[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

(E)LTS report for July 2023



I've worked during July 2023 on the below listed packages, for Freexian
LTS/ELTS [1]

Many thanks to Freexian and our sponsors [2] for providing this opportunity!

LTS:
====

renderdoc: DLA-3501-1
 - CVE-2023-33863, integer overflow possibly allowing RCE
 - CVE-2023-33864, integer underflow, possibly allowing RCE
 - CVE-2023-33865, symlink vulnerbility, potential privilege
   escalation.

LTS and ELTS:
=============

yajl:
  * DLA-3478-1 ELA-888-1:
    - CVE-2023-33460, a memory leak that can lead to DoS.
  * DLA-3492-1 ELA-892-1:
    - CVE-2017-16516, potential DoS due to crash
    - CVE-2022-24795, potential heap memory corruption when dealing with large (~2GB) input
    - CVE-2023-33460, a memory leak that can lead to DoS (previous
      fix was incomplete)

 yajl is embedded in several other packages, so I've analyzed other packages known
 to embed it to see if further actions are required. For example, ruby-yajl and
 xqilla have been found not to be affected.

php-cas: DLA-3485-1, ELA-890-1 (stretch)
 - CVE-2022-39369 (LTS and ELTS/stretch) Service Hostname Discovery Exploitation
 - CVE-2017-1000071 (ELTS/stretch) Authentication bypass in very old CAS servers

 The changes to php-cas, for CVE-2022-39369 were API breaking, so
 the following packages have been updated to facilitate these
 changes:
  - ocsinvetory-sever (DLA-3486-1)
  - fusiondirectory (DLA-3487-1). This upload also adresses some
    CVEs, fixed prepared by Abhijith PA. See advisory for details.


ELTS:
====

renderdoc: (WIP) (stretch)
  Currently backporting patches for CVE-2018-14774, CVE-2021-21424,
  CVE-2022-24894 and CVE-2022-24895.
  A prelimary package is available, but testing is not yet
  completed.


[1]  https://www.freexian.com/lts/
[2]  https://www.freexian.com/lts/debian/#sponsors

Cheers,
-- 
tobi

Attachment: signature.asc
Description: PGP signature


Reply to: