro 5.2.8.0:
https://github.com/liballeg/allegro5/commit/3f2dbd494241774d33aaf83910fd05b2a590604a
 (5.2.8.0)
https://github.com/liballeg/allegro5/commit/cca179bc16827f358153060cd10ac73d394e758c
 (5.2.8.0)
https://github.com/liballeg/allegro5/commit/a2c93939f6997a96ecac1865dbb4fa3f66b5e1b7
 (5.2.8.0)
https://github.com/liballeg/allegro5/commit/0294e28e6135292eab4b2916a7d2223b1bb6843e
 (5.2.8.0)

In allegro 4.4, code is in src/[pcx|tga].c instead


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-36489
https://www.cve.org/CVERecord?id=CVE-2021-36489

Please adjust the affected versions in the BTS as needed.



Bug#1032885: unblock: debian-security-support/1:12+2023.03.05

2023-03-13 Thread Moritz Mühlenhoff
Am Mon, Mar 13, 2023 at 01:43:11PM +0100 schrieb Holger Levsen:
>   * security-support-limited:
> - for golang and openjdk-17, point to the bookworm manual instead the one
>   for bullseye.

That's wrong, though. (And the release notes need updating to, I'll file
a bug soonish): In Bookworm openjdk-17 is the default Java and fully
supported, but we need the equivalent note for openjdk-21 now.

Cheers,
Moritz



Bug#1014714: nim: CVE-2021-41259

2023-03-15 Thread Moritz Mühlenhoff
Am Sun, Jul 10, 2022 at 07:31:30PM +0200 schrieb Moritz Mühlenhoff:
> Source: nim
> X-Debbugs-CC: t...@security.debian.org
> Severity: normal
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for nim.
> 
> CVE-2021-41259[0]:
> | Nim is a systems programming language with a focus on efficiency,
> | expressiveness, and elegance. In affected versions the uri.parseUri
> | function which may be used to validate URIs accepts null bytes in the
> | input URI. This behavior could be used to bypass URI validation. For
> | example: parseUri("http://localhost\0hello";).hostname is set to
> | "localhost\0hello". Additionally, httpclient.getContent accepts null
> | bytes in the input URL and ignores any data after the first null byte.
> | Example: getContent("http://localhost\0hello";) makes a request to
> | localhost:80. An attacker can use a null bytes to bypass the check and
> | mount a SSRF attack.
> 
> https://github.com/nim-lang/security/security/advisories/GHSA-3gg2-rw3q-qwgc

Could we get this fixed for bookworm?

Cheers,
Moritz



Bug#992172: exim4: CVE-2021-38371

2023-03-15 Thread Moritz Mühlenhoff
Am Sun, Aug 15, 2021 at 07:21:40AM +0200 schrieb Andreas Metzler:
> On 2021-08-14 Salvatore Bonaccorso  wrote:
> > Source: exim4
> > Version: 4.94.2-7
> > Severity: important
> > Tags: security upstream
> > X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> > 
> 
> > Hi,
> 
> > The following vulnerability was published for exim4, this is to start
> > tracking the issue downstream for us. Note that at time of writing [2]
> > gives still a 404.
> 
> > CVE-2021-38371[0]:
> > | The STARTTLS feature in Exim through 4.94.2 allows response injection
> > | (buffering) during MTA SMTP sending.
> [...]
> 
> IIRC that is mitigated in experimental (4.95 rc) by ALPN and unkown
> command related changes, I will not be able to check in detail for a
> week or so, though.

Do you know if this is fixed in 4.96/bookworm?

Cheers,
Moritz



Bug#1023693: libstb: CVE-2021-37789

2023-03-15 Thread Moritz Mühlenhoff
Am Tue, Nov 08, 2022 at 08:42:05PM +0100 schrieb Moritz Mühlenhoff:
> Source: libstb
> X-Debbugs-CC: t...@security.debian.org
> Severity: important
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for libstb.
> 
> CVE-2021-37789[0]:
> | stb_image.h 2.27 has a heap-based buffer over in stbi__jpeg_load,
> | leading to Information Disclosure or Denial of Service.
> 
> https://github.com/nothings/stb/issues/1178

This is fixed in 
https://github.com/nothings/stb/commit/5ba0baaa269b3fd681828e0e3b3ac0f1472eaf40

Could we get that fixed for bookworm?

Cheers,
Moritz



Bug#983576: CVE-2020-8020 CVE-2020-8021 CVE-2020-8031

2023-03-15 Thread Moritz Mühlenhoff
Am Fri, Feb 26, 2021 at 05:29:07PM +0100 schrieb Moritz Muehlenhoff:
> Source: open-build-service
> Severity: important
> Tags: security
> X-Debbugs-Cc: Debian Security Team 
> 
> CVE-2020-8020:
> https://bugzilla.suse.com/show_bug.cgi?id=1171439
> https://github.com/openSUSE/open-build-service/commit/7cc32c8e2ff7290698e101d9a80a9dc29a5500fb
> 
> CVE-2020-8021:
> https://bugzilla.suse.com/show_bug.cgi?id=1171649
> https://github.com/openSUSE/open-build-service/commit/7323c904f86ba9e04065c23422d06c03647589fb
> 
> CVE-2020-8031:
> https://bugzilla.suse.com/show_bug.cgi?id=1178880

Could we get these fixed for bookworm? (Plus #911797)

Cheers,
Moritz



Bug#1019594: closed by Daniel Baumann (bts)

2023-03-15 Thread Moritz Mühlenhoff
Am Sun, Feb 19, 2023 at 06:03:09PM + schrieb Debian Bug Tracking System:
> This is an automatic notification regarding your Bug report
> which was filed against the src:deluge package:
> 
> #1019594: deluge: CVE-2021-3427
> 
> It has been closed by Daniel Baumann .
> 
> Their explanation is attached below along with your original report.
> If this explanation is unsatisfactory and you have not received a
> better one in a separate message then please contact Daniel Baumann 
>  by
> replying to this email.

Hi Daniel,
What about 2.0.3, do you please to also address this for bookworm?

Cheers,
Moritz



Bug#1014599: svgpp: CVE-2021-44960

2023-03-16 Thread Moritz Mühlenhoff
Am Fri, Jul 08, 2022 at 04:31:10PM +0200 schrieb Moritz Mühlenhoff:
> Source: svgpp
> X-Debbugs-CC: t...@security.debian.org
> Severity: normal
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for svgpp.
> 
> CVE-2021-44960[0]:
> | In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the
> | renderDocument function handled the XMLDocument object improperly,
> | returning a null pointer in advance at the second if, resulting in a
> | null pointer reference behind the renderDocument function.
> 
> https://github.com/svgpp/svgpp/issues/101

This was fixed in 
https://github.com/svgpp/svgpp/commit/0bc57f2cc6d9d86a0fa1ce73e508c2b5994b4b91
Could we get that fixed for Bookworm?

Cheers,
Moritz



Bug#1012763: golang-github-emicklei-go-restful: CVE-2022-1996

2023-03-16 Thread Moritz Mühlenhoff
Am Mon, Jun 13, 2022 at 06:12:36PM +0200 schrieb Moritz Mühlenhoff:
> Source: golang-github-emicklei-go-restful
> X-Debbugs-CC: t...@security.debian.org
> Severity: important
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for 
> golang-github-emicklei-go-restful.
> 
> CVE-2022-1996[0]:
> | Authorization Bypass Through User-Controlled Key in GitHub repository
> | emicklei/go-restful prior to v3.8.0.
> 
> https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1/
> https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10

Could we get that fixed for Bookworm?

Cheers,
Moritz



Bug#988948: CVE-2019-11939

2023-03-16 Thread Moritz Mühlenhoff
Am Fri, May 21, 2021 at 09:46:31PM +0200 schrieb Moritz Muehlenhoff:
> Source: thrift
> Severity: important
> Tags: security
> X-Debbugs-Cc: Debian Security Team 
> 
> CVE-2019-11939:
> https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757

Hi,
is this fixed in Bookworm?

Cheers,
Moritz



Bug#1032885: unblock: debian-security-support/1:12+2023.03.05

2023-03-17 Thread Moritz Mühlenhoff
Am Mon, Mar 13, 2023 at 03:07:34PM + schrieb Holger Levsen:
> On Mon, Mar 13, 2023 at 03:58:45PM +0100, Moritz Mühlenhoff wrote:
> > Am Mon, Mar 13, 2023 at 01:43:11PM +0100 schrieb Holger Levsen:
> > >   * security-support-limited:
> > > - for golang and openjdk-17, point to the bookworm manual instead the 
> > > one
> > >   for bullseye.
> > That's wrong, though. (And the release notes need updating to, I'll file
> > a bug soonish): In Bookworm openjdk-17 is the default Java and fully
> > supported, but we need the equivalent note for openjdk-21 now.
> 
> thanks, Moritz. I'll happily update d-s-s once the release manual is updated.
> or i could update d-s-s now too, if it's really just about replacing 17 with
> 21 in this line from  security-support-limited :
> 
> openjdk-17See 
> https://www.debian.org/releases/bookworm/amd64/release-notes/ch-information.en.html#openjdk-17

Ack. I also filed #1033069 to update the release notes.

> Are there any further updates expected from the security team's POV?

I pushed a change to add a note on the legacy Spring classes we only use to
build some packages, but with by itself are not supported to run anything.

With that I think everything is covered for Bookworm I think.

Cheers,
Moritz



Bug#1013279: cookiecutter: CVE-2022-24065

2023-03-17 Thread Moritz Mühlenhoff
Am Mon, Jun 20, 2022 at 04:59:39PM +0200 schrieb Moritz Mühlenhoff:
> Source: cookiecutter
> X-Debbugs-CC: t...@security.debian.org
> Severity: important
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for cookiecutter.
> 
> CVE-2022-24065[0]:
> | The package cookiecutter before 2.1.1 are vulnerable to Command
> | Injection via hg argument injection. When calling the cookiecutter
> | function from Python code with the checkout parameter, it is passed to
> | the hg checkout command in a way that additional flags can be set. The
> | additional flags can be used to perform a command injection.
> 
> https://security.snyk.io/vuln/SNYK-PYTHON-COOKIECUTTER-2414281
> 
> Fixed in 2.1.1 and this isolated patch:
> https://github.com/cookiecutter/cookiecutter/releases/tag/2.1.1
> https://github.com/cookiecutter/cookiecutter/commit/fdffddb31fd2b46344dfa317531ff155e7999f77

Could we get that fixed for bookworm?

Cheers,
Moritz



Bug#1033109: libcpan-checksums-perl: CVE-2020-16155

2023-03-17 Thread Moritz Mühlenhoff
Source: libcpan-checksums-perl
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for libcpan-checksums-perl.

CVE-2020-16155[0]:
| The CPAN::Checksums package 2.12 for Perl does not uniquely define
| signed data.

https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-16155
https://www.cve.org/CVERecord?id=CVE-2020-16155

Please adjust the affected versions in the BTS as needed.



Bug#1033110: cmark-gfm: CVE-2023-22483 CVE-2023-22484 CVE-2023-22485 CVE-2023-22486

2023-03-17 Thread Moritz Mühlenhoff
Source: cmark-gfm
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for cmark-gfm.

CVE-2023-22483[0]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7 are
| subject to several polynomial time complexity issues in cmark-gfm that
| may lead to unbounded resource exhaustion and subsequent denial of
| service. Various commands, when piped to cmark-gfm with large values,
| cause the running time to increase quadratically. These
| vulnerabilities have been patched in version 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c

CVE-2023-22484[1]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7 are
| subject to a polynomial time complexity issue in cmark-gfm that may
| lead to unbounded resource exhaustion and subsequent denial of
| service. This vulnerability has been patched in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r

CVE-2023-22485[2]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. In versions prior 0.29.0.gfm.7, a
| crafted markdown document can trigger an out-of-bounds read in the
| `validate_protocol` function. We believe this bug is harmless in
| practice, because the out-of-bounds read accesses `malloc` metadata
| without causing any visible damage.This vulnerability has been patched
| in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr

CVE-2023-22486[3]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7
| contain a polynomial time complexity issue in handle_close_bracket
| that may lead to unbounded resource exhaustion and subsequent denial
| of service. This vulnerability has been patched in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-22483
https://www.cve.org/CVERecord?id=CVE-2023-22483
[1] https://security-tracker.debian.org/tracker/CVE-2023-22484
https://www.cve.org/CVERecord?id=CVE-2023-22484
[2] https://security-tracker.debian.org/tracker/CVE-2023-22485
https://www.cve.org/CVERecord?id=CVE-2023-22485
[3] https://security-tracker.debian.org/tracker/CVE-2023-22486
https://www.cve.org/CVERecord?id=CVE-2023-22486

Please adjust the affected versions in the BTS as needed.



Bug#1033111: python-cmarkgfm: CVE-2023-22483 CVE-2023-22484 CVE-2023-22485 CVE-2023-22486

2023-03-17 Thread Moritz Mühlenhoff
Source: python-cmarkgfm
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for python-cmarkgfm.

CVE-2023-22483[0]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7 are
| subject to several polynomial time complexity issues in cmark-gfm that
| may lead to unbounded resource exhaustion and subsequent denial of
| service. Various commands, when piped to cmark-gfm with large values,
| cause the running time to increase quadratically. These
| vulnerabilities have been patched in version 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c

CVE-2023-22484[1]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7 are
| subject to a polynomial time complexity issue in cmark-gfm that may
| lead to unbounded resource exhaustion and subsequent denial of
| service. This vulnerability has been patched in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r

CVE-2023-22485[2]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. In versions prior 0.29.0.gfm.7, a
| crafted markdown document can trigger an out-of-bounds read in the
| `validate_protocol` function. We believe this bug is harmless in
| practice, because the out-of-bounds read accesses `malloc` metadata
| without causing any visible damage.This vulnerability has been patched
| in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr

CVE-2023-22486[3]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7
| contain a polynomial time complexity issue in handle_close_bracket
| that may lead to unbounded resource exhaustion and subsequent denial
| of service. This vulnerability has been patched in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-22483
https://www.cve.org/CVERecord?id=CVE-2023-22483
[1] https://security-tracker.debian.org/tracker/CVE-2023-22484
https://www.cve.org/CVERecord?id=CVE-2023-22484
[2] https://security-tracker.debian.org/tracker/CVE-2023-22485
https://www.cve.org/CVERecord?id=CVE-2023-22485
[3] https://security-tracker.debian.org/tracker/CVE-2023-22486
https://www.cve.org/CVERecord?id=CVE-2023-22486

Please adjust the affected versions in the BTS as needed.



Bug#1033112: r-cran-commonmark: CVE-2023-22483 CVE-2023-22484 CVE-2023-22485 CVE-2023-22486

2023-03-17 Thread Moritz Mühlenhoff
Source: r-cran-commonmark
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for r-cran-commonmark.

CVE-2023-22483[0]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7 are
| subject to several polynomial time complexity issues in cmark-gfm that
| may lead to unbounded resource exhaustion and subsequent denial of
| service. Various commands, when piped to cmark-gfm with large values,
| cause the running time to increase quadratically. These
| vulnerabilities have been patched in version 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c

CVE-2023-22484[1]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7 are
| subject to a polynomial time complexity issue in cmark-gfm that may
| lead to unbounded resource exhaustion and subsequent denial of
| service. This vulnerability has been patched in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r

CVE-2023-22485[2]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. In versions prior 0.29.0.gfm.7, a
| crafted markdown document can trigger an out-of-bounds read in the
| `validate_protocol` function. We believe this bug is harmless in
| practice, because the out-of-bounds read accesses `malloc` metadata
| without causing any visible damage.This vulnerability has been patched
| in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr

CVE-2023-22486[3]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7
| contain a polynomial time complexity issue in handle_close_bracket
| that may lead to unbounded resource exhaustion and subsequent denial
| of service. This vulnerability has been patched in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-22483
https://www.cve.org/CVERecord?id=CVE-2023-22483
[1] https://security-tracker.debian.org/tracker/CVE-2023-22484
https://www.cve.org/CVERecord?id=CVE-2023-22484
[2] https://security-tracker.debian.org/tracker/CVE-2023-22485
https://www.cve.org/CVERecord?id=CVE-2023-22485
[3] https://security-tracker.debian.org/tracker/CVE-2023-22486
https://www.cve.org/CVERecord?id=CVE-2023-22486

Please adjust the affected versions in the BTS as needed.



Bug#1033113: ruby-commonmarker: CVE-2023-22483 CVE-2023-22484 CVE-2023-22485 CVE-2023-22486

2023-03-17 Thread Moritz Mühlenhoff
Source: ruby-commonmarker
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for ruby-commonmarker.

CVE-2023-22483[0]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7 are
| subject to several polynomial time complexity issues in cmark-gfm that
| may lead to unbounded resource exhaustion and subsequent denial of
| service. Various commands, when piped to cmark-gfm with large values,
| cause the running time to increase quadratically. These
| vulnerabilities have been patched in version 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c

CVE-2023-22484[1]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7 are
| subject to a polynomial time complexity issue in cmark-gfm that may
| lead to unbounded resource exhaustion and subsequent denial of
| service. This vulnerability has been patched in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r

CVE-2023-22485[2]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. In versions prior 0.29.0.gfm.7, a
| crafted markdown document can trigger an out-of-bounds read in the
| `validate_protocol` function. We believe this bug is harmless in
| practice, because the out-of-bounds read accesses `malloc` metadata
| without causing any visible damage.This vulnerability has been patched
| in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr

CVE-2023-22486[3]:
| cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and
| rendering library and program in C. Versions prior to 0.29.0.gfm.7
| contain a polynomial time complexity issue in handle_close_bracket
| that may lead to unbounded resource exhaustion and subsequent denial
| of service. This vulnerability has been patched in 0.29.0.gfm.7.

https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-22483
https://www.cve.org/CVERecord?id=CVE-2023-22483
[1] https://security-tracker.debian.org/tracker/CVE-2023-22484
https://www.cve.org/CVERecord?id=CVE-2023-22484
[2] https://security-tracker.debian.org/tracker/CVE-2023-22485
https://www.cve.org/CVERecord?id=CVE-2023-22485
[3] https://security-tracker.debian.org/tracker/CVE-2023-22486
https://www.cve.org/CVERecord?id=CVE-2023-22486

Please adjust the affected versions in the BTS as needed.



Bug#1033114: python-oslo.privsep: CVE-2022-38065

2023-03-17 Thread Moritz Mühlenhoff
Source: python-oslo.privsep
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for python-oslo.privsep.

CVE-2022-38065[0]:
| A privilege escalation vulnerability exists in the oslo.privsep
| functionality of OpenStack git master 05194e7618 and prior. Overly
| permissive functionality within tools leveraging this library within a
| container can lead increased privileges.

This originates from 
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599
but it looks a little murky, since there's no commit 05194e7618 in the
upstream repo, probably best to reach out to upstream for details?


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-38065
https://www.cve.org/CVERecord?id=CVE-2022-38065

Please adjust the affected versions in the BTS as needed.



Bug#1033115: golang-github-go-macaron-csrf: CVE-2018-25060

2023-03-17 Thread Moritz Mühlenhoff
Source: golang-github-go-macaron-csrf
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for golang-github-go-macaron-csrf.

CVE-2018-25060[0]:
| A vulnerability was found in Macaron csrf and classified as
| problematic. Affected by this issue is some unknown functionality of
| the file csrf.go. The manipulation of the argument Generate leads to
| sensitive cookie without secure attribute. The attack may be launched
| remotely. The name of the patch is
| dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a
| patch to fix this issue. VDB-217058 is the identifier assigned to this
| vulnerability.

https://github.com/go-macaron/csrf/commit/dadd1711a617000b70e5e408a76531b73187031c
https://github.com/go-macaron/csrf/pull/7


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-25060
https://www.cve.org/CVERecord?id=CVE-2018-25060

Please adjust the affected versions in the BTS as needed.



Bug#1033116: gpac: CVE-2022-3222 CVE-2023-0866 CVE-2022-4202 CVE-2022-43039 CVE-2023-23143 CVE-2023-23144 CVE-2023-23145 CVE-2022-43040 CVE-2022-43042 CVE-2022-43043 CVE-2022-43044 CVE-2022-43045 CVE-

2023-03-17 Thread Moritz Mühlenhoff
Source: gpac
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for gpac.

CVE-2022-3222[0]:
| Uncontrolled Recursion in GitHub repository gpac/gpac prior to
| 2.1.0-DEV.

https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235/
https://github.com/gpac/gpac/commit/4e7736d7ec7bf64026daa611da951993bb42fdaf

CVE-2023-0866[2]:
| Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to
| 2.3.0-DEV.

https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f
https://github.com/gpac/gpac/commit/b964fe4226f1424cf676d5822ef898b6b01f5937

CVE-2022-4202[3]:
| A vulnerability, which was classified as problematic, was found in
| GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function
| lsr_translate_coords of the file laser/lsr_dec.c. The manipulation
| leads to integer overflow. It is possible to launch the attack
| remotely. The exploit has been disclosed to the public and may be
| used. The name of the patch is
| b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908. It is recommended to apply a
| patch to fix this issue. VDB-214518 is the identifier assigned to this
| vulnerability.

https://github.com/gpac/gpac/issues/2333
https://github.com/gpac/gpac/commit/b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908

CVE-2022-43039[4]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function gf_isom_meta_restore_items_ref
| at /isomedia/meta.c.

https://github.com/gpac/gpac/issues/2281
https://github.com/gpac/gpac/commit/62dbd5caad6b89b33535dfa19ef65419f0378303

CVE-2023-23143[5]:
| Buffer overflow vulnerability in function avc_parse_slice in file
| media_tools/av_parsers.c. GPAC version 2.3-DEV-rev1-g4669ba229-master.

https://github.com/gpac/gpac/commit/af6a5e7a96ee01a139cce6c9e4edfc069aad17a6

CVE-2023-23144[6]:
| Integer overflow vulnerability in function Q_DecCoordOnUnitSphere file
| bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master.

https://github.com/gpac/gpac/commit/3a2458a49b3e6399709d456d7b35e7a6f50cfb86

CVE-2023-23145[7]:
| GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a
| memory leak in lsr_read_rare_full function.

https://github.com/gpac/gpac/commit/4ade98128cbc41d5115b97a41ca2e59529c8dd5f

CVE-2022-43040[8]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap
| buffer overflow via the function gf_isom_box_dump_start_ex at
| /isomedia/box_funcs.c.

https://github.com/gpac/gpac/issues/2280
https://github.com/gpac/gpac/commit/f17dae31ebf6ea7af8c512165d9b954c2a6ea46e

CVE-2022-43042[9]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap
| buffer overflow via the function FixSDTPInTRAF at
| isomedia/isom_intern.c.

https://github.com/gpac/gpac/issues/2278
https://github.com/gpac/gpac/commit/3661da280b3eba75490e75ff20ad440c66e24de9

CVE-2022-43043[10]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function BD_CheckSFTimeOffset at
| /bifs/field_decode.c.

https://github.com/gpac/gpac/issues/2276
https://github.com/gpac/gpac/commit/6bff06cdb8e9b4e8ed2e789ee9340877759536fd

CVE-2022-43044[11]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function gf_isom_get_meta_item_info at
| /isomedia/meta.c.

https://github.com/gpac/gpac/issues/2282
https://github.com/gpac/gpac/commit/8a0e8e4ab13348cb1ab8e93b950a03d93f158a35

CVE-2022-43045[12]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function gf_dump_vrml_sffield at
| /scene_manager/scene_dump.c.

https://github.com/gpac/gpac/issues/2277
https://github.com/gpac/gpac/commit/c5249ee4b62dfc604fecb4dce2fc480b3e388bbb

CVE-2022-45202[13]:
| GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a
| stack overflow via the function dimC_box_read at
| isomedia/box_code_3gpp.c.

https://github.com/gpac/gpac/issues/2296
https://github.com/gpac/gpac/issues/2296#issuecomment-1303112783
Fixed by: 
https://github.com/gpac/gpac/commit/74e53280dad7b29f85386c6a1286fb92643465da

CVE-2022-45283[14]:
| GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the
| smil_parse_time_list parameter at /scenegraph/svg_attributes.c.

https://github.com/gpac/gpac/issues/2295
https://github.com/gpac/gpac/commit/0fc714872ba4536a1190f93aa278b6e08f8c60df

CVE-2022-45343[15]:
| GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a
| heap use-after-free via the Q_IsTypeOn function at
| /gpac/src/bifs/unquantize.c.

https://github.com/gpac/gpac/issues/2315
https://github.com/gpac/gpac/commit/1016912db5408b6f38e8eb715279493ae380d1c4

CVE-2022-46489[16]:
| GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to
| contain a memory leak via the gf_isom_box_parse_ex function at
| box_funcs.c.

https://github.com/gpac/gpac/issues/2328
https://github.com/gpac/gpac/commit/44e8616ec6d0c37498cdacb81375b09249fa9

Bug#1033250: node-request: CVE-2023-28155

2023-03-20 Thread Moritz Mühlenhoff
Source: node-request
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerability was published for node-request.

CVE-2023-28155[0]:
| ** UNSUPPORTED WHEN ASSIGNED ** The Request package through 2.88.1 for
| Node.js allows a bypass of SSRF mitigations via an attacker-controller
| server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to
| HTTP). NOTE: This vulnerability only affects products that are no
| longer supported by the maintainer.

https://github.com/request/request/issues/3442 was reported, but seems
the module is EOLed, so maybe we should be looking into retiring it
for trixie?

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-28155
https://www.cve.org/CVERecord?id=CVE-2023-28155

Please adjust the affected versions in the BTS as needed.



Bug#1033251: wordpress: CVE-2022-3590

2023-03-20 Thread Moritz Mühlenhoff
Source: wordpress
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for wordpress.

CVE-2022-3590[0]:
| WordPress is affected by an unauthenticated blind SSRF in the pingback
| feature. Because of a TOCTOU race condition between the validation
| checks and the HTTP request, attackers can reach internal hosts that
| are explicitly forbidden.

Only reference here is
https://www.sonarsource.com/blog/wordpress-core-unauthenticated-blind-ssrf/

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-3590
https://www.cve.org/CVERecord?id=CVE-2022-3590

Please adjust the affected versions in the BTS as needed.



Bug#1033253: undertow: CVE-2023-1108

2023-03-20 Thread Moritz Mühlenhoff
Source: undertow
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for undertow.

CVE-2023-1108[0]:
https://issues.redhat.com/browse/UNDERTOW-2239


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-1108
https://www.cve.org/CVERecord?id=CVE-2023-1108

Please adjust the affected versions in the BTS as needed.



Bug#1033252: maradns: CVE-2022-30256

2023-03-20 Thread Moritz Mühlenhoff
Source: maradns
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for maradns.

CVE-2022-30256[0]:
| An issue was discovered in MaraDNS Deadwood through 3.5.0021 that
| allows variant V1 of unintended domain name resolution. A revoked
| domain name can still be resolvable for a long time, including expired
| domains and taken-down malicious domains. The effects of an exploit
| would be widespread and highly impactful, because the exploitation
| conforms to de facto DNS specifications and operational practices, and
| overcomes current mitigation patches for "Ghost" domain names.

https://maradns.samiam.org/security.html#CVE-2022-30256

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-30256
https://www.cve.org/CVERecord?id=CVE-2022-30256

Please adjust the affected versions in the BTS as needed.



Bug#1033254: imagemagick: CVE-2023-1289

2023-03-20 Thread Moritz Mühlenhoff
Source: imagemagick
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for imagemagick.

CVE-2023-1289[0]:
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr
https://github.com/ImageMagick/ImageMagick/commit/c5b23cbf2119540725e6dc81f4deb25798ead6a4

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-1289
https://www.cve.org/CVERecord?id=CVE-2023-1289

Please adjust the affected versions in the BTS as needed.



Bug#1033255: aflplusplus: CVE-2023-26266

2023-03-20 Thread Moritz Mühlenhoff
Source: aflplusplus
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for aflplusplus.

CVE-2023-26266[0]:
| In AFL++ 4.05c, the CmpLog component uses the current working
| directory to resolve and execute unprefixed fuzzing targets, allowing
| code execution.

https://github.com/AFLplusplus/AFLplusplus/pull/1643
https://github.com/AFLplusplus/AFLplusplus/commit/f2be73186e2e16c3992f92b65ae9ba598d6fff2f
https://github.com/AFLplusplus/AFLplusplus/commit/673a0a3866783bf28e31d14fbd7a9009c7816ec3


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-26266
https://www.cve.org/CVERecord?id=CVE-2023-26266

Please adjust the affected versions in the BTS as needed.



Bug#1033257: libde265: CVE-2023-27102 CVE-2023-27103

2023-03-20 Thread Moritz Mühlenhoff
Source: libde265
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for libde265.

CVE-2023-27102[0]:
| Libde265 v1.0.11 was discovered to contain a segmentation violation
| via the function decoder_context::process_slice_segment_header at
| decctx.cc.

https://github.com/strukturag/libde265/issues/393
https://github.com/strukturag/libde265/commit/0b1752abff97cb542941d317a0d18aa50cb199b1

CVE-2023-27103[1]:
| Libde265 v1.0.11 was discovered to contain a heap buffer overflow via
| the function derive_collocated_motion_vectors at motion.cc.

https://github.com/strukturag/libde265/issues/394
https://github.com/strukturag/libde265/commit/d6bf73e765b7a23627bfd7a8645c143fd9097995

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-27102
https://www.cve.org/CVERecord?id=CVE-2023-27102
[1] https://security-tracker.debian.org/tracker/CVE-2023-27103
https://www.cve.org/CVERecord?id=CVE-2023-27103

Please adjust the affected versions in the BTS as needed.



Bug#1033258: upx-ucl: CVE-2023-23456

2023-03-20 Thread Moritz Mühlenhoff
Source: upx-ucl
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for upx-ucl.

CVE-2023-23456[0]:
| A heap-based buffer overflow issue was discovered in UPX in
| PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to
| cause a denial of service (abort) via a crafted file.

https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4
https://github.com/upx/upx/issues/632

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-23456
https://www.cve.org/CVERecord?id=CVE-2023-23456

Please adjust the affected versions in the BTS as needed.



Bug#1022555: tiff: CVE-2022-3627 CVE-2022-3626 CVE-2022-3599 CVE-2022-3598 CVE-2022-3597 CVE-2022-3570

2022-10-23 Thread Moritz Mühlenhoff
Source: tiff
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for tiff.

CVE-2022-3627[0]:
| LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in
| libtiff/tif_unix.c:346 when called from extractImageSection,
| tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service
| via a crafted tiff file. For users that compile libtiff from sources,
| the fix is available with commit 236b7191.

https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
https://gitlab.com/libtiff/libtiff/-/issues/411

CVE-2022-3626[1]:
| LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in
| libtiff/tif_unix.c:340 when called from processCropSelections,
| tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service
| via a crafted tiff file. For users that compile libtiff from sources,
| the fix is available with commit 236b7191.

https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
https://gitlab.com/libtiff/libtiff/-/issues/426

CVE-2022-3599[2]:
| LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in
| tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service
| via a crafted tiff file. For users that compile libtiff from sources,
| the fix is available with commit e8131125.

https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
https://gitlab.com/libtiff/libtiff/-/issues/398

CVE-2022-3598[3]:
| LibTIFF 4.4.0 has an out-of-bounds write in
| extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing
| attackers to cause a denial-of-service via a crafted tiff file. For
| users that compile libtiff from sources, the fix is available with
| commit cfbb883b.

https://gitlab.com/libtiff/libtiff/-/commit/cfbb883bf6ea7bedcb04177cc4e52d304522fdff
https://gitlab.com/libtiff/libtiff/-/issues/435

CVE-2022-3597[4]:
| LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in
| libtiff/tif_unix.c:346 when called from extractImageSection,
| tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service
| via a crafted tiff file. For users that compile libtiff from sources,
| the fix is available with commit 236b7191.

https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
https://gitlab.com/libtiff/libtiff/-/issues/413

CVE-2022-3570[5]:
| Multiple heap buffer overflows in tiffcrop.c utility in libtiff
| library Version 4.4.0 allows attacker to trigger unsafe or out of
| bounds memory access via crafted TIFF image file which could result
| into application crash, potential information disclosure or any other
| context-dependent impact

https://gitlab.com/libtiff/libtiff/-/commit/bd94a9b383d8755a27b5a1bc27660b8ad10b094c
https://gitlab.com/libtiff/libtiff/-/issues/381
https://gitlab.com/libtiff/libtiff/-/issues/386

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-3627
https://www.cve.org/CVERecord?id=CVE-2022-3627
[1] https://security-tracker.debian.org/tracker/CVE-2022-3626
https://www.cve.org/CVERecord?id=CVE-2022-3626
[2] https://security-tracker.debian.org/tracker/CVE-2022-3599
https://www.cve.org/CVERecord?id=CVE-2022-3599
[3] https://security-tracker.debian.org/tracker/CVE-2022-3598
https://www.cve.org/CVERecord?id=CVE-2022-3598
[4] https://security-tracker.debian.org/tracker/CVE-2022-3597
https://www.cve.org/CVERecord?id=CVE-2022-3597
[5] https://security-tracker.debian.org/tracker/CVE-2022-3570
https://www.cve.org/CVERecord?id=CVE-2022-3570

Please adjust the affected versions in the BTS as needed.



Bug#1022556: exim4: CVE-2022-3620

2022-10-23 Thread Moritz Mühlenhoff
Source: exim4
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for exim4.

CVE-2022-3620[0]:
| A vulnerability was found in Exim and classified as problematic. This
| issue affects the function dmarc_dns_lookup of the file dmarc.c of the
| component DMARC Handler. The manipulation leads to use after free. The
| attack may be initiated remotely. The name of the patch is
| 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a
| patch to fix this issue. The associated identifier of this
| vulnerability is VDB-211919.

Introduced by: 
https://git.exim.org/exim.git/commit/92583637b25b6bde926f9ca6be7b085e5ac8b1e6 
(exim-4.95-RC0)
(as such Bullseye/Buster are not affected)

Fixed by: 
https://git.exim.org/exim.git/commit/12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-3620
https://www.cve.org/CVERecord?id=CVE-2022-3620

Please adjust the affected versions in the BTS as needed.



Bug#1022557: shapelib: CVE-2022-0699

2022-10-23 Thread Moritz Mühlenhoff
Source: shapelib
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for shapelib.

CVE-2022-0699[0]:
| A double-free condition exists in contrib/shpsort.c of shapelib 1.5.0
| and older releases. This issue may allow an attacker to cause a denial
| of service or have other unspecified impact via control over malloc.

https://github.com/OSGeo/shapelib/issues/39
https://github.com/OSGeo/shapelib/commit/c75b9281a5b9452d92e1682bdfe6019a13ed819f

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-0699
https://www.cve.org/CVERecord?id=CVE-2022-0699

Please adjust the affected versions in the BTS as needed.



Bug#1022560: libx11: CVE-2022-3554

2022-10-23 Thread Moritz Mühlenhoff
Source: libx11
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for libx11.

CVE-2022-3554[0]:
| A vulnerability has been found in X.org libX11 and classified as
| problematic. This vulnerability affects the function
| _XimRegisterIMInstantiateCallback of the file
| modules/im/ximcp/imsClbk.c. The manipulation leads to memory leak. It
| is recommended to apply a patch to fix this issue. VDB-211054 is the
| identifier assigned to this vulnerability.

https://gitlab.freedesktop.org/xorg/lib/libx11/commit/1d11822601fd24a396b354fa616b04ed3df8b4ef

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-3554
https://www.cve.org/CVERecord?id=CVE-2022-3554

Please adjust the affected versions in the BTS as needed.



Bug#937049: mini-buildd: Python2 removal in sid/bullseye

2022-10-27 Thread Moritz Mühlenhoff
Am Fri, Aug 30, 2019 at 07:26:40AM + schrieb Matthias Klose:
> Package: src:mini-buildd
> Version: 1.0.41
> Severity: normal
> Tags: sid bullseye
> User: debian-pyt...@lists.debian.org
> Usertags: py2removal
> 
> Python2 becomes end-of-live upstream, and Debian aims to remove
> Python2 from the distribution, as discussed in
> https://lists.debian.org/debian-python/2019/07/msg00080.html

How close is the 2.x branch in experimental from being a replacement?
python2 will be dropped in bookworm and also removed from the archive.

Cheers,
Moritz



Bug#1023625: puppet-module-puppetlabs-apt: CVE-2022-3275

2022-11-07 Thread Moritz Mühlenhoff
Source: puppet-module-puppetlabs-apt
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for puppet-module-puppetlabs-apt.

CVE-2022-3275[0]:
| Command injection is possible in the puppetlabs-apt module prior to
| version 9.0.0. A malicious actor is able to exploit this vulnerability
| only if they are able to provide unsanitized input to the module. This
| condition is rare in most deployments of Puppet and Puppet Enterprise.

https://puppet.com/security/cve/CVE-2022-3275
https://github.com/puppetlabs/puppetlabs-apt/commit/c26ad2a54f318b4d6fbe55f837b00cd6afd9f1eb

This doesn't warrant a DSA (but could be fixed via spu)

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-3275
https://www.cve.org/CVERecord?id=CVE-2022-3275

Please adjust the affected versions in the BTS as needed.



Bug#1023693: libstb: CVE-2021-37789

2022-11-08 Thread Moritz Mühlenhoff
Source: libstb
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for libstb.

CVE-2021-37789[0]:
| stb_image.h 2.27 has a heap-based buffer over in stbi__jpeg_load,
| leading to Information Disclosure or Denial of Service.

https://github.com/nothings/stb/issues/1178

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-37789
https://www.cve.org/CVERecord?id=CVE-2021-37789

Please adjust the affected versions in the BTS as needed.



Bug#1021292: Enabling branch protection on amd64 and arm64

2023-06-27 Thread Moritz Mühlenhoff
Am Wed, Jun 21, 2023 at 05:41:36PM +0200 schrieb Emanuele Rocca:
> Hey Moritz,
> 
> On 2022-10-26 08:20, Moritz Mühlenhoff wrote:
> > I think this should rather be applied early after the Bookworm
> > release (and ideally we can also finish off the necessary testing
> > and add -fstack-clash-protection at least for amd64 and other archs
> > which are ready for it (#918914)).
> 
> Can we go ahead with the dpkg patch now, any specific tests you had in
> mind before applying it?

Note that I'm not the one driving this change (I'll start a separate
thread for -fstack-clash-protection in the next days), but the original
request was from Wookey.

Personally I think now at the beginning of the new development cycle
is the ideal time to start this.

Cheers,
Moritz



Bug#877512: slapd: enabled systemd integration (untested patch)

2023-06-28 Thread Moritz Mühlenhoff
Am Wed, Jun 28, 2023 at 09:49:06AM -0700 schrieb Ryan Tandy:
> On Wed, Jun 28, 2023 at 06:29:31PM +0200, Andreas Henriksson wrote:
> > I'm attaching a patch which has only been compile-tested as I don't
> > use slapd myself. It would be great if someone who uses slapd could
> > pick it up, test it and finish the remaining work.
> 
> Thanks for the patch and for doing the compile-testing. Unfortunately
> upstream's service file won't work for us as is. The remaining work includes
> (and this is the part I've been procrastinating) extracting from the init
> script the parts that determine the arguments to slapd (based on config from
> /etc/default/slapd, and I think in some cases possibly from the slapd config
> too), and turning that into a slapd launcher script that the service will
> have to invoke.

OTOH, moving to the systemd unit might also be a good opportunity to reduce
some complexity? Looking at slapd.default shipped with the current package
SLAPD_SENTINEL_FILE, SLAPD_PIDFILE and SLAPD_NO_START are all settings which
are no longer relevant with a systemd unit or can equally be achieved with
commands built-in to systemd (e.g. systemctl mask).

Then there's a handful of settings which IMHO probably very people actually 
modify
(SLAPD_USER, SLAPD_USER, SLAPD_CONF, SLAPD_SERVICES) and which folks wanting
to modify can always tweak with a local unit override/dropins.

The most commonly used option is probably SLAPD_OPTIONS, which could also
be read via an EnvironmentFile from /etc/default.

Cheers,
Moritz



Bug#877512: slapd: enabled systemd integration (untested patch)

2023-06-29 Thread Moritz Mühlenhoff
Am Wed, Jun 28, 2023 at 01:03:33PM -0700 schrieb Ryan Tandy:
> Hmm. So on upgrade I suppose we would want to automatically migrate those
> settings to a drop-in? That actually sounds doable; such a drop-in would
> probably not have to be a conffile.

Indeed, so my idea was that e.g. the systemd unit would default to User=openldap
and Group=openldap and then the postinst could check if /etc/default/slapd has
SLAPD_GROUP and/or SLAPD_USER set to something other than "openlap" and in that
case a drop-in would be generated with those settings. Similar for Kerberos etc.

> > The most commonly used option is probably SLAPD_OPTIONS, which could also
> > be read via an EnvironmentFile from /etc/default.
> 
> Right. Although if that's the only thing still being consumed, I'd be
> tempted to just let it go too. :)

Actually, that's a fair point, then there would be a clean cut so that it's
obvious that /etc/default/slapd is only relevant for folks not using systemd.
Again, SLAPD_OPTIONS could easily also be a drop-in after all.

> Thanks for the input, it really does help. :)

Glad to help!

Cheers,
Moritz



Bug#1040592: node-dottie: CVE-2023-26132

2023-07-07 Thread Moritz Mühlenhoff
Source: node-dottie
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for node-dottie.

CVE-2023-26132[0]:
| Versions of the package dottie before 2.0.4 are vulnerable to
| Prototype Pollution due to insufficient checks, via the set()
| function and the current variable in the /dottie.js file.

https://security.snyk.io/vuln/SNYK-JS-DOTTIE-3332763
https://github.com/mickhansen/dottie.js/commit/7d3aee1c9c3c842720506e131de7e181e5c8db68


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-26132
https://www.cve.org/CVERecord?id=CVE-2023-26132

Please adjust the affected versions in the BTS as needed.



Bug#1040594: libcoap3: CVE-2023-30362

2023-07-07 Thread Moritz Mühlenhoff
Source: libcoap3
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for libcoap3.

CVE-2023-30362[0]:
| Buffer Overflow vulnerability in coap_send function in libcoap
| library 4.3.1-103-g52cfd56 fixed in 4.3.1-120-ge242200 allows
| attackers to obtain sensitive information via malformed pdu.

https://github.com/obgm/libcoap/issues/1063
https://github.com/obgm/libcoap/commit/e242200f0af2a418dc9f69eee543feacc13cd851


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-30362
https://www.cve.org/CVERecord?id=CVE-2023-30362

Please adjust the affected versions in the BTS as needed.



Bug#1040593: kodi: CVE-2023-30207

2023-07-07 Thread Moritz Mühlenhoff
Source: kodi
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerability was published for kodi.

CVE-2023-30207[0]:
| A divide by zero issue discovered in Kodi Home Theater Software 19.5
| and earlier allows attackers to cause a denial of service via use of
| crafted mp3 file.

https://github.com/xbmc/xbmc/issues/22378
https://github.com/xbmc/xbmc/pull/22391
https://github.com/xbmc/xbmc/commit/dbc00c500f4c4830049cc040a61c439c580eea73

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-30207
https://www.cve.org/CVERecord?id=CVE-2023-30207

Please adjust the affected versions in the BTS as needed.



Bug#1040595: yt-dlp: CVE-2023-35934

2023-07-07 Thread Moritz Mühlenhoff
Source: yt-dlp
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for yt-dlp.

CVE-2023-35934[0]:
| yt-dlp is a command-line program to download videos from video
| sites. During file downloads, yt-dlp or the external downloaders
| that yt-dlp employs may leak cookies on HTTP redirects to a
| different host, or leak them when the host for download fragments
| differs from their parent manifest's host. This vulnerable behavior
| is present in yt-dlp prior to 2023.07.06 and nightly
| 2023.07.06.185519. All native and external downloaders are affected,
| except for `curl` and `httpie` (version 3.1.0 or later).  At the
| file download stage, all cookies are passed by yt-dlp to the file
| downloader as a `Cookie` header, thereby losing their scope. This
| also occurs in yt-dlp's info JSON output, which may be used by
| external tools. As a result, the downloader or external tool may
| indiscriminately send cookies with requests to domains or paths for
| which the cookies are not scoped.  yt-dlp version 2023.07.06 and
| nightly 2023.07.06.185519 fix this issue by removing the `Cookie`
| header upon HTTP redirects; having native downloaders calculate the
| `Cookie` header from the cookiejar, utilizing external downloaders'
| built-in support for cookies instead of passing them as header
| arguments, disabling HTTP redirectiong if the external downloader
| does not have proper cookie support, processing cookies passed as
| HTTP headers to limit their scope, and having a separate field for
| cookies in the info dict storing more information about scoping
| Some workarounds are available for those who are unable to upgrade.
| Avoid using cookies and user authentication methods. While
| extractors may set custom cookies, these usually do not contain
| sensitive information. Alternatively, avoid using `--load-info-
| json`. Or, if authentication is a must: verify the integrity of
| download links from unknown sources in browser (including redirects)
| before passing them to yt-dlp; use `curl` as external downloader,
| since it is not impacted; and/or avoid fragmented formats such as
| HLS/m3u8, DASH/mpd and ISM.

https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj
https://github.com/yt-dlp/yt-dlp/commit/1ceb657bdd254ad961489e5060f2ccc7d556b729
https://github.com/yt-dlp/yt-dlp/commit/3121512228487c9c690d3d39bfd2579addf96e07
https://github.com/yt-dlp/yt-dlp/commit/f8b4bcc0a791274223723488bfbfc23ea3276641

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-35934
https://www.cve.org/CVERecord?id=CVE-2023-35934

Please adjust the affected versions in the BTS as needed.



Bug#1040597: orthanc: CVE-2023-33466

2023-07-07 Thread Moritz Mühlenhoff
Source: orthanc
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for orthanc.

CVE-2023-33466[0]:
| Orthanc before 1.12.0 allows authenticated users with access to the
| Orthanc API to overwrite arbitrary files on the file system, and in
| specific deployment scenarios allows the attacker to overwrite the
| configuration, which can be exploited to trigger Remote Code
| Execution (RCE).

https://discourse.orthanc-server.org/t/security-advisory-for-orthanc-deployments-running-versions-before-1-12-0/3568

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-33466
https://www.cve.org/CVERecord?id=CVE-2023-33466

Please adjust the affected versions in the BTS as needed.



Bug#1030047: ruby-sanitize: CVE-2023-23627

2023-01-30 Thread Moritz Mühlenhoff
Source: ruby-sanitize
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for ruby-sanitize.

CVE-2023-23627[0]:
| Sanitize is an allowlist-based HTML and CSS sanitizer. Versions 5.0.0
| and later, prior to 6.0.1, are vulnerable to Cross-site Scripting.
| When Sanitize is configured with a custom allowlist that allows
| `noscript` elements, attackers are able to include arbitrary HTML,
| resulting in XSS (cross-site scripting) or other undesired behavior
| when that HTML is rendered in a browser. The default configurations do
| not allow `noscript` elements and are not vulnerable. This issue only
| affects users who are using a custom config that adds `noscript` to
| the element allowlist. This issue has been patched in version 6.0.1.
| Users who are unable to upgrade can prevent this issue by using one of
| Sanitize's default configs or by ensuring that their custom config
| does not include `noscript` in the element allowlist.

https://github.com/rgrove/sanitize/security/advisories/GHSA-fw3g-2h3j-qmm7

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-23627
https://www.cve.org/CVERecord?id=CVE-2023-23627

Please adjust the affected versions in the BTS as needed.



Bug#1030049: opusfile: CVE-2022-47021

2023-01-30 Thread Moritz Mühlenhoff
Source: opusfile
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for opusfile.

CVE-2022-47021[0]:
| A null pointer dereference issue was discovered in functions
| op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12
| allows attackers to cause denial of service or other unspecified
| impacts.

https://github.com/xiph/opusfile/commit/0a4cd796df5b030cb866f3f4a5e41a4b92caddf5
https://github.com/xiph/opusfile/issues/36

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-47021
https://www.cve.org/CVERecord?id=CVE-2022-47021

Please adjust the affected versions in the BTS as needed.



Bug#1030048: pgpool2: CVE-2023-22332

2023-01-30 Thread Moritz Mühlenhoff
Source: pgpool2
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for pgpool2.

CVE-2023-22332[0]:
| Information disclosure vulnerability exists in Pgpool-II 4.4.0 to
| 4.4.1 (4.4 series), 4.3.0 to 4.3.4 (4.3 series), 4.2.0 to 4.2.11 (4.2
| series), 4.1.0 to 4.1.14 (4.1 series), 4.0.0 to 4.0.21 (4.0 series),
| All versions of 3.7 series, All versions of 3.6 series, All versions
| of 3.5 series, All versions of 3.4 series, and All versions of 3.3
| series. A specific database user's authentication information may be
| obtained by another database user. As a result, the information stored
| in the database may be altered and/or database may be suspended by a
| remote attacker who successfully logged in the product with the
| obtained credentials.

Quoting from https://www.pgpool.net/mediawiki/index.php/Main_Page#News :

(I have no idea how common that is, feel free to downgrade as necessary)

--
This release contains a security fix.

If following conditions are all met, the password of "wd_lifecheck_user" is 
exposed by "SHOW POOL STATUS" command. The command can be executed by any user 
who can
connect to Pgpool-II. (CVE-2023-22332)

• Version 3.3 or later
• use_watchdog = on
• wd_lifecheck_method = 'query'
• A plain text password is set to wd_lifecheck_password
--

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-22332
https://www.cve.org/CVERecord?id=CVE-2023-22332

Please adjust the affected versions in the BTS as needed.



Bug#1030050: rails: CVE-2023-22796 CVE-2023-22795 CVE-2023-22794 CVE-2023-22792 CVE-2022-44566

2023-01-30 Thread Moritz Mühlenhoff
Source: rails
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for rails.

CVE-2023-22796[0]:
https://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vulnerability-in-active-supports-underscore/82116
https://github.com/rails/rails/commit/4b383e6936d7a72b5dc839f526c9a9aeb280acae 
(6-1-stable)

CVE-2023-22795[1]:
https://discuss.rubyonrails.org/t/cve-2023-22795-possible-redos-based-dos-vulnerability-in-action-dispatch/82118
https://github.com/rails/rails/commit/484fc9185db6c6a6a49ab458b11f9366da02bab2 
(6-1-stable)

CVE-2023-22794[2]:
https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117
https://github.com/rails/rails/commit/048e9fc05e18c91838a44e60175e475de8b2aad5 
(6-1-stable)

CVE-2023-22792[3]:
https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115
https://github.com/rails/rails/commit/7a7f37f146aa977350cf914eba20a95ce371485f 
(6-1-stable)

CVE-2022-44566[4]:
https://discuss.rubyonrails.org/t/cve-2022-44566-possible-denial-of-service-vulnerability-in-activerecords-postgresql-adapter/82119
https://github.com/rails/rails/commit/414eb337d142a9c61d7723ceb9b7c1ab30dff3ed 
(6-1-stable)


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-22796
https://www.cve.org/CVERecord?id=CVE-2023-22796
[1] https://security-tracker.debian.org/tracker/CVE-2023-22795
https://www.cve.org/CVERecord?id=CVE-2023-22795
[2] https://security-tracker.debian.org/tracker/CVE-2023-22794
https://www.cve.org/CVERecord?id=CVE-2023-22794
[3] https://security-tracker.debian.org/tracker/CVE-2023-22792
https://www.cve.org/CVERecord?id=CVE-2023-22792
[4] https://security-tracker.debian.org/tracker/CVE-2022-44566
https://www.cve.org/CVERecord?id=CVE-2022-44566

Please adjust the affected versions in the BTS as needed.



Bug#1021013: mplayer: CVE-2022-38600 CVE-2022-38856 CVE-2022-38861 CVE-2022-38862 CVE-2022-38864

2022-09-30 Thread Moritz Mühlenhoff
Source: mplayer
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for mplayer.

CVE-2022-38600[0]:
| Mplayer SVN-r38374-13.0.1 is vulnerable to Memory Leak via vf.c and
| vf_vo.c.

https://trac.mplayerhq.hu/ticket/2390#comment:2
https://git.ffmpeg.org/gitweb/mplayer.git/commit/59792bad144c11b21b27171a93a36e3fbd21eb5e
 (r38380)
Followup: 
https://git.ffmpeg.org/gitweb/mplayer.git/commit/48ca1226397974bb2bc53de878411f88a80fe1f8
 (r38392)

CVE-2022-38856[1]:
| Certain The MPlayer Project products are vulnerable to Buffer Overflow
| via function mov_build_index() of libmpdemux/demux_mov.c. This affects
| mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1.

https://trac.mplayerhq.hu/ticket/2395

CVE-2022-38861[2]:
| The MPlayer Project mplayer SVN-r38374-13.0.1 is vulnerable to memory
| corruption via function free_mp_image() of libmpcodecs/mp_image.c.

https://trac.mplayerhq.hu/ticket/2407
https://git.ffmpeg.org/gitweb/mplayer.git/commit/2622e7fbe3605a2f3b4f74900197fefeedc0d2e1
 (r38402)

CVE-2022-38862[3]:
| Certain The MPlayer Project products are vulnerable to Buffer Overflow
| via function play() of libaf/af.c:639. This affects mplayer
| SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1.

https://trac.mplayerhq.hu/ticket/2400
https://trac.mplayerhq.hu/ticket/2404

CVE-2022-38864[4]:
| Certain The MPlayer Project products are vulnerable to Buffer Overflow
| via the function mp_unescape03() of libmpdemux/mpeg_hdr.c. This
| affects mencoder SVN-r38374-13.0.1 and mplayer SVN-r38374-13.0.1.

https://trac.mplayerhq.hu/ticket/2406
https://git.ffmpeg.org/gitweb/mplayer.git/commit/36546389ef9fb6b0e0540c5c3f212534c34b0e94
 (r38391)

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-38600
https://www.cve.org/CVERecord?id=CVE-2022-38600
[1] https://security-tracker.debian.org/tracker/CVE-2022-38856
https://www.cve.org/CVERecord?id=CVE-2022-38856
[2] https://security-tracker.debian.org/tracker/CVE-2022-38861
https://www.cve.org/CVERecord?id=CVE-2022-38861
[3] https://security-tracker.debian.org/tracker/CVE-2022-38862
https://www.cve.org/CVERecord?id=CVE-2022-38862
[4] https://security-tracker.debian.org/tracker/CVE-2022-38864
https://www.cve.org/CVERecord?id=CVE-2022-38864

Please adjust the affected versions in the BTS as needed.



Bug#1021014: snakeyaml: CVE-2022-38752

2022-09-30 Thread Moritz Mühlenhoff
Source: snakeyaml
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for snakeyaml.

CVE-2022-38752[0]:
| Using snakeYAML to parse untrusted YAML files may be vulnerable to
| Denial of Service attacks (DOS). If the parser is running on user
| supplied input, an attacker may supply content that causes the parser
| to crash by stack-overflow.

Fixed in 1.32:
https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081 (not public)

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-38752
https://www.cve.org/CVERecord?id=CVE-2022-38752

Please adjust the affected versions in the BTS as needed.



Bug#1021015: tinyproxy: CVE-2022-40468

2022-09-30 Thread Moritz Mühlenhoff
Source: tinyproxy
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for tinyproxy.

CVE-2022-40468[0]:
| Tinyproxy commit 84f203f and earlier does not process HTTP request
| lines in the process_request() function and is using uninitialized
| buffers. This vulnerability allows attackers to access sensitive
| information at system runtime.

https://github.com/tinyproxy/tinyproxy/issues/457
https://github.com/tinyproxy/tinyproxy/commit/3764b8551463b900b5b4e3ec0cd9bb9182191cb7

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-40468
https://www.cve.org/CVERecord?id=CVE-2022-40468

Please adjust the affected versions in the BTS as needed.



Bug#1021016: frr: CVE-2022-37032

2022-09-30 Thread Moritz Mühlenhoff
Source: frr
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for frr.

CVE-2022-37032[0]:
| An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4
| may lead to a segmentation fault and denial of service. This occurs in
| bgp_capability_msg_parse in bgpd/bgp_packet.c.

Fixed by: 
https://github.com/FRRouting/frr/commit/ff6db1027f8f36df657ff2e5ea167773752537ed

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-37032
https://www.cve.org/CVERecord?id=CVE-2022-37032

Please adjust the affected versions in the BTS as needed.



Bug#1021017: amanda: CVE-2022-37703

2022-09-30 Thread Moritz Mühlenhoff
Source: amanda
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for amanda.

CVE-2022-37703[0]:
| In Amanda 3.5.1, an information leak vulnerability was found in the
| calcsize SUID binary. An attacker can abuse this vulnerability to know
| if a directory exists or not anywhere in the fs. The binary will use
| `opendir()` as root directly without checking the path, letting the
| attacker provide an arbitrary path.

https://github.com/MaherAzzouzi/CVE-2022-37703

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-37703
https://www.cve.org/CVERecord?id=CVE-2022-37703

Please adjust the affected versions in the BTS as needed.



Bug#1021018: assimp: CVE-2022-38528

2022-09-30 Thread Moritz Mühlenhoff
Source: assimp
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for assimp.

CVE-2022-38528[0]:
| Open Asset Import Library (assimp) commit 3c253ca was discovered to
| contain a segmentation violation via the component
| Assimp::XFileImporter::CreateMeshes.

https://github.com/assimp/assimp/issues/4662


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-38528
https://www.cve.org/CVERecord?id=CVE-2022-38528

Please adjust the affected versions in the BTS as needed.



Bug#1021019: qemu: CVE-2022-3165

2022-09-30 Thread Moritz Mühlenhoff
Source: qemu
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for qemu.

CVE-2022-3165[0]:
VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion

https://bugzilla.redhat.com/show_bug.cgi?id=2129739
Introduced by: 
https://gitlab.com/qemu-project/qemu/-/commit/0bf41cab93e5c72dcda717abd625698b59d9ba3e
 (v6.1.0-rc0)
Proposed fix: 
https://lists.nongnu.org/archive/html/qemu-devel/2022-09/msg03948.html

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-3165
https://www.cve.org/CVERecord?id=CVE-2022-3165

Please adjust the affected versions in the BTS as needed.



Bug#1021021: wolfssl: CVE-2022-38152 CVE-2022-38153 CVE-2022-39173

2022-09-30 Thread Moritz Mühlenhoff
Source: wolfssl
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for wolfssl.

CVE-2022-38152[0]:
| An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client
| connects to a wolfSSL server and SSL_clear is called on its session,
| the server crashes with a segmentation fault. This occurs in the
| second session, which is created through TLS session resumption and
| reuses the initial struct WOLFSSL. If the server reuses the previous
| session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL*
| ssl) on it, the next received Client Hello (that resumes the previous
| session) crashes the server. Note that this bug is only triggered when
| resuming sessions using TLS session resumption. Only servers that use
| wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence
| are affected. Furthermore, wolfSSL_clear is part of wolfSSL's
| compatibility layer and is not enabled by default. It is not part of
| wolfSSL's native API.

https://github.com/wolfSSL/wolfssl/pull/5468

CVE-2022-38153[1]:
| An issue was discovered in wolfSSL before 5.5.0 (when --enable-
| session-ticket is used); however, only version 5.3.0 is exploitable.
| Man-in-the-middle attackers or a malicious server can crash TLS 1.2
| clients during a handshake. If an attacker injects a large ticket
| (more than 256 bytes) into a NewSessionTicket message in a TLS 1.2
| handshake, and the client has a non-empty session cache, the session
| cache frees a pointer that points to unallocated memory, causing the
| client to crash with a "free(): invalid pointer" message. NOTE: It is
| likely that this is also exploitable during TLS 1.3 handshakes between
| a client and a malicious server. With TLS 1.3, it is not possible to
| exploit this as a man-in-the-middle.

https://github.com/wolfSSL/wolfssl/pull/5476

CVE-2022-39173[2]:
| In wolfSSL before 5.5.1, malicious clients can cause a buffer overflow
| during a TLS 1.3 handshake. This occurs when an attacker supposedly
| resumes a previous TLS session. During the resumption Client Hello a
| Hello Retry Request must be triggered. Both Client Hellos are required
| to contain a list of duplicate cipher suites to trigger the buffer
| overflow. In total, two Client Hellos have to be sent: one in the
| resumed session, and a second one as a response to a Hello Retry
| Request message.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-38152
https://www.cve.org/CVERecord?id=CVE-2022-38152
[1] https://security-tracker.debian.org/tracker/CVE-2022-38153
https://www.cve.org/CVERecord?id=CVE-2022-38153
[2] https://security-tracker.debian.org/tracker/CVE-2022-39173
https://www.cve.org/CVERecord?id=CVE-2022-39173

Please adjust the affected versions in the BTS as needed.



Bug#1021022: samba: CVE-2022-32743

2022-09-30 Thread Moritz Mühlenhoff
Source: samba
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerability was published for samba.

CVE-2022-32743[0]:
| Samba does not validate the Validated-DNS-Host-Name right for the
| dNSHostName attribute which could permit unprivileged users to write
| it.

https://bugzilla.samba.org/show_bug.cgi?id=14833

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-32743
https://www.cve.org/CVERecord?id=CVE-2022-32743

Please adjust the affected versions in the BTS as needed.



Bug#1021024: samba: CVE-2022-1615

2022-09-30 Thread Moritz Mühlenhoff
Source: samba
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for samba.

CVE-2022-1615[0]:
| In Samba, GnuTLS gnutls_rnd() can fail and give predictable random
| values.

https://bugzilla.samba.org/show_bug.cgi?id=15103
https://gitlab.com/samba-team/samba/-/merge_requests/2644
https://gitlab.com/samba-team/samba/-/commit/9849e7440e30853c61a80ce1f11b7b244ed766fe
 (samba-4.17.0rc1)

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-1615
https://www.cve.org/CVERecord?id=CVE-2022-1615

Please adjust the affected versions in the BTS as needed.



Bug#1021133: sox: CVE-2021-23159

2022-10-02 Thread Moritz Mühlenhoff
Source: sox
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for sox.

CVE-2021-23159[0]:
| A vulnerability was found in SoX, where a heap-buffer-overflow occurs
| in function lsx_read_w_buf() in formats_i.c file. The vulnerability is
| exploitable with a crafted file, that could cause an application to
| crash.

https://sourceforge.net/p/sox/bugs/352/
https://bugzilla.redhat.com/show_bug.cgi?id=1975671

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-23159
https://www.cve.org/CVERecord?id=CVE-2021-23159

Please adjust the affected versions in the BTS as needed.



Bug#1021134: sox: CVE-2021-23172

2022-10-02 Thread Moritz Mühlenhoff
Source: sox
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for sox.

CVE-2021-23172[0]:
| A vulnerability was found in SoX, where a heap-buffer-overflow occurs
| in function startread() in hcom.c file. The vulnerability is
| exploitable with a crafted hcomn file, that could cause an application
| to crash.

https://sourceforge.net/p/sox/bugs/350/
https://bugzilla.redhat.com/show_bug.cgi?id=1975666

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-23172
https://www.cve.org/CVERecord?id=CVE-2021-23172

Please adjust the affected versions in the BTS as needed.



Bug#1021135: sox: CVE-2021-33844

2022-10-02 Thread Moritz Mühlenhoff
Source: sox
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerability was published for sox.

CVE-2021-33844[0]:
| A floating point exception (divide-by-zero) issue was discovered in
| SoX in functon startread() of wav.c file. An attacker with a crafted
| wav file, could cause an application to crash.

https://sourceforge.net/p/sox/bugs/349/
https://bugzilla.redhat.com/show_bug.cgi?id=1975664

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-33844
https://www.cve.org/CVERecord?id=CVE-2021-33844

Please adjust the affected versions in the BTS as needed.



Bug#1021136: sox: CVE-2022-39236 CVE-2022-39249 CVE-2022-39251

2022-10-02 Thread Moritz Mühlenhoff
Source: sox
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for sox.

CVE-2022-39236[0]:
| Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript.
| Starting with version 17.1.0-rc.1, improperly formed beacon events can
| disrupt or impede the matrix-js-sdk from functioning properly,
| potentially impacting the consumer's ability to process data safely.
| Note that the matrix-js-sdk can appear to be operating normally but be
| excluding or corrupting runtime data presented to the consumer. This
| is patched in matrix-js-sdk v19.7.0. Redacting applicable events,
| waiting for the sync processor to store data, and restarting the
| client are possible workarounds. Alternatively, redacting the
| applicable events and clearing all storage will fix the further
| perceived issues. Downgrading to an unaffected version, noting that
| such a version may be subject to other vulnerabilities, will
| additionally resolve the issue.

https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-hvv8-5v86-r45x
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
https://github.com/matrix-org/matrix-spec-proposals/pull/3488

CVE-2022-39249[1]:
| Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript.
| Prior to version 19.7.0, an attacker cooperating with a malicious
| homeserver can construct messages appearing to have come from another
| person. Such messages will be marked with a grey shield on some
| platforms, but this may be missing in others. This attack is possible
| due to the matrix-js-sdk implementing a too permissive key forwarding
| strategy on the receiving end. Starting with version 19.7.0, the
| default policy for accepting key forwards has been made more strict in
| the matrix-js-sdk. matrix-js-sdk will now only accept forwarded keys
| in response to previously issued requests and only from own, verified
| devices. The SDK now sets a `trusted` flag on the decrypted message
| upon decryption, based on whether the key used to decrypt the message
| was received from a trusted source. Clients need to ensure that
| messages decrypted with a key with `trusted = false` are decorated
| appropriately, for example, by showing a warning for such messages.
| This attack requires coordination between a malicious homeserver and
| an attacker, and those who trust your homeservers do not need a
| workaround.

https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
https://github.com/matrix-org/matrix-spec-proposals/pull/3061
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients

CVE-2022-39251[2]:
| Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript.
| Prior to version 19.7.0, an attacker cooperating with a malicious
| homeserver can construct messages that legitimately appear to have
| come from another person, without any indication such as a grey
| shield. Additionally, a sophisticated attacker cooperating with a
| malicious homeserver could employ this vulnerability to perform a
| targeted attack in order to send fake to-device messages appearing to
| originate from another user. This can allow, for example, to inject
| the key backup secret during a self-verification, to make a targeted
| device start using a malicious key backup spoofed by the homeserver.
| These attacks are possible due to a protocol confusion vulnerability
| that accepts to-device messages encrypted with Megolm instead of Olm.
| Starting with version 19.7.0, matrix-js-sdk has been modified to only
| accept Olm-encrypted to-device messages. Out of caution, several other
| checks have been audited or added. This attack requires coordination
| between a malicious home server and an attacker, so those who trust
| their home servers do not need a workaround.

https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-39236
https://www.cve.org/CVERecord?id=CVE-2022-39236
[1] https://security-tracker.debian.org/tracker/CVE-2022-39249
https://www.cve.org/CVERecord?id=CVE-2022-39249
[2] https://security-tracker.debian.org/tracker/CVE-2022-39251
https://www.cve.org/CVERecord?id=CVE-2022-39251

Please adjust the affected versions in the BTS as needed.



Bug#1021137: modsecurity-crs: CVE-2022-39955 CVE-2022-39956 CVE-2022-39957 CVE-2022-39958

2022-10-02 Thread Moritz Mühlenhoff
Source: modsecurity-crs
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for modsecurity-crs.

CVE-2022-39955[0]:
| The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial
| rule set bypass by submitting a specially crafted HTTP Content-Type
| header field that indicates multiple character encoding schemes. A
| vulnerable back-end can potentially be exploited by declaring multiple
| Content-Type "charset" names and therefore bypassing the configurable
| CRS Content-Type header "charset" allow list. An encoded payload can
| bypass CRS detection this way and may then be decoded by the backend.
| The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the
| currently supported versions 3.2.1 and 3.3.2. Integrators and users
| are advised to upgrade to 3.2.2 and 3.3.3 respectively.

https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/

CVE-2022-39956[1]:
| The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial
| rule set bypass for HTTP multipart requests by submitting a payload
| that uses a character encoding scheme via the Content-Type or the
| deprecated Content-Transfer-Encoding multipart MIME header fields that
| will not be decoded and inspected by the web application firewall
| engine and the rule set. The multipart payload will therefore bypass
| detection. A vulnerable backend that supports these encoding schemes
| can potentially be exploited. The legacy CRS versions 3.0.x and 3.1.x
| are affected, as well as the currently supported versions 3.2.1 and
| 3.3.2. Integrators and users are advised upgrade to 3.2.2 and 3.3.3
| respectively. The mitigation against these vulnerabilities depends on
| the installation of the latest ModSecurity version (v2.9.6 / v3.0.8).

https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/

CVE-2022-39957[2]:
| The OWASP ModSecurity Core Rule Set (CRS) is affected by a response
| body bypass. A client can issue an HTTP Accept header field containing
| an optional "charset" parameter in order to receive the response in an
| encoded form. Depending on the "charset", this response can not be
| decoded by the web application firewall. A restricted resource, access
| to which would ordinarily be detected, may therefore bypass detection.
| The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the
| currently supported versions 3.2.1 and 3.3.2. Integrators and users
| are advised to upgrade to 3.2.2 and 3.3.3 respectively.

https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/

CVE-2022-39958[3]:
| The OWASP ModSecurity Core Rule Set (CRS) is affected by a response
| body bypass to sequentially exfiltrate small and undetectable sections
| of data by repeatedly submitting an HTTP Range header field with a
| small byte range. A restricted resource, access to which would
| ordinarily be detected, may be exfiltrated from the backend, despite
| being protected by a web application firewall that uses CRS. Short
| subsections of a restricted resource may bypass pattern matching
| techniques and allow undetected access. The legacy CRS versions 3.0.x
| and 3.1.x are affected, as well as the currently supported versions
| 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2
| and 3.3.3 respectively and to configure a CRS paranoia level of 3 or
| higher.

https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-39955
https://www.cve.org/CVERecord?id=CVE-2022-39955
[1] https://security-tracker.debian.org/tracker/CVE-2022-39956
https://www.cve.org/CVERecord?id=CVE-2022-39956
[2] https://security-tracker.debian.org/tracker/CVE-2022-39957
https://www.cve.org/CVERecord?id=CVE-2022-39957
[3] https://security-tracker.debian.org/tracker/CVE-2022-39958
https://www.cve.org/CVERecord?id=CVE-2022-39958

Please adjust the affected versions in the BTS as needed.



Bug#1021138: php8.1: CVE-2022-31628 CVE-2022-31629

2022-10-02 Thread Moritz Mühlenhoff
Source: php8.1
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for php8.1.

CVE-2022-31628[0]:
| In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar
| uncompressor code would recursively uncompress "quines" gzip files,
| resulting in an infinite loop.

PHP Bug: https://bugs.php.net/bug.php?id=81726
https://github.com/php/php-src/commit/404e8bdb68350931176a5bdc86fc417b34fb583d
https://github.com/php/php-src/commit/432bf196d59bcb661fcf9cb7029cea9b43f490af

CVE-2022-31629[1]:
| In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability
| enables network and same-site attackers to set a standard insecure
| cookie in the victim's browser which is treated as a `__Host-` or
| `__Secure-` cookie by PHP applications.

PHP Bug: https://bugs.php.net/bug.php?id=81727
https://github.com/php/php-src/commit/0611be4e82887cee0de6c4cbae320d34eec946ca

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-31628
https://www.cve.org/CVERecord?id=CVE-2022-31628
[1] https://security-tracker.debian.org/tracker/CVE-2022-31629
https://www.cve.org/CVERecord?id=CVE-2022-31629

Please adjust the affected versions in the BTS as needed.



Bug#1021139: barbican: CVE-2022-3100

2022-10-02 Thread Moritz Mühlenhoff
Source: barbican
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for barbican.

CVE-2022-3100[0]:
access policy bypass via query string injection

Only reference so far is Red Hat Bugzilla:
https://bugzilla.redhat.com/show_bug.cgi?id=2125404

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-3100
https://www.cve.org/CVERecord?id=CVE-2022-3100

Please adjust the affected versions in the BTS as needed.



Bug#1021141: imagemagick: CVE-2022-3213

2022-10-02 Thread Moritz Mühlenhoff
Source: imagemagick
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for imagemagick.

CVE-2022-3213[0]:
| A heap buffer overflow issue was found in ImageMagick. When an
| application processes a malformed TIFF file, it could lead to
| undefined behavior or a crash causing a denial of service.

https://bugzilla.redhat.com/show_bug.cgi?id=2126824
https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2
https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-3213
https://www.cve.org/CVERecord?id=CVE-2022-3213

Please adjust the affected versions in the BTS as needed.



Bug#1021142: cargo: CVE-2022-36113 CVE-2022-36114

2022-10-02 Thread Moritz Mühlenhoff
Source: cargo
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for cargo.

CVE-2022-36113[0]:
| Cargo is a package manager for the rust programming language. After a
| package is downloaded, Cargo extracts its source code in the ~/.cargo
| folder on disk, making it available to the Rust projects it builds. To
| record when an extraction is successful, Cargo writes "ok" to the
| .cargo-ok file at the root of the extracted source code once it
| extracted all the files. It was discovered that Cargo allowed packages
| to contain a .cargo-ok symbolic link, which Cargo would extract. Then,
| when Cargo attempted to write "ok" into .cargo-ok, it would actually
| replace the first two bytes of the file the symlink pointed to with
| ok. This would allow an attacker to corrupt one file on the machine
| using Cargo to extract the package. Note that by design Cargo allows
| code execution at build time, due to build scripts and procedural
| macros. The vulnerabilities in this advisory allow performing a subset
| of the possible damage in a harder to track down way. Your
| dependencies must still be trusted if you want to be protected from
| attacks, as it's possible to perform the same attacks with build
| scripts and procedural macros. The vulnerability is present in all
| versions of Cargo. Rust 1.64, to be released on September 22nd, will
| include a fix for it. Since the vulnerability is just a more limited
| way to accomplish what a malicious build scripts or procedural macros
| can do, we decided not to publish Rust point releases backporting the
| security fix. Patch files are available for Rust 1.63.0 are available
| in the wg-security-response repository for people building their own
| toolchain. Mitigations We recommend users of alternate registries to
| exercise care in which package they download, by only including
| trusted dependencies in their projects. Please note that even with
| these vulnerabilities fixed, by design Cargo allows arbitrary code
| execution at build time thanks to build scripts and procedural macros:
| a malicious dependency will be able to cause damage regardless of
| these vulnerabilities. crates.io implemented server-side checks to
| reject these kinds of packages years ago, and there are no packages on
| crates.io exploiting these vulnerabilities. crates.io users still need
| to exercise care in choosing their dependencies though, as remote code
| execution is allowed by design there as well.

https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j
https://github.com/rust-lang/cargo/commit/97b80919e404b0768ea31ae329c3b4da54bed05a

CVE-2022-36114[1]:
| Cargo is a package manager for the rust programming language. It was
| discovered that Cargo did not limit the amount of data extracted from
| compressed archives. An attacker could upload to an alternate registry
| a specially crafted package that extracts way more data than its size
| (also known as a "zip bomb"), exhausting the disk space on the machine
| using Cargo to download the package. Note that by design Cargo allows
| code execution at build time, due to build scripts and procedural
| macros. The vulnerabilities in this advisory allow performing a subset
| of the possible damage in a harder to track down way. Your
| dependencies must still be trusted if you want to be protected from
| attacks, as it's possible to perform the same attacks with build
| scripts and procedural macros. The vulnerability is present in all
| versions of Cargo. Rust 1.64, to be released on September 22nd, will
| include a fix for it. Since the vulnerability is just a more limited
| way to accomplish what a malicious build scripts or procedural macros
| can do, we decided not to publish Rust point releases backporting the
| security fix. Patch files are available for Rust 1.63.0 are available
| in the wg-security-response repository for people building their own
| toolchain. We recommend users of alternate registries to excercise
| care in which package they download, by only including trusted
| dependencies in their projects. Please note that even with these
| vulnerabilities fixed, by design Cargo allows arbitrary code execution
| at build time thanks to build scripts and procedural macros: a
| malicious dependency will be able to cause damage regardless of these
| vulnerabilities. crates.io implemented server-side checks to reject
| these kinds of packages years ago, and there are no packages on
| crates.io exploiting these vulnerabilities. crates.io users still need
| to excercise care in choosing their dependencies though, as the same
| concerns about build scripts and procedural macros apply here.

https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp
https://github.com/rust-lang/cargo/commit/d1f9553c825f6d7481453be8d58d0e7f117988a7

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities 

Bug#1021143: rust-cargo: CVE-2022-36113 CVE-2022-36114

2022-10-02 Thread Moritz Mühlenhoff
Source: rust-cargo
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for rust-cargo.

CVE-2022-36113[0]:
| Cargo is a package manager for the rust programming language. After a
| package is downloaded, Cargo extracts its source code in the ~/.cargo
| folder on disk, making it available to the Rust projects it builds. To
| record when an extraction is successful, Cargo writes "ok" to the
| .cargo-ok file at the root of the extracted source code once it
| extracted all the files. It was discovered that Cargo allowed packages
| to contain a .cargo-ok symbolic link, which Cargo would extract. Then,
| when Cargo attempted to write "ok" into .cargo-ok, it would actually
| replace the first two bytes of the file the symlink pointed to with
| ok. This would allow an attacker to corrupt one file on the machine
| using Cargo to extract the package. Note that by design Cargo allows
| code execution at build time, due to build scripts and procedural
| macros. The vulnerabilities in this advisory allow performing a subset
| of the possible damage in a harder to track down way. Your
| dependencies must still be trusted if you want to be protected from
| attacks, as it's possible to perform the same attacks with build
| scripts and procedural macros. The vulnerability is present in all
| versions of Cargo. Rust 1.64, to be released on September 22nd, will
| include a fix for it. Since the vulnerability is just a more limited
| way to accomplish what a malicious build scripts or procedural macros
| can do, we decided not to publish Rust point releases backporting the
| security fix. Patch files are available for Rust 1.63.0 are available
| in the wg-security-response repository for people building their own
| toolchain. Mitigations We recommend users of alternate registries to
| exercise care in which package they download, by only including
| trusted dependencies in their projects. Please note that even with
| these vulnerabilities fixed, by design Cargo allows arbitrary code
| execution at build time thanks to build scripts and procedural macros:
| a malicious dependency will be able to cause damage regardless of
| these vulnerabilities. crates.io implemented server-side checks to
| reject these kinds of packages years ago, and there are no packages on
| crates.io exploiting these vulnerabilities. crates.io users still need
| to exercise care in choosing their dependencies though, as remote code
| execution is allowed by design there as well.

https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j
https://github.com/rust-lang/cargo/commit/97b80919e404b0768ea31ae329c3b4da54bed05a

CVE-2022-36114[1]:
| Cargo is a package manager for the rust programming language. It was
| discovered that Cargo did not limit the amount of data extracted from
| compressed archives. An attacker could upload to an alternate registry
| a specially crafted package that extracts way more data than its size
| (also known as a "zip bomb"), exhausting the disk space on the machine
| using Cargo to download the package. Note that by design Cargo allows
| code execution at build time, due to build scripts and procedural
| macros. The vulnerabilities in this advisory allow performing a subset
| of the possible damage in a harder to track down way. Your
| dependencies must still be trusted if you want to be protected from
| attacks, as it's possible to perform the same attacks with build
| scripts and procedural macros. The vulnerability is present in all
| versions of Cargo. Rust 1.64, to be released on September 22nd, will
| include a fix for it. Since the vulnerability is just a more limited
| way to accomplish what a malicious build scripts or procedural macros
| can do, we decided not to publish Rust point releases backporting the
| security fix. Patch files are available for Rust 1.63.0 are available
| in the wg-security-response repository for people building their own
| toolchain. We recommend users of alternate registries to excercise
| care in which package they download, by only including trusted
| dependencies in their projects. Please note that even with these
| vulnerabilities fixed, by design Cargo allows arbitrary code execution
| at build time thanks to build scripts and procedural macros: a
| malicious dependency will be able to cause damage regardless of these
| vulnerabilities. crates.io implemented server-side checks to reject
| these kinds of packages years ago, and there are no packages on
| crates.io exploiting these vulnerabilities. crates.io users still need
| to excercise care in choosing their dependencies though, as the same
| concerns about build scripts and procedural macros apply here.

https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp
https://github.com/rust-lang/cargo/commit/d1f9553c825f6d7481453be8d58d0e7f117988a7

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulner

Bug#1021270: libmodbus: CVE-2022-0367

2022-10-04 Thread Moritz Mühlenhoff
Source: libmodbus
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for libmodbus.

CVE-2022-0367[0]:
| A heap-based buffer overflow flaw was found in libmodbus in function
| modbus_reply() in src/modbus.c.

https://bugzilla.redhat.com/show_bug.cgi?id=2045571
https://github.com/stephane/libmodbus/issues/614
Fixed by: 
https://github.com/stephane/libmodbus/commit/b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6
 (v3.1.7)

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-0367
https://www.cve.org/CVERecord?id=CVE-2022-0367

Please adjust the affected versions in the BTS as needed.



Bug#1021272: keystone: CVE-2022-2447

2022-10-04 Thread Moritz Mühlenhoff
Source: keystone
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for keystone.

CVE-2022-2447[0]:
| A flaw was found in Keystone. There is a time lag (up to one hour in a
| default configuration) between when security policy says a token
| should be revoked from when it is actually revoked. This could allow a
| remote administrator to secretly maintain access for longer than
| expected.

The only reference so far seems from Red Hat Bugzilla:
https://bugzilla.redhat.com/show_bug.cgi?id=2105419

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-2447
https://www.cve.org/CVERecord?id=CVE-2022-2447

Please adjust the affected versions in the BTS as needed.



Bug#1021273: nomad: CVE-2021-37218 CVE-2021-43415 CVE-2022-24683 CVE-2022-24684 CVE-2022-24685 CVE-2022-24686

2022-10-04 Thread Moritz Mühlenhoff
Source: nomad
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for nomad.

CVE-2021-37218[0]:
| HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server
| agents with a valid certificate signed by the same CA to access
| server-only functionality, enabling privilege escalation. Fixed in
| 1.0.10 and 1.1.4.

https://discuss.hashicorp.com/t/hcsec-2021-21-nomad-raft-rpc-privilege-escalation/29023
https://github.com/hashicorp/nomad/pull/11089 (main)
https://github.com/hashicorp/nomad/commit/768d7c72a77e9c0415d92900753fc83e8822145a
 (release-1.1.4)
https://github.com/hashicorp/nomad/commit/61a922afcf12784281757402c8e0b61686ff855d
 (release-1.0.11)

CVE-2021-43415[1]:
| HashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0,
| with the QEMU task driver enabled, allowed authenticated users with
| job submission capabilities to bypass the configured allowed image
| paths. Fixed in 1.0.14, 1.1.8, and 1.2.1.

https://discuss.hashicorp.com/t/hcsec-2021-31-nomad-qemu-task-driver-allowed-paths-bypass-with-job-args/32288
https://github.com/hashicorp/nomad/issues/11542
https://github.com/hashicorp/nomad/pull/11554
https://github.com/hashicorp/nomad/commit/40de248b940eb7babbd4a08ebe9d6874758f5285
 (v1.2.1)

CVE-2022-24683[2]:
| HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and
| 1.2.5 allow operators with read-fs and alloc-exec (or job-submit)
| capabilities to read arbitrary files on the host filesystem as root.

https://discuss.hashicorp.com/t/hcsec-2022-02-nomad-alloc-filesystem-and-container-escape/35560

CVE-2022-24684[3]:
| HashiCorp Nomad and Nomad Enterprise 0.9.0 through 1.0.16, 1.1.11, and
| 1.2.5 allow operators with job-submit capabilities to use the spread
| stanza to panic server agents. Fixed in 1.0.18, 1.1.12, and 1.2.6.

https://discuss.hashicorp.com/t/hcsec-2022-04-nomad-spread-job-stanza-may-trigger-panic-in-servers/35562
https://github.com/hashicorp/nomad/issues/12039
https://github.com/hashicorp/nomad/commit/c49359ad58f0af18a5697a0b7b9b6cca9656d267
 (v1.2.6)

CVE-2022-24685[4]:
| HashiCorp Nomad and Nomad Enterprise 1.0.17, 1.1.11, and 1.2.5 allow
| invalid HCL for the jobs parse endpoint, which may cause excessive CPU
| usage. Fixed in 1.0.18, 1.1.12, and 1.2.6.

https://discuss.hashicorp.com/t/hcsec-2022-03-nomad-malformed-job-parsing-results-in-excessive-cpu-usage/35561
https://github.com/hashicorp/nomad/issues/12038

CVE-2022-24686[5]:
| HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.11, and
| 1.2.5 artifact download functionality has a race condition such that
| the Nomad client agent could download the wrong artifact into the
| wrong destination. Fixed in 1.0.18, 1.1.12, and 1.2.6

https://discuss.hashicorp.com/t/hcsec-2022-01-nomad-artifact-download-race-condition/35559

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-37218
https://www.cve.org/CVERecord?id=CVE-2021-37218
[1] https://security-tracker.debian.org/tracker/CVE-2021-43415
https://www.cve.org/CVERecord?id=CVE-2021-43415
[2] https://security-tracker.debian.org/tracker/CVE-2022-24683
https://www.cve.org/CVERecord?id=CVE-2022-24683
[3] https://security-tracker.debian.org/tracker/CVE-2022-24684
https://www.cve.org/CVERecord?id=CVE-2022-24684
[4] https://security-tracker.debian.org/tracker/CVE-2022-24685
https://www.cve.org/CVERecord?id=CVE-2022-24685
[5] https://security-tracker.debian.org/tracker/CVE-2022-24686
https://www.cve.org/CVERecord?id=CVE-2022-24686

Please adjust the affected versions in the BTS as needed.



Bug#1021274: python-opcua: CVE-2022-25304

2022-10-04 Thread Moritz Mühlenhoff
Source: python-opcua
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for python-opcua.

CVE-2022-25304[0]:
| All versions of package opcua; all versions of package asyncua are
| vulnerable to Denial of Service (DoS) due to a missing limitation on
| the number of received chunks - per single session or in total for all
| concurrent sessions. An attacker can exploit this vulnerability by
| sending an unlimited number of huge chunks (e.g. 2GB each) without
| sending the Final closing chunk.

https://github.com/FreeOpcUa/python-opcua/issues/1466
https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-25304
https://www.cve.org/CVERecord?id=CVE-2022-25304

Please adjust the affected versions in the BTS as needed.



Bug#1021276: snort: CVE-2020-3315 CVE-2021-1223 CVE-2021-1224 CVE-2021-1494 CVE-2021-1495 CVE-2021-34749 CVE-2021-40114

2022-10-04 Thread Moritz Mühlenhoff
Source: snort
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for snort.

These all lack details, but all boil down to the fact Snort needs
to be updated:

CVE-2020-3315[0]:
| Multiple Cisco products are affected by a vulnerability in the Snort
| detection engine that could allow an unauthenticated, remote attacker
| to bypass the configured file policies on an affected system. The
| vulnerability is due to errors in how the Snort detection engine
| handles specific HTTP responses. An attacker could exploit this
| vulnerability by sending crafted HTTP packets that would flow through
| an affected system. A successful exploit could allow the attacker to
| bypass the configured file policies and deliver a malicious payload to
| the protected network.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort_filepolbypass-m4X5DgOP

CVE-2021-1223[1]:
| Multiple Cisco products are affected by a vulnerability in the Snort
| detection engine that could allow an unauthenticated, remote attacker
| to bypass a configured file policy for HTTP. The vulnerability is due
| to incorrect handling of an HTTP range header. An attacker could
| exploit this vulnerability by sending crafted HTTP packets through an
| affected device. A successful exploit could allow the attacker to
| bypass configured file policy for HTTP packets and deliver a malicious
| payload.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-filepolbypass-67DEwMe2

CVE-2021-1224[2]:
| Multiple Cisco products are affected by a vulnerability with TCP Fast
| Open (TFO) when used in conjunction with the Snort detection engine
| that could allow an unauthenticated, remote attacker to bypass a
| configured file policy for HTTP. The vulnerability is due to incorrect
| detection of the HTTP payload if it is contained at least partially
| within the TFO connection handshake. An attacker could exploit this
| vulnerability by sending crafted TFO packets with an HTTP payload
| through an affected device. A successful exploit could allow the
| attacker to bypass configured file policy for HTTP packets and deliver
| a malicious payload.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes

CVE-2021-1494[3]:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-fp-bp-KfDdcQhc

CVE-2021-1495[4]:
| Multiple Cisco products are affected by a vulnerability in the Snort
| detection engine that could allow an unauthenticated, remote attacker
| to bypass a configured file policy for HTTP. The vulnerability is due
| to incorrect handling of specific HTTP header parameters. An attacker
| could exploit this vulnerability by sending crafted HTTP packets
| through an affected device. A successful exploit could allow the
| attacker to bypass a configured file policy for HTTP packets and
| deliver a malicious payload.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-fp-bp-KfDdcQhc

CVE-2021-34749[5]:
| A vulnerability in Server Name Identification (SNI) request filtering
| of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense
| (FTD), and the Snort detection engine could allow an unauthenticated,
| remote attacker to bypass filtering technology on an affected device
| and exfiltrate data from a compromised host. This vulnerability is due
| to inadequate filtering of the SSL handshake. An attacker could
| exploit this vulnerability by using data from the SSL client hello
| packet to communicate with an external server. A successful exploit
| could allow the attacker to execute a command-and-control attack on a
| compromised host and perform additional data exfiltration attacks.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sni-data-exfil-mFgzXqLN

CVE-2021-40114[6]:
| Multiple Cisco products are affected by a vulnerability in the way the
| Snort detection engine processes ICMP traffic that could allow an
| unauthenticated, remote attacker to cause a denial of service (DoS)
| condition on an affected device. The vulnerability is due to improper
| memory resource management while the Snort detection engine is
| processing ICMP packets. An attacker could exploit this vulnerability
| by sending a series of ICMP packets through an affected device. A
| successful exploit could allow the attacker to exhaust resources on
| the affected device, causing the device to reload.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-3315
https://www.cve.org/CVERecord?id=CVE-2020-3315
[1] https://security-tracker.debian.org/tracker

Bug#1021277: strongswan: CVE-2022-40617

2022-10-04 Thread Moritz Mühlenhoff
Source: strongswan
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for strongswan.

CVE-2022-40617[0]:
https://www.strongswan.org/blog/2022/10/03/strongswan-vulnerability-(cve-2022-40617).html

Patch: https://download.strongswan.org/security/CVE-2022-40617/

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-40617
https://www.cve.org/CVERecord?id=CVE-2022-40617

Please adjust the affected versions in the BTS as needed.



<    5   6   7   8   9   10   11   12   13   14   >