[SECURITY] [DLA 3646-1] open-vm-tools security update

2023-11-05 Thread Bastien Roucaries
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian LTS Advisory DLA-3646-1debian-...@lists.debian.org
https://www.debian.org/lts/security/   Bastien Roucariès
November 05, 2023 https://wiki.debian.org/LTS
- -

Package: open-vm-tools
Version: 2:10.3.10-1+deb10u6
CVE ID : CVE-2023-34058 CVE-2023-34059
Debian Bug : 1054666

Brief introduction 

CVE-2023-34058

A file descriptor hijack vulnerability was found in
the vmware-user-suid-wrapper command.
A malicious actor with non-root privileges might have been able
to hijack the /dev/uinput file descriptor allowing
them to simulate user inputs.

CVE-2023-34059

A SAML Token Signature Bypass vulnerability was found.
A malicious actor that has been granted Guest Operation Privileges
in a target virtual machine might have been able to
elevate their privileges if that target
virtual machine has been assigned a more privileged Guest Alias.

For Debian 10 buster, these problems have been fixed in version
2:10.3.10-1+deb10u6.

We recommend that you upgrade your open-vm-tools packages.

For the detailed security status of open-vm-tools please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/open-vm-tools

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
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=0q1C
-END PGP SIGNATURE-



[SECURITY] [DLA 3645-1] trafficserver security update

2023-11-05 Thread Adrian Bunk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian LTS Advisory DLA-3645-1debian-...@lists.debian.org
https://www.debian.org/lts/security/  Adrian Bunk
November 05, 2023 https://wiki.debian.org/LTS
- -

Package: trafficserver
Version: 8.1.7-0+deb10u3
CVE ID : CVE-2023-41752 CVE-2023-44487
Debian Bug : 1054427

Two vulnerabilities were fixed in Apache Traffic Server,
a reverse and forward proxy server.

CVE-2023-41752

s3_auth plugin exposes AWSAccessKeyId

CVE-2023-44487

HTTP/2 Rapid Reset denial of service

For Debian 10 buster, these problems have been fixed in version 8.1.7-0+deb10u3.

We recommend that you upgrade your trafficserver packages.

For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
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=pSKR
-END PGP SIGNATURE-