[SECURITY] [DLA 3835-1] roundcube security update

2024-06-17 Thread Guilhem Moulin
-
Debian LTS Advisory DLA-3835-1debian-...@lists.debian.org
https://www.debian.org/lts/security/   Guilhem Moulin
June 17, 2024 https://wiki.debian.org/LTS
-

Package: roundcube
Version: 1.3.17+dfsg.1-1~deb10u6
CVE ID : CVE-2024-37383 CVE-2024-37384
Debian Bug : 1071474

Cross-site scripting (XSS) vulnerabilities were discovered in Roundcube,
a skinnable AJAX based webmail solution for IMAP servers, which could
allow a remote attacker to load arbitrary JavaScript code and might lead
to privilege escalation or information disclosure.

CVE-2024-37383

Valentin T. and Lutz Wolf of CrowdStrike discovered that Roundcube
allows XSS via SVG animate attributes.

CVE-2024-37384

Huy Nguyễn Phạm Nhật discovered that Roundcube allows XSS via list
columns from user preferences.

For Debian 10 buster, these problems have been fixed in version
1.3.17+dfsg.1-1~deb10u6.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


signature.asc
Description: PGP signature


[SECURITY] [DLA 3832-1] pymongo security update

2024-06-17 Thread rouca
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian LTS Advisory DLA-3832-1debian-...@lists.debian.org
https://www.debian.org/lts/security/   Bastien Roucariès
June 17, 2024 https://wiki.debian.org/LTS
- -

Package: pymongo
Version: 3.7.1-1.1+deb10u1
CVE ID : CVE-2024-5629

An out-of-bounds read in the 'bson' module allowed deserialization of
malformed BSON provided by a Server to raise an exception which may contain
arbitrary application memory.

For Debian 10 buster, this problem has been fixed in version
3.7.1-1.1+deb10u1.

We recommend that you upgrade your pymongo packages.

For the detailed security status of pymongo please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pymongo

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
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=Ip7j
-END PGP SIGNATURE-



[SECURITY] [DLA 3831-1] nano security update

2024-06-17 Thread Adrian Bunk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian LTS Advisory DLA-3831-1debian-...@lists.debian.org
https://www.debian.org/lts/security/  Adrian Bunk
June 17, 2024 https://wiki.debian.org/LTS
- -

Package: nano
Version: 3.2-3+deb10u1
CVE ID : CVE-2024-5742

A symlink attack with emergency file saving has been fixed in the text 
editor nano.

For Debian 10 buster, this problem has been fixed in version
3.2-3+deb10u1.

We recommend that you upgrade your nano packages.

For the detailed security status of nano please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nano

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmZwFIgACgkQiNJCh6LY
mLEAyRAAsSq2udw7C72rdFSnJScJ8YchyFY22rAglD2HXH/oUnzifPjj9Drh+6wC
58o8lCmuDPA3e40KGO3OPvFeAtWhdGF4tfdORI2AZx63+ZEwscGohEnlsRWlrrFz
x7MxFZ1UsEi3SuQLY+WY+g9UCdse1Z5oBHcbQH796jf4XSKaZi7U1FLWSDBvlszj
Pu6q/bRVJRw33/Cg/jLSZ2IEYCUWHLtFkF7Is5nRfDr/+0mUatJKAQgvBcPKazXx
EDfk6Z+fs2re+nR8Ol8n4gIvNEQIeU+49j7U9hgdsFpOZFnhw7+mFM39eSSD3n8s
JUT3dKt76zybax5KYlXVCMbOJ2/6srjSi614wHiBXxGdWJ/LDrGwfdPwq7srFB9x
MCzArk+J3i5JUfnN3kmf5LppRtkJp3KgGLIHcKdfkZllGGBqVL45ClR2YPxO72Z4
r8UAxGGWnvBsaI2a/MATU/IR5D/zyK7TMG6HY1I5P12nbDtaot9okMTIT/M2Sx8J
Pyoqx82vt7nTS1q47xlbXnnsZczCVx+fCssDaDjLOkQiDqTVnKyiw5+QefpG5DDK
iKkmeCIEjebEc9BoQfXl4ASzr4FZwmeeU6QdPtPZaQQmPLQvIwz6LBfXIh3HV/fg
VmJRnbTEypkG0Cs8Oq1DnrBzQCpIjd/BuUwLrOjb6ppBS4QQQu0=
=GKYc
-END PGP SIGNATURE-