[SECURITY] [DLA 3333-1] tiff security update
- Debian LTS Advisory DLA--1debian-...@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany February 21, 2023 https://wiki.debian.org/LTS - Package: tiff Version: 4.1.0+git191117-2~deb10u7 CVE ID : CVE-2023-0795 CVE-2023-0796 CVE-2023-0797 CVE-2023-0798 CVE-2023-0799 CVE-2023-0800 CVE-2023-0801 CVE-2023-0802 CVE-2023-0803 CVE-2023-0804 Debian Bug : 1031632 Several flaws were found in tiffcrop, a program distributed by tiff, a library and tools providing support for the Tag Image File Format (TIFF). A specially crafted tiff file can lead to an out-of-bounds write or read resulting in a denial of service. For Debian 10 buster, these problems have been fixed in version 4.1.0+git191117-2~deb10u7. We recommend that you upgrade your tiff packages. For the detailed security status of tiff please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tiff Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS signature.asc Description: This is a digitally signed message part
[SECURITY] [DLA 3330-1] amanda security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-3330-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb February 21, 2023 https://wiki.debian.org/LTS - - Package: amanda Version: 1:3.5.1-2+deb10u1 CVE ID : CVE-2022-37704 Debian Bug : 1029829 It was discovered that there was a potential privilege escalation vulnerability in the "amanda" backup utility. The SUID binary located at /lib/amanda/rundump executed /usr/sbin/dump as root with arguments controlled by the attacker, which may have led to an escalation of privileges, denial of service (DoS) or information disclosure. For Debian 10 buster, this problem has been fixed in version 1:3.5.1-2+deb10u1. We recommend that you upgrade your amanda packages. For the detailed security status of amanda please refer to its security tracker page at: https://security-tracker.debian.org/tracker/amanda Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmP1DToACgkQHpU+J9Qx HlggTA//fjvgMgUR0d0OA2pyJ3Sal66un/tY2yO2M6CBfAom+m8cw086VgPW3BJs rV9LJ92bzi5uqAEA2lcsNEfD+JG2FNgCyEWwW82O31D2se5QusFdKELN8J/PLpiO RdWNOD5ztnXqR2NuTkjoLGnEsvLN0yPeaU0dK6KAQc/c7olcM2joe+f1z/rqmab5 sKKX9CGYMSneR1DIS52iE889nfii/evphZ4AtIuFOiWtYG5yuZCyf2KnekEd4qGP UmMy+eiKZs1TfmGQu+b8sNmBPBJ5uDKxal89lRFRE0TWMrfLrVx3oYYiIchBdsmr 6GDpzMx/YXHpa9rC+YUwpbBA7L0O7Ac2q7uhEu208WQpnTin7SWqdjkFeYyQOHwo tkyEKllzkzt6DBDu3Nb1Pmenn1CTK5o52GNmIuzmo8Mjs7F1Eyu2kTLbr+bkjTLq 6YZ0ji26n0poMDQoK/daugVaDYYTnQV+7f4fPSUjFVXEWdL5d6nKpuOKFuJaWvzE RNmxWGacBYGv1mBsEEywfStgVpeJOflIw0yF0QNVvfzxcOhTGdW7slcPWFAwz23L 1aR1sVm6/Eu152iJoOZ4ZbeV4UgyYHR4bUKKf9ylfGAeJ9YQcsYf635lxPCcQnRT SH3L8DdVE0AxcuayldUDBgWJjEvWXVV/5oIKznmPcQnT+7DQaKg= =BgPh -END PGP SIGNATURE-
[SECURITY] [DLA 3332-1] apr-util security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian LTS Advisory DLA-3332-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Adrian Bunk February 21, 2023 https://wiki.debian.org/LTS - - Package: apr-util Version: 1.6.1-4+deb10u1 CVE ID : CVE-2022-25147 An Integer Overflow or Wraparound vulnerability was fixed in apr_base64() in the Apache Portable Runtime Utility Library. For Debian 10 buster, this problem has been fixed in version 1.6.1-4+deb10u1. We recommend that you upgrade your apr-util packages. For the detailed security status of apr-util please refer to its security tracker page at: https://security-tracker.debian.org/tracker/apr-util Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmP1IskACgkQiNJCh6LY mLELfw//SC753I6+9XM8DBZhNZCA2g8YaQOK+lrZTdd1tKelcgMKEANtlltZKq9j okWf8aC5X5Fkti6Sb6A0HoMYxKhAVCxSRu4JNZOyrY3zsWjmom294mWWgh6R7m5b M6D8V+u3S1tauaM1nGudteslUsXTjkntW2bUhlI/kHZUxTHxposcL9zDCYyXwWPR XIadaxfX4uPgnSeHa13CZoRHdydBALQZxz+7+A4Y8BvqXTHdouqSYSondR9t3SaJ NB2QDn+GQoeF/biIdV7bCruHCWGiKNvNI8vBg8OS521XtaOiQe+UECKDWjfp+Iut DetQya+PwGUYrsNPzKtIFHD+s8jQWq/fyH9ztpI8O8nzDg2gjh8EMnQ8BXeeE8sv mcEmF3VzZlxlkcB6Pv0ytAerkXO6SL2kZYalMcptQ9Uh6uwZbnVpobsickcdbT5R uGJAcFY5ditPoP+OAQihqzzNI8DkrBlDOoH8lxOlwG1EOoM1xZKjrz9UEMdo5cib BnLFbN4UOV4SD3kG7nxAb7/3R0tjHRS8CIefESO7TIuwi4oIPw03AlEaeAO8zZ38 hsLgFLVRM9/zxMj4flWKcAegCW5PYaGiFj5aC9IpNfX9qpc3luH2ET+gKFP29FgJ 8KSD9UKjRSpCVQ4pMmeaJrSezxbnJqBm1Q4lShsLW5tzXLRMjs0= =HFVp -END PGP SIGNATURE-