[SECURITY] [DLA 3333-1] tiff security update

2023-02-21 Thread Markus Koschany
-
Debian LTS Advisory DLA--1debian-...@lists.debian.org
https://www.debian.org/lts/security/  Markus Koschany
February 21, 2023 https://wiki.debian.org/LTS
-

Package: tiff
Version: 4.1.0+git191117-2~deb10u7
CVE ID : CVE-2023-0795 CVE-2023-0796 CVE-2023-0797 CVE-2023-0798 
 CVE-2023-0799 CVE-2023-0800 CVE-2023-0801 CVE-2023-0802 
 CVE-2023-0803 CVE-2023-0804
Debian Bug : 1031632

Several flaws were found in tiffcrop, a program distributed by tiff, a library
and tools providing support for the Tag Image File Format (TIFF).
A specially crafted tiff file can lead to an out-of-bounds write or read
resulting in a denial of service.

For Debian 10 buster, these problems have been fixed in version
4.1.0+git191117-2~deb10u7.

We recommend that you upgrade your tiff packages.

For the detailed security status of tiff please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tiff

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


signature.asc
Description: This is a digitally signed message part


[SECURITY] [DLA 3330-1] amanda security update

2023-02-21 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

- -
Debian LTS Advisory DLA-3330-1debian-...@lists.debian.org
https://www.debian.org/lts/security/   Chris Lamb
February 21, 2023 https://wiki.debian.org/LTS
- -

Package: amanda
Version: 1:3.5.1-2+deb10u1
CVE ID : CVE-2022-37704
Debian Bug : 1029829

It was discovered that there was a potential privilege escalation
vulnerability in the "amanda" backup utility.

The SUID binary located at /lib/amanda/rundump executed /usr/sbin/dump
as root with arguments controlled by the attacker, which may have led
to an escalation of privileges, denial of service (DoS) or information
disclosure.

For Debian 10 buster, this problem has been fixed in version
1:3.5.1-2+deb10u1.

We recommend that you upgrade your amanda packages.

For the detailed security status of amanda please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/amanda

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-BEGIN PGP SIGNATURE-
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=BgPh
-END PGP SIGNATURE-



[SECURITY] [DLA 3332-1] apr-util security update

2023-02-21 Thread Adrian Bunk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian LTS Advisory DLA-3332-1debian-...@lists.debian.org
https://www.debian.org/lts/security/  Adrian Bunk
February 21, 2023 https://wiki.debian.org/LTS
- -

Package: apr-util
Version: 1.6.1-4+deb10u1
CVE ID : CVE-2022-25147

An Integer Overflow or Wraparound vulnerability was fixed in 
apr_base64() in the Apache Portable Runtime Utility Library.

For Debian 10 buster, this problem has been fixed in version
1.6.1-4+deb10u1.

We recommend that you upgrade your apr-util packages.

For the detailed security status of apr-util please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/apr-util

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
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=HFVp
-END PGP SIGNATURE-