I've worked during July 2023 on the below listed packages, for Freexian
LTS/ELTS [1]
Many thanks to Freexian and our sponsors [2] for providing this opportunity!
LTS:
====
renderdoc: DLA-3501-1
- CVE-2023-33863, integer overflow possibly allowing RCE
- CVE-2023-33864, integer underflow, possibly allowing RCE
- CVE-2023-33865, symlink vulnerbility, potential privilege
escalation.
LTS and ELTS:
=============
yajl:
* DLA-3478-1 ELA-888-1:
- CVE-2023-33460, a memory leak that can lead to DoS.
* DLA-3492-1 ELA-892-1:
- CVE-2017-16516, potential DoS due to crash
- CVE-2022-24795, potential heap memory corruption when dealing with large (~2GB) input
- CVE-2023-33460, a memory leak that can lead to DoS (previous
fix was incomplete)
yajl is embedded in several other packages, so I've analyzed other packages known
to embed it to see if further actions are required. For example, ruby-yajl and
xqilla have been found not to be affected.
php-cas: DLA-3485-1, ELA-890-1 (stretch)
- CVE-2022-39369 (LTS and ELTS/stretch) Service Hostname Discovery Exploitation
- CVE-2017-1000071 (ELTS/stretch) Authentication bypass in very old CAS servers
The changes to php-cas, for CVE-2022-39369 were API breaking, so
the following packages have been updated to facilitate these
changes:
- ocsinvetory-sever (DLA-3486-1)
- fusiondirectory (DLA-3487-1). This upload also adresses some
CVEs, fixed prepared by Abhijith PA. See advisory for details.
ELTS:
====
renderdoc: (WIP) (stretch)
Currently backporting patches for CVE-2018-14774, CVE-2021-21424,
CVE-2022-24894 and CVE-2022-24895.
A prelimary package is available, but testing is not yet
completed.
[1] https://www.freexian.com/lts/
[2] https://www.freexian.com/lts/debian/#sponsors
Cheers,
--
tobi
Attachment:
signature.asc
Description: PGP signature