[SECURITY] [DLA 3717-1] zabbix security update

2024-01-24 Thread Tobias Frost
-
Debian LTS Advisory DLA-3717-1debian-...@lists.debian.org
https://www.debian.org/lts/security/ Tobias Frost
January 24, 2024  https://wiki.debian.org/LTS
-

Package: zabbix
Version: 1:4.0.4+dfsg-1+deb10u4
CVE ID : CVE-2023-32721 CVE-2023-32723 CVE-2023-32726
Debian Bug : 1053877

Several security vulnerabilities have been discovered in zabbix, a
network monitoring solution, potentially allowing an attacker to perform
a stored XSS, Server-Side Request Forgery (SSRF), exposure of sensitive
information, a system crash, or arbitrary code execution.

CVE-2023-32721

  A stored XSS has been found in the Zabbix web application in the
  Maps element if a URL field is set with spaces before URL.

CVE-2023-32723

  Inefficient user permission check, as request to LDAP is sent before
  user permissions are checked.

CVE-2023-32726

  Possible buffer overread from reading DNS responses.

For Debian 10 buster, these problems have been fixed in version
1:4.0.4+dfsg-1+deb10u4.

We recommend that you upgrade your zabbix packages.

For the detailed security status of zabbix please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/zabbix

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


signature.asc
Description: PGP signature


[SECURITY] [DLA 3718-1] php-phpseclib security update

2024-01-24 Thread Guilhem Moulin
-
Debian LTS Advisory DLA-3718-1debian-...@lists.debian.org
https://www.debian.org/lts/security/   Guilhem Moulin
January 25, 2024  https://wiki.debian.org/LTS
-

Package: php-phpseclib
Version: 2.0.30-2~deb10u2
CVE ID : CVE-2023-48795

It was discovered that php-phpseclib, a PHP library for
arbitrary-precision integer arithmetic, was vulnerable to the so-called
Terrapin Attack.

The SSH transport protocol with certain OpenSSH extensions, allows
remote attackers to bypass integrity checks such that some packets are
omitted (from the extension negotiation message), and a client and
server may consequently end up with a connection for which some security
features have been downgraded or disabled, aka a Terrapin attack.  This
occurs because the SSH Binary Packet Protocol (BPP), implemented by
these extensions, mishandles the handshake phase and mishandles use of
sequence numbers.  For example, there is an effective attack against
SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC).

For Debian 10 buster, this problem has been fixed in version
2.0.30-2~deb10u2.

We recommend that you upgrade your php-phpseclib packages.

For the detailed security status of php-phpseclib please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-phpseclib

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


signature.asc
Description: PGP signature


[SECURITY] [DLA 3719-1] phpseclib security update

2024-01-24 Thread Guilhem Moulin
-
Debian LTS Advisory DLA-3719-1debian-...@lists.debian.org
https://www.debian.org/lts/security/   Guilhem Moulin
January 25, 2024  https://wiki.debian.org/LTS
-

Package: phpseclib
Version: 1.0.19-3~deb10u2
CVE ID : CVE-2023-48795

It was discovered that phpseclib, a PHP library for arbitrary-precision
integer arithmetic, was vulnerable to the so-called Terrapin Attack.

The SSH transport protocol with certain OpenSSH extensions, allows
remote attackers to bypass integrity checks such that some packets are
omitted (from the extension negotiation message), and a client and
server may consequently end up with a connection for which some security
features have been downgraded or disabled, aka a Terrapin attack.  This
occurs because the SSH Binary Packet Protocol (BPP), implemented by
these extensions, mishandles the handshake phase and mishandles use of
sequence numbers.  For example, there is an effective attack against
SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC).

For Debian 10 buster, this problem has been fixed in version
1.0.19-3~deb10u2.

We recommend that you upgrade your phpseclib packages.

For the detailed security status of phpseclib please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/phpseclib

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


signature.asc
Description: PGP signature